Detection of Content Adaptive LSB Matching (a Game Theory Approach)

Size: px
Start display at page:

Download "Detection of Content Adaptive LSB Matching (a Game Theory Approach)"

Transcription

1 Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark, Jessica Fridrich / 5

2 Content-adaptive steganography Every pixel is changed with probability β i = exp( λρ i) + exp( λρ i ), where ρ i 0 are costs for each pixel and λ determined from the payload constrain n n i= h(β i) = α. Costs determined by image content = approximately available to Warden who can adjust detector accordingly. How does this change Alice s embedding strategy? 2 / 5

3 Two fundamental approaches Omnipotent Warden [Cachin, 998] Warden knows payload and embedding probabilities for each pixel. Alice minimizes KL divergence between cover/stego distributions. 2 Ignorant Warden [Böhme, 202] Warden knows only the payload. Alice can embed suboptimally (not minimize KL-div) to utilize mismatch of Warden s detector. Our contribution We investigate modern steganography (LSBM). Warden uses LRT for detection. 3 / 5

4 Notation Gaussian density with mean µ and variance σ 2 : ( ) f (x; µ, σ 2 ) = (2πσ 2 ) /2 (x µ)2 exp 2σ 2, {, 0, }-mixture of Gaussian densities with a parameter 0 β /2: f β (x; σ 2 ) = β 2 f (x;, σ2 ) + ( β)f (x; 0, σ 2 ) + β 2 f (x;, σ2 ). 4 / 5

5 Cover Model We assume cover is a sequence of n independent Gaussians X i with unequal variances σ 2 i : X = (X,..., X n ), X i N(0, σ 2 i ), i =,..., n. 5 / 5

6 Embedding Method Alice uses LSBM with change rates β (A) i, i =,..., n. Stego image Y = (Y,..., Y n ), β (A) i /2 for s i =, Pr(Y i = x i + s i ) = β (A) i for s i = 0, β (A) i /2 for s i =. Therefore Y i f (A) β (x, σi 2 ) i Change rates must satisfy payload constraint n i= h(β (A) i ) = αn 6 / 5

7 Warden s Detector Simple binary hypothesis test: β (W) i H 0 : X i f (x, 0, σ 2 i ), i, H : X i f (W) β (x, σi 2 ), i, i are change rates assumed by Warden Warden uses the Likelihood Ratio Test (LRT): T(x; β (W), σ 2 ) = n i= f (W) β (x i, σi 2 ) i f (x i, 0, σi 2) β (W) = (β (W),..., β (W) n ) and σ 2 = (σ 2,..., σ2 n) 7 / 5

8 Alice and Warden Play Game Players: Alice and Warden Strategies: β (A) = (β (A),..., β n (A) ) and β (W) = (β (W),..., β n (W) ) Payoff function: total error probability P E = min P FA ( 2 (P FA + P MD ) The game solution is in Nash equilibrium. ) 8 / 5

9 Two Pixel Model Because of the computational and numerical complexity we limit ourselves to covers consisting of two pixels. Strategies: (β (A), β (A) 2 ), (β (W), β (W) 2 ) are in fact one-dimensional since the second beta is determined from payload. [Omnipotent Warden] KL divergence minimal at (β (A,), β (A,) 2 ) [Ignorant Warden] Nash equilibrium at (β (A,2), β (A,2) 2 ) 9 / 5

10 Solution PE β (W) β (A) 0. Figure: Payoff function P E (β (A), β (W) ) for α = 0.2, σ 2 =, σ 2 2 =.2. Smooth, with a unique saddle point [Kuhn, 2003] solution exists in pure strategies, in said saddle point. 0 / 5

11 Results KL divergence KL divergence P E / β (A) P E / β (W) PE/ β (A,W) β (A) = β (W) Figure: α = 0.2, σ 2 =, σ 2 2 =.2. / 5

12 Results β (A,) β (A,2) β (A) α Figure: Alice s strategies under both scenarios β (A,), β (A,2) as a function of α for σ 2 = and σ 2 2 =.2. 2 / 5

13 Results β (A,) β (A,2) 0. β (A) σ 2 2 /σ2 Figure: Alice s strategies under both scenarios β (A,), β (A,2) as a function of content diversity measured by the ratio σ 2 2/σ 2 for α = 0.4 and σ 2 =. 3 / 5

14 D KL Results 4 D KL /D () KL DKL DKL/D () KL α Figure: Warden s loss in her ability to detect Alice s embedding, D KL (ln T H 0 ln T H ) and D KL /D () KL, as a function of α for σ 2 = and σ2 2 =.2. 4 / 5

15 Summary In practice Warden rarely has full access to the steganographic channel. Even the simplistic two pixel cover source reveals interesting phenomena: Nash equilibrium point of minimal KL divergence. It pays off for Alice to trade optimality for a mismatched detector. It is always advantageous for Alice to embed a slightly larger payload into the element with a smaller variance. The difference between optimal strategies increases with increasing α. The difference between optimal strategies decreases with increasing differences between σ 2 and σ 2 2. Computational complexity and numerical issues prevent scaling up this approach to realistic covers. 5 / 5

Detection of Content Adaptive LSB Matching (a Game Theory Approach)

Detection of Content Adaptive LSB Matching (a Game Theory Approach) Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA ABSTRACT This paper is an attempt to analyze the interaction

More information

Detection of Content Adaptive LSB Matching (a Game Theory Approach)

Detection of Content Adaptive LSB Matching (a Game Theory Approach) Detection of Content Adaptive LSB Matching (a Game Theory Approach) Tomáš Denemark and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA ABSTRACT This paper is an attempt to analyze the interaction

More information

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,

More information

Fisher Information Determines Capacity of ε-secure Steganography

Fisher Information Determines Capacity of ε-secure Steganography Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

A Study of Embedding Operations and Locations for Steganography in H.264 Video

A Study of Embedding Operations and Locations for Steganography in H.264 Video A Study of Embedding Operations and Locations for Steganography in H.264 Video Andreas Neufeld and Andrew D. Ker Oxford University Department of Computer Science Andreas Neufeld is now with the Image and

More information

Imperfect Stegosystems

Imperfect Stegosystems DISSERTATION DEFENSE Imperfect Stegosystems Asymptotic Laws and Near-Optimal Practical Constructions Tomá² Filler Dept. of Electrical and Computer Engineering SUNY Binghamton, New York April 1, 2011 2

More information

Content-Adaptive Steganography by Minimizing Statistical Detectability

Content-Adaptive Steganography by Minimizing Statistical Detectability 1 Content-Adaptive Steganography by Minimizing Statistical Detectability Vahid Sedighi, Member, IEEE, Rémi Cogranne, Member, IEEE, and Jessica Fridrich, Senior Member, IEEE Abstract Most current steganographic

More information

Adaptive Steganography and Steganalysis with Fixed-Size Embedding

Adaptive Steganography and Steganalysis with Fixed-Size Embedding Adaptive Steganography and Steganalysis with Fixed-Size Embedding Benjamin Johnson ae, Pascal Schöttle b, Aron Laszka c, Jens Grossklags d, and Rainer Böhme b a Cylab, Carnegie Mellon University, USA b

More information

Improving Selection-Channel-Aware Steganalysis Features

Improving Selection-Channel-Aware Steganalysis Features Improving Selection-Channel-Aware Steganalysis Features Tomáš Denemark and Jessica Fridrich, Department of ECE, SUNY Binghamton, NY, USA, {tdenema1,fridrich}@binghamton.edu, Pedro Comesaña-Alfaro, Department

More information

Lecture 8: Signal Detection and Noise Assumption

Lecture 8: Signal Detection and Noise Assumption ECE 830 Fall 0 Statistical Signal Processing instructor: R. Nowak Lecture 8: Signal Detection and Noise Assumption Signal Detection : X = W H : X = S + W where W N(0, σ I n n and S = [s, s,..., s n ] T

More information

ROC Curves for Steganalysts

ROC Curves for Steganalysts ROC Curves for Steganalysts Andreas Westfeld Technische Universität Dresden Institut für Systemarchitektur 01062 Dresden mailto:westfeld@inf.tu-dresden.de 1 Introduction There are different approaches

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a

More information

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu

More information

The Square Root Law of Steganographic Capacity

The Square Root Law of Steganographic Capacity The Square Root Law of Steganographic Capacity ABSTRACT Andrew D. Ker Oxford University Computing Laboratory Parks Road Oxford OX1 3QD, UK adk@comlab.ox.ac.uk Jan Kodovský Dept. of Electrical and Computer

More information

2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)?

2. What are the tradeoffs among different measures of error (e.g. probability of false alarm, probability of miss, etc.)? ECE 830 / CS 76 Spring 06 Instructors: R. Willett & R. Nowak Lecture 3: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we

More information

Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory

Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory Rémi Cogranne, Member, IEEE, ICD - ROSAS - LM2S Troyes University of Technology - UMR 6281, CNRS 12, rue Marie Curie

More information

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary

Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics. 1 Executive summary ECE 830 Spring 207 Instructor: R. Willett Lecture 5: Likelihood ratio tests, Neyman-Pearson detectors, ROC curves, and sufficient statistics Executive summary In the last lecture we saw that the likelihood

More information

Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis

Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis Xiaofeng Li 1, Xiangwei Kong 1, Bo Wang 1, Yanqing Guo 1,Xingang You 2 1 School of Information and Communication Engineering Dalian

More information

Quantitative Steganalysis of LSB Embedding in JPEG Domain

Quantitative Steganalysis of LSB Embedding in JPEG Domain Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding

More information

IMPERFECT STEGOSYSTEMS ASYMPTOTIC LAWS AND NEAR-OPTIMAL PRACTICAL CONSTRUCTIONS

IMPERFECT STEGOSYSTEMS ASYMPTOTIC LAWS AND NEAR-OPTIMAL PRACTICAL CONSTRUCTIONS IMPERFECT STEGOSYSTEMS ASYMPTOTIC LAWS AND NEAR-OPTIMAL PRACTICAL CONSTRUCTIONS BY TOMÁŠ FILLER M.S. in Computer Science, Czech Technical University, Prague, 2007 DISSERTATION Submitted in partial fulfillment

More information

ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals

ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals Jingxian Wu Department of Electrical Engineering University of Arkansas Outline Matched Filter Generalized Matched Filter Signal

More information

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE 2th European Signal Processing Conference EUSIPCO 22) Bucharest, Romania, August 27-3, 22 STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE Rémi Cogranne, Cathel Zitzmann,

More information

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the

More information

QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost

QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost ANSWER QUESTION ONE Let 7C = Total Cost MC = Marginal Cost AC = Average Cost Q = Number of units AC = 7C MC = Q d7c d7c 7C Q Derivation of average cost with respect to quantity is different from marginal

More information

Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization

Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization Tomáš Filler, Jan Judas, and Jessica Fridrich Department of Electrical and Computer Engineering SUNY Binghamton, Binghamton,

More information

Non-zero-sum Game and Nash Equilibarium

Non-zero-sum Game and Nash Equilibarium Non-zero-sum Game and Nash Equilibarium Team nogg December 21, 2016 Overview Prisoner s Dilemma Prisoner s Dilemma: Alice Deny Alice Confess Bob Deny (-1,-1) (-9,0) Bob Confess (0,-9) (-6,-6) Prisoner

More information

Detection theory. H 0 : x[n] = w[n]

Detection theory. H 0 : x[n] = w[n] Detection Theory Detection theory A the last topic of the course, we will briefly consider detection theory. The methods are based on estimation theory and attempt to answer questions such as Is a signal

More information

Quantitative Structural Steganalysis of Jsteg

Quantitative Structural Steganalysis of Jsteg Quantitative Structural Steganalysis of Jsteg Jan Kodovský and Jessica Fridrich, Member, IEEE Abstract Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding

More information

STEGANOGRAPHY is the practice and study of techniques

STEGANOGRAPHY is the practice and study of techniques INFOCOMMUNICATIONS JOURNAL Modeling Content-Adaptive Steganography with Detection Costs as a Quasi-Zero-Sum Game Aron Laszka, Member, IEEE, Ádám Máté Földes, Member, IEEE, Abstract Recently, content-adaptive

More information

Game Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin

Game Theory. Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Game Theory Greg Plaxton Theory in Programming Practice, Spring 2004 Department of Computer Science University of Texas at Austin Bimatrix Games We are given two real m n matrices A = (a ij ), B = (b ij

More information

PATTERN RECOGNITION AND MACHINE LEARNING

PATTERN RECOGNITION AND MACHINE LEARNING PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory

More information

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts Jan Kodovský and Jessica Fridrich Department of ECE, Binghamton University, NY, USA {fridrich,jan.kodovsky}@binghamton.edu

More information

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,

More information

Steganography via Codes for Memory with Defective Cells

Steganography via Codes for Memory with Defective Cells Steganography via Codes for Memory with Defective Cells Jessica Fridrich a, Miroslav Goljan a, and David Soukal b a Department of Electrical and Computer Engineering, b Department of Computer Science SUNY

More information

Game Theory Review Questions

Game Theory Review Questions Game Theory Review Questions Sérgio O. Parreiras All Rights Reserved 2014 0.1 Repeated Games What is the difference between a sequence of actions and a strategy in a twicerepeated game? Express a strategy

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions.

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Thursday 17th May 2018 Time: 09:45-11:45. Please answer all Questions. COMP 34120 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE AI and Games Date: Thursday 17th May 2018 Time: 09:45-11:45 Please answer all Questions. Use a SEPARATE answerbook for each SECTION

More information

Necessary Corrections in Intransitive Likelihood-Ratio Classifiers

Necessary Corrections in Intransitive Likelihood-Ratio Classifiers Necessary Corrections in Intransitive Likelihood-Ratio Classifiers Gang Ji and Jeff Bilmes SSLI-Lab, Department of Electrical Engineering University of Washington Seattle, WA 9895-500 {gang,bilmes}@ee.washington.edu

More information

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients Thanh Hai Thai, Rémi Cogranne, Florent Retraint ICD - ROSAS - LMS - Troyes University of Technology - UMR 68, CNRS Troyes - France

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

Information Hiding. Andrew D. Ker. 10 Lectures, Hilary Term (complete) Department of Computer Science, Oxford University

Information Hiding. Andrew D. Ker. 10 Lectures, Hilary Term (complete) Department of Computer Science, Oxford University Information Hiding (complete) Andrew D. Ker 10 Lectures, Hilary Term 2016 Department of Computer Science, Oxford University ii Contents 0 Introduction 1 0.1 Preliminary Material..............................

More information

Chapter 2 Signal Processing at Receivers: Detection Theory

Chapter 2 Signal Processing at Receivers: Detection Theory Chapter Signal Processing at Receivers: Detection Theory As an application of the statistical hypothesis testing, signal detection plays a key role in signal processing at receivers of wireless communication

More information

Machine Learning Basics Lecture 7: Multiclass Classification. Princeton University COS 495 Instructor: Yingyu Liang

Machine Learning Basics Lecture 7: Multiclass Classification. Princeton University COS 495 Instructor: Yingyu Liang Machine Learning Basics Lecture 7: Multiclass Classification Princeton University COS 495 Instructor: Yingyu Liang Example: image classification indoor Indoor outdoor Example: image classification (multiclass)

More information

Fundamental Limits of Invisible Flow Fingerprinting

Fundamental Limits of Invisible Flow Fingerprinting Fundamental Limits of Invisible Flow Fingerprinting Ramin Soltani, Dennis Goeckel, Don Towsley, and Amir Houmansadr Electrical and Computer Engineering Department, University of Massachusetts, Amherst,

More information

Defect Detection Using Hidden Markov Random Fields

Defect Detection Using Hidden Markov Random Fields Electrical and Computer Engineering Publications Electrical and Computer Engineering 5 Defect Detection Using Hidden Markov Random Fields Aleksandar Dogandžić Iowa State University, ald@iastate.edu Nawanat

More information

Bayes Correlated Equilibrium and Comparing Information Structures

Bayes Correlated Equilibrium and Comparing Information Structures Bayes Correlated Equilibrium and Comparing Information Structures Dirk Bergemann and Stephen Morris Spring 2013: 521 B Introduction game theoretic predictions are very sensitive to "information structure"

More information

On Noise-Enhanced Distributed Inference in the Presence of Byzantines

On Noise-Enhanced Distributed Inference in the Presence of Byzantines Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 211 On Noise-Enhanced Distributed Inference in the Presence of Byzantines Mukul Gagrani

More information

Bayesian Methods: Naïve Bayes

Bayesian Methods: Naïve Bayes Bayesian Methods: aïve Bayes icholas Ruozzi University of Texas at Dallas based on the slides of Vibhav Gogate Last Time Parameter learning Learning the parameter of a simple coin flipping model Prior

More information

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

ML Detection of Steganography

ML Detection of Steganography ML Detection of Steganography Mark T Hogan, Neil J Hurley, Guénolé CM Silvestre, Félix Balado and Kevin M Whelan Department of Computer Science, University College Dublin, Belfield, Dublin 4, Ireland ABSTRACT

More information

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in

More information

MPSteg-color: a new steganographic technique for color images

MPSteg-color: a new steganographic technique for color images MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it

More information

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,

More information

Confronting Theory with Experimental Data and vice versa. Lecture VII Social learning. The Norwegian School of Economics Nov 7-11, 2011

Confronting Theory with Experimental Data and vice versa. Lecture VII Social learning. The Norwegian School of Economics Nov 7-11, 2011 Confronting Theory with Experimental Data and vice versa Lecture VII Social learning The Norwegian School of Economics Nov 7-11, 2011 Quantal response equilibrium (QRE) Players do not choose best response

More information

CONTENT ADAPTIVE STEGANOGRAPHY DESIGN AND DETECTION

CONTENT ADAPTIVE STEGANOGRAPHY DESIGN AND DETECTION CONTENT ADAPTIVE STEGANOGRAPHY DESIGN AND DETECTION BY VOJTĚCH HOLUB MS, Czech Technical University, Prague, 2010 DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor

More information

Spring 2016 Network Science. Solution of Quiz I

Spring 2016 Network Science. Solution of Quiz I Spring 2016 Network Science Department of Electrical and Computer Engineering National Chiao Tung University Solution of Quiz I Problem Points Your Score 1 5 2 20 25 20 Total 100 Read all of the following

More information

MULTIMEDIA forensics [1] is a new discipline aiming

MULTIMEDIA forensics [1] is a new discipline aiming 450 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCH 2013 The Source Identification Game: An Information-Theoretic Perspective Mauro Barni, Fellow, IEEE, and Benedetta Tondi

More information

This exam contains 13 pages (including this cover page) and 10 questions. A Formulae sheet is provided with the exam.

This exam contains 13 pages (including this cover page) and 10 questions. A Formulae sheet is provided with the exam. Probability and Statistics FS 2017 Session Exam 22.08.2017 Time Limit: 180 Minutes Name: Student ID: This exam contains 13 pages (including this cover page) and 10 questions. A Formulae sheet is provided

More information

Asymptotically Truthful Equilibrium Selection in Large Congestion Games

Asymptotically Truthful Equilibrium Selection in Large Congestion Games Asymptotically Truthful Equilibrium Selection in Large Congestion Games Ryan Rogers - Penn Aaron Roth - Penn June 12, 2014 Related Work Large Games Roberts and Postlewaite 1976 Immorlica and Mahdian 2005,

More information

Chapter 20. Deep Generative Models

Chapter 20. Deep Generative Models Peng et al.: Deep Learning and Practice 1 Chapter 20 Deep Generative Models Peng et al.: Deep Learning and Practice 2 Generative Models Models that are able to Provide an estimate of the probability distribution

More information

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

More information

STEGOSYSTEMS BASED ON NOISY CHANNELS

STEGOSYSTEMS BASED ON NOISY CHANNELS International Journal of Computer Science and Applications c Technomathematics Research Foundation Vol. 8 No. 1, pp. 1-13, 011 STEGOSYSTEMS BASED ON NOISY CHANNELS VALERY KORZHIK State University of Telecommunications,

More information

Chapter 2. Binary and M-ary Hypothesis Testing 2.1 Introduction (Levy 2.1)

Chapter 2. Binary and M-ary Hypothesis Testing 2.1 Introduction (Levy 2.1) Chapter 2. Binary and M-ary Hypothesis Testing 2.1 Introduction (Levy 2.1) Detection problems can usually be casted as binary or M-ary hypothesis testing problems. Applications: This chapter: Simple hypothesis

More information

Sealed-bid first-price auctions with an unknown number of bidders

Sealed-bid first-price auctions with an unknown number of bidders Sealed-bid first-price auctions with an unknown number of bidders Erik Ekström Department of Mathematics, Uppsala University Carl Lindberg The Second Swedish National Pension Fund e-mail: ekstrom@math.uu.se,

More information

Fake news. Xiaofan Li & Andrew Whinston. University of Texas at Austin December 30, 2017

Fake news. Xiaofan Li & Andrew Whinston. University of Texas at Austin December 30, 2017 Fake news Xiaofan Li & Andrew Whinston University of Texas at Austin li.x@utexas.edu December 30, 2017 Xiaofan Li & Andrew Whinston (UT Austin) Fake news December 30, 2017 1 / 23 Overview 1 Introduction

More information

Modern Methods of Data Analysis - WS 07/08

Modern Methods of Data Analysis - WS 07/08 Modern Methods of Data Analysis Lecture VIc (19.11.07) Contents: Maximum Likelihood Fit Maximum Likelihood (I) Assume N measurements of a random variable Assume them to be independent and distributed according

More information

Direction: This test is worth 250 points and each problem worth points. DO ANY SIX

Direction: This test is worth 250 points and each problem worth points. DO ANY SIX Term Test 3 December 5, 2003 Name Math 52 Student Number Direction: This test is worth 250 points and each problem worth 4 points DO ANY SIX PROBLEMS You are required to complete this test within 50 minutes

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

Generative Adversarial Networks. Presented by Yi Zhang

Generative Adversarial Networks. Presented by Yi Zhang Generative Adversarial Networks Presented by Yi Zhang Deep Generative Models N(O, I) Variational Auto-Encoders GANs Unreasonable Effectiveness of GANs GANs Discriminator tries to distinguish genuine data

More information

Constructing good covering codes for applications in Steganography

Constructing good covering codes for applications in Steganography Constructing good covering codes for applications in Steganography Jürgen Bierbrauer 1 and Jessica Fridrich 2 1 Department of Mathematical Sciences Michigan Technological University HOUGHTON (MI) 49931

More information

Extensive Form Games I

Extensive Form Games I Extensive Form Games I Definition of Extensive Form Game a finite game tree X with nodes x X nodes are partially ordered and have a single root (minimal element) terminal nodes are z Z (maximal elements)

More information

Overview. Producer Theory. Consumer Theory. Exchange

Overview. Producer Theory. Consumer Theory. Exchange Overview Consumer Producer Exchange Edgeworth Box All Possible Exchange Points Contract Curve Overview Consumer Producer Exchange (Multiplicity) Walrasian Equilibrium Walrasian Equilibrium Requirements:

More information

Game Theory, Population Dynamics, Social Aggregation. Daniele Vilone (CSDC - Firenze) Namur

Game Theory, Population Dynamics, Social Aggregation. Daniele Vilone (CSDC - Firenze) Namur Game Theory, Population Dynamics, Social Aggregation Daniele Vilone (CSDC - Firenze) Namur - 18.12.2008 Summary Introduction ( GT ) General concepts of Game Theory Game Theory and Social Dynamics Application:

More information

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker. Lecture 6. SG based on noisy channels [4]. CO Detection of SG The peculiarities of the model: - it is alloed to use by attacker only noisy version of SG C (n), - CO can be knon exactly for attacker. Practical

More information

Proceedings of the 9th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications June 2-5, 2015, Fukuoka, Japan

Proceedings of the 9th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications June 2-5, 2015, Fukuoka, Japan Proceedings of the 9th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications June 2-5, 205, Fuuoa, Japan Editors: Satoru Iwata Department of Mathematical Informatics University of Toyo

More information

ECE531 Screencast 9.2: N-P Detection with an Infinite Number of Possible Observations

ECE531 Screencast 9.2: N-P Detection with an Infinite Number of Possible Observations ECE531 Screencast 9.2: N-P Detection with an Infinite Number of Possible Observations D. Richard Brown III Worcester Polytechnic Institute Worcester Polytechnic Institute D. Richard Brown III 1 / 7 Neyman

More information

Detection Games with a Fully Active Attacker

Detection Games with a Fully Active Attacker Detection Games with a Fully Active Attacker Benedetta Tondi 1, Mauro Barni 1, Neri Merhav 2 1 Department of Information Engineering and Mathematics, University of Siena, Siena, ITALY 2 Department of Electrical

More information

STAT/MATH 395 PROBABILITY II

STAT/MATH 395 PROBABILITY II STAT/MATH 395 PROBABILITY II Chapter 6 : Moment Functions Néhémy Lim 1 1 Department of Statistics, University of Washington, USA Winter Quarter 2016 of Common Distributions Outline 1 2 3 of Common Distributions

More information

Expectation Maximization

Expectation Maximization Expectation Maximization Bishop PRML Ch. 9 Alireza Ghane c Ghane/Mori 4 6 8 4 6 8 4 6 8 4 6 8 5 5 5 5 5 5 4 6 8 4 4 6 8 4 5 5 5 5 5 5 µ, Σ) α f Learningscale is slightly Parameters is slightly larger larger

More information

The Multi-Arm Bandit Framework

The Multi-Arm Bandit Framework The Multi-Arm Bandit Framework A. LAZARIC (SequeL Team @INRIA-Lille) ENS Cachan - Master 2 MVA SequeL INRIA Lille MVA-RL Course In This Lecture A. LAZARIC Reinforcement Learning Algorithms Oct 29th, 2013-2/94

More information

Perturbed Quantization Steganography

Perturbed Quantization Steganography Perturbed Quantization Steganography Jessica Fridrich SUNY Binghamton Department of ECE Binghamton, NY 13902-6000 001 607 777 2577 fridrich@binghamton.edu Miroslav Goljan SUNY Binghamton Department of

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Expectation Maximization

Expectation Maximization Expectation Maximization Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 /

More information

Photos placed in horizontal position with even amount of white space between photos and header

Photos placed in horizontal position with even amount of white space between photos and header Photos placed in horizontal position with even amount of white space between photos and header XPCA: Copula-based Decompositions for Ordinal Data Clifford Anderson-Bergman, Kina Kincher-Winoto and Tamara

More information

USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION

USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION TKK Reports in Information and Computer Science Espoo 2010 TKK-ICS-R34 USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION Yoan Miche, Patrick Bas and Amaury Lendasse

More information

Long-Run versus Short-Run Player

Long-Run versus Short-Run Player Repeated Games 1 Long-Run versus Short-Run Player a fixed simultaneous move stage game Player 1 is long-run with discount factor δ actions a A a finite set 1 1 1 1 2 utility u ( a, a ) Player 2 is short-run

More information

Exponential Family and Maximum Likelihood, Gaussian Mixture Models and the EM Algorithm. by Korbinian Schwinger

Exponential Family and Maximum Likelihood, Gaussian Mixture Models and the EM Algorithm. by Korbinian Schwinger Exponential Family and Maximum Likelihood, Gaussian Mixture Models and the EM Algorithm by Korbinian Schwinger Overview Exponential Family Maximum Likelihood The EM Algorithm Gaussian Mixture Models Exponential

More information

A Few Notes on Fisher Information (WIP)

A Few Notes on Fisher Information (WIP) A Few Notes on Fisher Information (WIP) David Meyer dmm@{-4-5.net,uoregon.edu} Last update: April 30, 208 Definitions There are so many interesting things about Fisher Information and its theoretical properties

More information

Gaussian Process Approximations of Stochastic Differential Equations

Gaussian Process Approximations of Stochastic Differential Equations Gaussian Process Approximations of Stochastic Differential Equations Cédric Archambeau Dan Cawford Manfred Opper John Shawe-Taylor May, 2006 1 Introduction Some of the most complex models routinely run

More information

The Expectation Maximization or EM algorithm

The Expectation Maximization or EM algorithm The Expectation Maximization or EM algorithm Carl Edward Rasmussen November 15th, 2017 Carl Edward Rasmussen The EM algorithm November 15th, 2017 1 / 11 Contents notation, objective the lower bound functional,

More information

If there exists a threshold k 0 such that. then we can take k = k 0 γ =0 and achieve a test of size α. c 2004 by Mark R. Bell,

If there exists a threshold k 0 such that. then we can take k = k 0 γ =0 and achieve a test of size α. c 2004 by Mark R. Bell, Recall The Neyman-Pearson Lemma Neyman-Pearson Lemma: Let Θ = {θ 0, θ }, and let F θ0 (x) be the cdf of the random vector X under hypothesis and F θ (x) be its cdf under hypothesis. Assume that the cdfs

More information

Game Theory. Solutions to Problem Set 4

Game Theory. Solutions to Problem Set 4 1 Hotelling s model 1.1 Two vendors Game Theory Solutions to Problem Set 4 Consider a strategy pro le (s 1 s ) with s 1 6= s Suppose s 1 < s In this case, it is pro table to for player 1 to deviate and

More information

Statistics, Data Analysis, and Simulation SS 2013

Statistics, Data Analysis, and Simulation SS 2013 Statistics, Data Analysis, and Simulation SS 2013 08.128.730 Statistik, Datenanalyse und Simulation Dr. Michael O. Distler Mainz, May 21, 2013 3. Parameter estimation 1 Consistency:

More information

Introduction to Statistical Learning Theory

Introduction to Statistical Learning Theory Introduction to Statistical Learning Theory In the last unit we looked at regularization - adding a w 2 penalty. We add a bias - we prefer classifiers with low norm. How to incorporate more complicated

More information

An IDL Based Image Deconvolution Software Package

An IDL Based Image Deconvolution Software Package An IDL Based Image Deconvolution Software Package F. Városi and W. B. Landsman Hughes STX Co., Code 685, NASA/GSFC, Greenbelt, MD 20771 Abstract. Using the Interactive Data Language (IDL), we have implemented

More information

DIGITAL image processing has remarkably developed

DIGITAL image processing has remarkably developed IEEE TRANSACTION ON IMAGE PROCESSING SUBMITTED VERSION, OCT. 3 Statistical Model of Quantized DCT Coefficients : Application in the Steganalysis of Jsteg Algorithm Thanh Hai Thai, Rémi Cogranne, Florent

More information

Lecture 7 Introduction to Statistical Decision Theory

Lecture 7 Introduction to Statistical Decision Theory Lecture 7 Introduction to Statistical Decision Theory I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 20, 2016 1 / 55 I-Hsiang Wang IT Lecture 7

More information

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy

More information