Investigation of Digital Image Preprocessing Methods Influence on the Accuracy of Stego Images Detection
DOI:
https://doi.org/10.20535/RADAP.2022.89.54-60Keywords:
steganalysis, stego image preprocessing methods, digital imagesAbstract
The feature of modern methods of detecting unauthorized transmission of confidential data in communication systems is widespread usage of pre-processing methods for transmitted files, such as digital images. The purpose of these methods is to detect weak changes of cover image's statistical parameters cauased by message hiding. A significant number of these methods are based on usage of ensembles of high-pass filters, which allows to ensure high accuracy of detection of steganograms (more than 95%) formed according to known steganographic methods. However, a significant limitation of the practical application of these methods is high computational complexity of ensemble forming procedure that minimizes the detection error of stego images. This makes it impossible to quickly reconfigure stegdetectors to detect stego images formed according to a priori unknown embedding methods. Therefore, it is of special interest to develop fast methods for image pre-processing, which can reliably detect weak changes of cover's statistical parameters under limited a priori information about used steganographic method. The work is devoted to the study of the achievable accuracy of the stedetector with variations type and parameters of digital images pre-processing methods. According to the results of the study, the optimal methods of pre-processing image to minimize the detection error of stego images are proposed. These methods can significantly (up to 9 times) reduce the error of stego images detection compared to modern pre-processing methods, even in the most difficult case of low payload of cover image (less than 10%) and limited a priori data about used embedding method. It is revealed that usage of special types of image pre-processing methods, namely denoising autoencoders, allows to bring the accuracy of a stegdetector closer to the proposed estimations of achievable accuracy of stegodetectors.
References
References
Hassaballah M. (2020) Digital Media Steganography: Principles, Algorithms, and Advances, Academic Press, 386 p., ISBN: 978-0128194386.
Goodfellow I., Bengio Y. and Courville A. (2016) Deep Learning, The MIT Press, 800 p., ISBN: 978-0262035613.
Boroumand M., Chen M. and Fridrich J. (2019). Deep Residual Network for Steganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, Vol 14, No. 5, p. 1181-1193, DOI: 10.1109/TIFS.2018.2871749.
Tabares-Soto R., Arteaga-Arteaga H. B., Bravo-Ortiz M. A., Mora-Rubio A., Arias-Garzón D., Alzate-Grisales J. A., Burbano-Jacome A. B., Orozco-Arias S., Isaza G. and Ramos-Pollán R. (2021). GBRAS-Net: A Convolutional Neural Network Architecture for Spatial Image Steganalysis. IEEE Access, Vol 9, p. 14340-14350. DOI: 10.1109/ACCESS.2021.3052494.
Cohen A., Cohen A. and Nissim N. (2020). ASSAF: Advanced and Slim StegAnalysis Detection Framework for JPEG images based on deep convolutional denoising autoencoder and Siamese networks. Neural Networks, Vol 131, p. 64-77. DOI: 10.1016/j.neunet.2020.07.022.
Denemark T., Sedihi V., Holub V., Cogranne R. and Fridrich J. (2014). Selection-channel-aware rich model for Steganalysis of digital images. International Workshop on Information Forensics and Security, Atlanta, USA. DOI: 10.1109/WIFS.2014.7084302.
Kodovsky J. and Fridrich J. (2009) Calibration revisited, 11th ACM workshop on Multimedia and security, ACM, p. 63-74, DOI: 10.1145/1597817.1597830.
Kodovsky J., Fridrich J. and Holub V. (2011) Ensemble Classifiers for Steganalysis of Digital Media. IEEE Transactions on Information Forensics and Security, Vol. 7, Issue 2, p. 432-444, DOI: 10.1109/TIFS.2011.2175919.
Progonov D. (2021) Statistical stegdetectors performance by message re-embedding. Theoretical and Applied Cybersecurity, Vol.3, No. 1, p. 5-14. DOI: 10.20535/tacs.2664-29132021.1.251291.
Progonov D.O. (2021) Effectiveness of stego images pre-noising with fractional noise for digital image steganalysis. Applied Aspects of Information Technology, Vol. 4, issue 3, p. 261-270, DOI: 10.15276/aait.03.2021.5.
Cogranne R., Giboulot Q. and P. Bas. (2019) The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis. ACM Workshop on Information Hiding and Multimedia Security, New York, USA, p. 125-137, DOI: 10.1145/3335203.3335726.
Filler T. and Fridrich J. (2010) Gibbs Construction in Steganography. IEEE Transactions on Information Forensics and Security, Vol. 5, Issue 4, p. 705-720, DOI: 10.1109/TIFS.2010.2077629.
Sedighi V., Cogranne R. and Fridrich J. (2015) Content-Adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, Vol. 11, Issue 2, DOI: 10.1109/TIFS.2015.2486744.
Progonov D. (2020) Performance of Statistical Stegdetectors in Case of Small Number of Stego Images in Training Set. IEEE International Scientific-Practical Conference ``Problems of Infocommunications Science and Technology'', Kharkiv, Ukraine, DOI:10.1109/PICST51311.2020.9467901.
Pevny T., Bas P. and Fridrich J. (2010) Steganalysis by Subtractive Pixel Adjacency Matrix. IEEE Transactions on Information Forensics and Security, Vol. 5, Issue 2, p. 215-224, DOI: 10.1109/TIFS.2010.2045842.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Дмитро Прогонов
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).