Errorless Robust JPEG Steganography using Outputs of JPEG Coders (2211.04750v2)
Abstract: Robust steganography is a technique of hiding secret messages in images so that the message can be recovered after additional image processing. One of the most popular processing operations is JPEG recompression. Unfortunately, most of today's steganographic methods addressing this issue only provide a probabilistic guarantee of recovering the secret and are consequently not errorless. That is unacceptable since even a single unexpected change can make the whole message unreadable if it is encrypted. We propose to create a robust set of DCT coefficients by inspecting their behavior during recompression, which requires access to the targeted JPEG compressor. This is done by dividing the DCT coefficients into 64 non-overlapping lattices because one embedding change can potentially affect many other coefficients from the same DCT block during recompression. The robustness is then combined with standard steganographic costs creating a lattice embedding scheme robust against JPEG recompression. Through experiments, we show that the size of the robust set and the scheme's security depends on the ordering of lattices during embedding. We verify the validity of the proposed method with three typical JPEG compressors and the {\it Slack} instant messaging application. We benchmark its security for various embedding payloads, three different ways of ordering the lattices, and a range of Quality Factors. Finally, this method is errorless by construction, meaning the embedded message will always be readable.
- V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, no. 1, pp. 1–13, 2014.
- L. Guo, J. Ni, W. Su, C. Tang, and Y.-Q. Shi, “Using statistical image model for jpeg steganography: Uniform embedding revisited,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 12, pp. 2669–2680, 2015.
- Q. Giboulot, R. Cogranne, and P. Bas, “Detectability-based JPEG steganography modeling the processing pipeline: the noise-content trade-off,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2202–2217, Jan. 2021. [Online]. Available: https://hal.archives-ouvertes.fr/hal-03096658
- C. Kin-Cleaves and A. D. Ker, “Adaptive steganography in the noisy channel with dual-syndrome trellis codes,” in 2018 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2018, pp. 1–7.
- Y. Zhang, X. Luo, C. Yang, D. Ye, and F. Liu, “A framework of adaptive steganography resisting jpeg compression and detection,” Security and Communication Networks, vol. 9, no. 15, pp. 2957–2971, 2016.
- J. Tao, S. Li, X. Zhang, and Z. Wang, “Towards robust image steganography,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 2, pp. 594–600, 2018.
- W. Lu, J. Zhang, X. Zhao, W. Zhang, and J. Huang, “Secure robust jpeg steganography based on autoencoder with adaptive bch encoding,” IEEE Transactions on Circuits and Systems for Video Technology, 2020.
- Z. Zhao, Q. Guan, H. Zhang, and X. Zhao, “Improving the robustness of adaptive steganographic algorithms based on transport channel matching,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 7, pp. 1843–1856, 2018.
- K. Zeng, K. Chen, W. Zhang, Y. Wang, and N. Yu, “Improving robust adaptive steganography via minimizing channel errors,” Signal Processing, vol. 195, p. 108498, 2022.
- X. Wu, T. Qiao, Y. Chen, M. Xu, N. Zheng, and X. Luo, “Sign steganography revisited with robust domain selection,” Signal Processing, vol. 196, p. 108522, 2022.
- F. Cayre and P. Bas, “Kerckhoffs-based embedding security classes for WOA data-hiding,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, March 2008.
- T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” Information Forensics and Security, IEEE Transactions on, vol. 6, no. 3, pp. 920–935, 2011.
- W. Luo, G. L. Heileman, and C. E. Pizano, “Fast and robust watermarking of jpeg files,” in Proceedings Fifth IEEE Southwest Symposium on Image Analysis and Interpretation. IEEE, 2002, pp. 158–162.
- T. Qiao, S. Wang, X. Luo, and Z. Zhu, “Robust steganography resisting jpeg compression by improving selection of cover element,” Signal Processing, vol. 183, p. 108048, 2021.
- Y. Zhang, X. Luo, J. Wang, C. Yang, and F. Liu, “A robust image steganography method resistant to scaling and detection,” Journal of Internet Technology, vol. 19, no. 2, pp. 607–618, 2018.
- L. Zhu, X. Luo, Y. Zhang, C. Yang, and F. Liu, “Inverse interpolation and its application in robust image steganography,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 6, pp. 4052–4064, 2021.
- A. Castiglione, G. Cattaneo, and A. De Santis, “A forensic analysis of images on online social networks,” in 2011 third international conference on intelligent networking and collaborative systems. IEEE, 2011, pp. 679–684.
- R. Caldelli, R. Becarelli, and I. Amerini, “Image origin classification based on social network provenance,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1299–1308, 2017.
- J. Butora and J. Fridrich, “Revisiting perturbed quantization,” in Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security, 2021, pp. 125–136.
- P. Bas, T. Pevny, and T. Filler, “Bossbase,” http://exile.felk.cvut.cz/boss, May 2011.
- V. Holub and J. Fridrich, “Low-complexity features for jpeg steganalysis using undecimated dct,” IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219–228, 2015.
- R. Cogranne, V. Sedighi, J. Fridrich, and T. Pevnỳ, “Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?” in Information Forensics and Security (WIFS), 2015 IEEE International Workshop on. IEEE, 2015, pp. 1–6.
- J. Butora and J. Fridrich, “Effect of jpeg quality on steganographic security,” in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019, pp. 47–56.
- M. Boroumand, M. Chen, and J. Fridrich, “Deep residual network for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181–1193, 2018.
- J. Butora, Y. Yousfi, and J. Fridrich, “How to pretrain for steganalysis,” in Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security, 2021, pp. 143–148.