Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash 99 tok/s
Gemini 2.5 Pro 48 tok/s Pro
GPT-5 Medium 36 tok/s
GPT-5 High 40 tok/s Pro
GPT-4o 99 tok/s
GPT OSS 120B 461 tok/s Pro
Kimi K2 191 tok/s Pro
2000 character limit reached

SUDS: Sanitizing Universal and Dependent Steganography (2309.13467v1)

Published 23 Sep 2023 in cs.CR and cs.LG

Abstract: Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic mediums include images, text, audio, and video, this communication method is being increasingly used by bad actors to propagate malware, exfiltrate data, and discreetly communicate. Current protection mechanisms rely upon steganalysis, or the detection of steganography, but these approaches are dependent upon prior knowledge, such as steganographic signatures from publicly available tools and statistical knowledge about known hiding methods. These dependencies render steganalysis useless against new or unique hiding methods, which are becoming increasingly common with the application of deep learning models. To mitigate the shortcomings of steganalysis, this work focuses on a deep learning sanitization technique called SUDS that is not reliant upon knowledge of steganographic hiding techniques and is able to sanitize universal and dependent steganography. SUDS is tested using least significant bit method (LSB), dependent deep hiding (DDH), and universal deep hiding (UDH). We demonstrate the capabilities and limitations of SUDS by answering five research questions, including baseline comparisons and an ablation study. Additionally, we apply SUDS to a real-world scenario, where it is able to increase the resistance of a poisoned classifier against attacks by 1375%.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (22)
  1. https://papers.nips.cc/paper/2017/file/838e8afb1ca34354ac209f53d90c3a43-Paper.pdf.
  2. https://dl.acm.org/doi/abs/10.5555/1869956.
  3. https://ieeexplore.ieee.org/document/6197267.
  4. https://link.springer.com/chapter/10.1007/978-3-642-24178-9_6.
  5. https://ieeexplore.ieee.org/document/4655281.
  6. Kaspersky. Kaspersky lab identifies worrying trend in hackers using steganography, 2017. https://usa.kaspersky.com/about/press-releases/2017_kaspersky-lab-identifies-worrying-trend-in-hackers-using-steganography.
  7. http://profs.scienze.univr.it/~giaco/download/Watermarking-Obfuscation/Steganography\%20for\%20the\%20Computer\%20Forensics\%20Examiner.pdf.
  8. https://ieeexplore.ieee.org/document/228224.
  9. https://ieeexplore.ieee.org/document/9157561.
  10. https://link.springer.com/chapter/10.1007/978-3-031-21920-7_4.
  11. https://ieeexplore.ieee.org/document/5437325.
  12. https://link.springer.com/chapter/10.1007/978-3-319-16745-9_27.
  13. https://ieeexplore.ieee.org/document/9205850.
  14. https://ieeexplore.ieee.org/document/8017430.
  15. https://doi.org/10.1117/12.2559429.
  16. https://link.springer.com/chapter/10.1007/978-3-030-04179-3_22.
  17. https://ieeexplore.ieee.org/document/8954203.
  18. https://link.springer.com/chapter/10.1007/978-3-030-43575-2_1.
  19. https://ieeexplore.ieee.org/abstract/document/8735922.
  20. https://proceedings.neurips.cc/paper/2020/file/73d02e4344f71a0b0d51a925246990e7-Paper.pdf.
  21. https://link.springer.com/chapter/10.1007/978-3-030-01267-0_40.
  22. https://ceur-ws.org/Vol-2940/paper31.pdf.
Citations (2)
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-up Questions

We haven't generated follow-up questions for this paper yet.