Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

SUDS: Sanitizing Universal and Dependent Steganography (2309.13467v1)

Published 23 Sep 2023 in cs.CR and cs.LG

Abstract: Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic mediums include images, text, audio, and video, this communication method is being increasingly used by bad actors to propagate malware, exfiltrate data, and discreetly communicate. Current protection mechanisms rely upon steganalysis, or the detection of steganography, but these approaches are dependent upon prior knowledge, such as steganographic signatures from publicly available tools and statistical knowledge about known hiding methods. These dependencies render steganalysis useless against new or unique hiding methods, which are becoming increasingly common with the application of deep learning models. To mitigate the shortcomings of steganalysis, this work focuses on a deep learning sanitization technique called SUDS that is not reliant upon knowledge of steganographic hiding techniques and is able to sanitize universal and dependent steganography. SUDS is tested using least significant bit method (LSB), dependent deep hiding (DDH), and universal deep hiding (UDH). We demonstrate the capabilities and limitations of SUDS by answering five research questions, including baseline comparisons and an ablation study. Additionally, we apply SUDS to a real-world scenario, where it is able to increase the resistance of a poisoned classifier against attacks by 1375%.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (22)
  1. https://papers.nips.cc/paper/2017/file/838e8afb1ca34354ac209f53d90c3a43-Paper.pdf.
  2. https://dl.acm.org/doi/abs/10.5555/1869956.
  3. https://ieeexplore.ieee.org/document/6197267.
  4. https://link.springer.com/chapter/10.1007/978-3-642-24178-9_6.
  5. https://ieeexplore.ieee.org/document/4655281.
  6. Kaspersky. Kaspersky lab identifies worrying trend in hackers using steganography, 2017. https://usa.kaspersky.com/about/press-releases/2017_kaspersky-lab-identifies-worrying-trend-in-hackers-using-steganography.
  7. http://profs.scienze.univr.it/~giaco/download/Watermarking-Obfuscation/Steganography\%20for\%20the\%20Computer\%20Forensics\%20Examiner.pdf.
  8. https://ieeexplore.ieee.org/document/228224.
  9. https://ieeexplore.ieee.org/document/9157561.
  10. https://link.springer.com/chapter/10.1007/978-3-031-21920-7_4.
  11. https://ieeexplore.ieee.org/document/5437325.
  12. https://link.springer.com/chapter/10.1007/978-3-319-16745-9_27.
  13. https://ieeexplore.ieee.org/document/9205850.
  14. https://ieeexplore.ieee.org/document/8017430.
  15. https://doi.org/10.1117/12.2559429.
  16. https://link.springer.com/chapter/10.1007/978-3-030-04179-3_22.
  17. https://ieeexplore.ieee.org/document/8954203.
  18. https://link.springer.com/chapter/10.1007/978-3-030-43575-2_1.
  19. https://ieeexplore.ieee.org/abstract/document/8735922.
  20. https://proceedings.neurips.cc/paper/2020/file/73d02e4344f71a0b0d51a925246990e7-Paper.pdf.
  21. https://link.springer.com/chapter/10.1007/978-3-030-01267-0_40.
  22. https://ceur-ws.org/Vol-2940/paper31.pdf.
Citations (2)

Summary

We haven't generated a summary for this paper yet.