Complete characterization of perfectly secure stego-systems with mutually independent embedding operation

Similar documents
Fisher Information Determines Capacity of ε-secure Steganography

Imperfect Stegosystems

Information Hiding and Covert Communication

Detection of Content Adaptive LSB Matching (a Game Theory Approach)

The Square Root Law of Steganographic Capacity

Detection of Content Adaptive LSB Matching (a Game Theory Approach)

Detection of Content Adaptive LSB Matching (a Game Theory Approach)

Quantitative Steganalysis of LSB Embedding in JPEG Domain

Generalized Transfer Component Analysis for Mismatched Jpeg Steganalysis

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT

IMPERFECT STEGOSYSTEMS ASYMPTOTIC LAWS AND NEAR-OPTIMAL PRACTICAL CONSTRUCTIONS

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

STEGANOGRAPHIC CAPACITY OF LOCALLY UNIFORM MARKOV COVERS

Improving Selection-Channel-Aware Steganalysis Features

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich

Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization

Detecting LSB Matching by Applying Calibration Technique for Difference Image

Theoretical Model of the FLD Ensemble Classifier Based on Hypothesis Testing Theory

Quantitative Structural Steganalysis of Jsteg

Optimal Detection of OutGuess using an Accurate Model of DCT Coefficients

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION

ROC Curves for Steganalysts

LECTURE 3. Last time:

A Study of Embedding Operations and Locations for Steganography in H.264 Video

New Steganographic scheme based of Reed- Solomon codes

Low Complexity Features for JPEG Steganalysis Using Undecimated DCT

Steganalysis with a Computational Immune System

Content-Adaptive Steganography by Minimizing Statistical Detectability

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding

Information Theory. Lecture 5 Entropy rate and Markov sources STEFAN HÖST

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

JPEG-Compatibility Steganalysis Using Block-Histogram of Recompression Artifacts

Perturbed Quantization Steganography

Information Hiding. Andrew D. Ker. 10 Lectures, Hilary Term (complete) Department of Computer Science, Oxford University

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

MPSteg-color: a new steganographic technique for color images

On LSB Spatial Domain Steganography and Channel Capacity

Wet Paper Codes with Improved Embedding Efficiency

(Classical) Information Theory II: Source coding

Steganography via Codes for Memory with Defective Cells

Steganalysis of ±k Steganography based on Noncausal Linear Predictor

Lecture 10: Broadcast Channel and Superposition Coding

Information similarity metrics in information security and forensics

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

STEGANOGRAPHY is the art and science of communicating

Benchmarking for Steganography

Stego key searching for LSB steganography on JPEG decompressed image

Adaptive Steganography and Steganalysis with Fixed-Size Embedding

STEGANOGRAPHY is the practice and study of techniques

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Constructing good covering codes for applications in Steganography

Capacity-Approaching Codes for Reversible Data Hiding

USING MULTIPLE RE-EMBEDDINGS FOR QUANTITATIVE STEGANALYSIS AND IMAGE RELIABILITY ESTIMATION

ML Detection of Steganography

CONTENT ADAPTIVE STEGANOGRAPHY DESIGN AND DETECTION

IEEE COPYRIGHT AND CONSENT FORM

LECTURE 13. Last time: Lecture outline

2. Definition & Classification

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

Lecture 4 Noisy Channel Coding

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST

An information-theoretic model for steganography

Stochastic processes. MAS275 Probability Modelling. Introduction and Markov chains. Continuous time. Markov property

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit

Convex Optimization CMU-10725

Lecture 5 Channel Coding over Continuous Channels

An Information-Theoretic Model for Steganography

Computer Vision Group Prof. Daniel Cremers. 11. Sampling Methods: Markov Chain Monte Carlo

Variations. ECE 6540, Lecture 10 Maximum Likelihood Estimation

Introduction to Machine Learning CMU-10701

Review (Probability & Linear Algebra)

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

Reverse Edge Cut-Set Bounds for Secure Network Coding

The Method of Types and Its Application to Information Hiding

Coding into a source: an inverse rate-distortion theorem

On Dangers of Overtraining Steganography to Incomplete Cover Model

Discrete Memoryless Channels with Memoryless Output Sequences

The Particle Filter. PD Dr. Rudolph Triebel Computer Vision Group. Machine Learning for Computer Vision

Note that in the example in Lecture 1, the state Home is recurrent (and even absorbing), but all other states are transient. f ii (n) f ii = n=1 < +

Computing and Communications 2. Information Theory -Entropy

Applied public-key steganography

No. of dimensions 1. No. of centers

1 Complete Statistics

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography

x log x, which is strictly convex, and use Jensen s Inequality:

Optimized Feature Extraction for Learning-Based Image Steganalysis

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions

Hiding Data in a QImage File

AS A TECHNIQUE that embeds the secret message

LECTURE NOTES: Discrete time Markov Chains (2/24/03; SG)

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

1: Introduction to Lattices

ECE 4400:693 - Information Theory

Complex Systems Methods 2. Conditional mutual information, entropy rate and algorithmic complexity

On the Secrecy Capacity of Fading Channels

A Universal Divergence-Rate Estimator for Steganalysis in Timing Channels

Steganalysis in JPEG

Transcription:

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York IEEE ICASSP 2009, Taipei, Taiwan

Steganography Steganography is a mode of covert communication. message m message m cover X Emb( ) stego Y Ext( ) key k channel with passive warden key k X and Y are r.v. on X n not necessarily i.i.d. Emb( ), Ext( )... embedding, extraction functions Perfectly secure stegosystem (Cachin): Cover distribution P and stego distrib. Q satisfy D KL (P Q) = 0 Filler, Fridrich Complete characterization of perfectly secure stego-systems... 2 of 14

Mutually Independent Embedding Operation Emb( ) is a probabilistic mapping acting on each cover element (pixel, DCT,...) independently - MI embedding. Pr(Y l = j X l = i) = b ij (β) X l... l-th cover element Y l... l-th stego element β... change rate (rel. payload) Matrix B = (b ij ) is stochastic (rows are pmfs) for all β 0. LSB embedding: F5: 1 2 B = 3 4 B = 5 6 = 1 β = β = 1 Filler, Fridrich Complete characterization of perfectly secure stego-systems... 3 of 14

Perfectly Secure Cover Source Cover source is perfectly secure w.r.t. given MI embedding the resulting stegosystem is perfectly secure. Filler, Fridrich Complete characterization of perfectly secure stego-systems... 4 of 14

Our Contribution P... cover distr. Q β... stego distr. with change rate β Given specific MI embedding (matrix B): 1 Complete characterization of perfecly secure cover sources w.r.t. B. 2 Cover source is perfectly secure iff I(0) = 2 D KL (P Q β ) β 2 β=0 = 0. In general D KL (P Q β ) = 0 I(0) = 0 Filler, Fridrich Complete characterization of perfectly secure stego-systems... 5 of 14

(1) Complete characterization of perfectly secure cover distributions

Perfectly Secure Covers w.r.t. MI embedding Invariant distributions of MI embedding: Matrix B is stochastic has k 1 left eigenvectors (invariant distributions) π (a), a {1,...,k} to 1, π (a) B = π (a). Filler, Fridrich Complete characterization of perfectly secure stego-systems... 7 of 14

Perfectly Secure Covers w.r.t. MI embedding Invariant distributions of MI embedding: Matrix B is stochastic has k 1 left eigenvectors (invariant distributions) π (a), a {1,...,k} to 1, π (a) B = π (a). Example (perfectly secure cover): If P(X 1 = i,x 2 = j) = π (a), then P is perfectly secure. i π (a ) i Filler, Fridrich Complete characterization of perfectly secure stego-systems... 7 of 14

Perfectly Secure Covers w.r.t. MI embedding Invariant distributions of MI embedding: Matrix B is stochastic has k 1 left eigenvectors (invariant distributions) π (a), a {1,...,k} to 1, π (a) B = π (a). Example (perfectly secure cover): If P(X 1 = i,x 2 = j) = π (a), then P is perfectly secure. i π (a ) i Elements distributed independently with some invariant distribution form perfectly secure cover source. Set of all perfectly secure distributions form convex hull. We know at least k n linearly independent perfectly secure cover sources on n elements. Filler, Fridrich Complete characterization of perfectly secure stego-systems... 7 of 14

Perfectly Secure Covers w.r.t. MI embedding Invariant distributions of MI embedding: Matrix B is stochastic has k 1 left eigenvectors (invariant distributions) π (a), a {1,...,k} to 1, π (a) B = π (a). Example (perfectly secure cover): If P(X 1 = i,x 2 = j) = π (a), then P is perfectly secure. i π (a ) i Elements distributed independently with some invariant distribution form perfectly secure cover source. Set of all perfectly secure distributions form convex hull. We know at least k n linearly independent perfectly secure cover sources on n elements. Do we know all of them? Filler, Fridrich Complete characterization of perfectly secure stego-systems... 7 of 14

Perfectly Secure Covers - Main Result k... number of invariant distributions of given MI embedding Theorem (Mutually independent embedding) There are exactly k n linearly independent perfectly secure probability distributions P on n-element covers. Every perfectly secure probability distribution P w.r.t. B can be obtained by a convex linear combination of k n linearly independent perfectly secure distributions. Filler, Fridrich Complete characterization of perfectly secure stego-systems... 8 of 14

Perfectly Secure Covers - Main Result k... number of invariant distributions of given MI embedding Theorem (Mutually independent embedding) There are exactly k n linearly independent perfectly secure probability distributions P on n-element covers. Every perfectly secure probability distribution P w.r.t. B can be obtained by a convex linear combination of k n linearly independent perfectly secure distributions. Corollary (MI embedding in stationary covers) There are exactly k linearly independent perfectly secure probability distributions P on n-element covers. These sources are i.i.d. with some invariant distribution π (a). Filler, Fridrich Complete characterization of perfectly secure stego-systems... 8 of 14

Perfectly Secure Covers - Example LSB embedding: = 1 β 1 2 B = = β 3 4 5 6 Left unit eigenvectors of B (invariant distributions): π (1) = ( 1 2, 1 2,0,0,0,0), π(2) = (0,0, 1 2, 1 2,0,0), π(3) = (0,0,0,0, 1 2, 1 2 ) k = 3 π (a) B = π (a) Perfectly secure cover w.r.t. LSB embedding must be independent with evened out histogram bins. Filler, Fridrich Complete characterization of perfectly secure stego-systems... 9 of 14

(2) Fisher Information and perfectly secure cover distributions

Perfect Security and Fisher Information P... cover distr. Q β... stego distr. with change rate β Observation: If P is perfectly secure w.r.t. B, then I(0) = 0. D KL (P Q β ) = D KL (Q 0 Q β ) = 1 2 I(0) β2 +O(β 3 ) Fisher Information (w.r.t. change rate β): [ ] I(0) = E P β logq 2 2 D KL (P Q β ) β(y ) β = 0 = β 2 β=0 I(0) is related to quantitative steganalysis (Cramer-Rao LB). What can we say about security of P w.r.t. B if I(0) = 0? Filler, Fridrich Complete characterization of perfectly secure stego-systems... 11 of 14

Perfect Security and Fisher Information P... cover distr. Q β... stego distr. with change rate β Observation: If P is perfectly secure w.r.t. B, then I(0) = 0. D KL (P Q β ) = D KL (Q 0 Q β ) = 1 2 I(0) β2 +O(β 3 ) Fisher Information (w.r.t. change rate β): [ ] I(0) = E P β logq 2 2 D KL (P Q β ) β(y ) β = 0 = β 2 β=0 I(0) is related to quantitative steganalysis (Cramer-Rao LB). What can we say about security of P w.r.t. B if I(0) = 0? Nothing in general but a lot for MI embedding! Filler, Fridrich Complete characterization of perfectly secure stego-systems... 11 of 14

Fisher Information vs. Perfect Security Theorem (Fisher Information) There are exactly k n linearly independent probability distributions P on n-element covers satisfying I(0) = 0. These distributions are perfectly secure w.r.t. B. Every other probability distribution P satisfying I(0) = 0 can be obtained by convex linear combination of k n linearly independent perfectly secure distributions. Filler, Fridrich Complete characterization of perfectly secure stego-systems... 12 of 14

Fisher Information vs. Perfect Security Theorem (Fisher Information) There are exactly k n linearly independent probability distributions P on n-element covers satisfying I(0) = 0. These distributions are perfectly secure w.r.t. B. Every other probability distribution P satisfying I(0) = 0 can be obtained by convex linear combination of k n linearly independent perfectly secure distributions. Corollary (equivalent condition for perfect security) For arbitrary MI embedding and under no assumption about cover source I(0) = 0 D KL (P Q β ) = 0 Filler, Fridrich Complete characterization of perfectly secure stego-systems... 12 of 14

Application in Determining Steganographic Capacity Capacity of imperfect stegosystems with MI embedding only increases with the square root of the number of cover elements (pixels). Square Root Law of IMPERFECT steganography: 1 If nβ n n 0 then the stegosyst. are asymptotically secure. 2 If nβ n n + then arbitrarily accurate stego detectors exist. We used I(0) = 0 to exclude all perfectly secure covers. [Filler, Ker, Fridrich, The Square Root Law of Steganographic Capacity for Markov Covers, Proc. SPIE, 2009] Filler, Fridrich Complete characterization of perfectly secure stego-systems... 13 of 14

Conclusion and Future Directions Virtually all stegosystems use MI embedding in some appropriate domain (this makes our result relevant to most stegosystems). Perfectly secure covers form convex hull with known basis. Fisher information w.r.t. change rate is an equivalent perfect security descriptor is valuable tool for theoretical steganalysis (SRL) Future work: use Fisher information for benchmarking stegosystems. Filler, Fridrich Complete characterization of perfectly secure stego-systems... 14 of 14

Conclusion and Future Directions Virtually all stegosystems use MI embedding in some appropriate domain (this makes our result relevant to most stegosystems). Perfectly secure covers form convex hull with known basis. Fisher information w.r.t. change rate is an equivalent perfect security descriptor is valuable tool for theoretical steganalysis (SRL) Future work: use Fisher information for benchmarking stegosystems. Thank you! tomas.filler@binghamton.edu Filler, Fridrich Complete characterization of perfectly secure stego-systems... 14 of 14