Advanced Statistical Steganalysis

von: Rainer Böhme

Springer-Verlag, 2010

ISBN: 9783642143137 , 288 Seiten

Format: PDF, OL

Kopierschutz: Wasserzeichen

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 149,79 EUR

Mehr zum Inhalt

Advanced Statistical Steganalysis


 

Foreword

Foreword

Acknowledgements

Acknowledgements

Contents

Contents

Chapter 1 Introduction

17

1.1 Steganography and Steganalysis as Empirical Sciences

17

1.2 Objective and Approach

18

1.3 Outline

20

Part I Background and Advances in Theory

24

Chapter 2 Principles of Modern Steganography and Steganalysis

25

2.1 Digital Steganography and Steganalysis

25

2.1.1 Steganographic System

26

2.1.2 Steganalysis

27

2.1.3 Relevance in Social and Academic Contexts

27

2.2 Conventions

28

2.3 Design Goals and Metrics

31

2.3.1 Capacity

31

2.3.2 Steganographic Security

32

2.3.3 Robustness

35

2.3.4 Further Metrics

36

2.4 Paradigms for the Design of Steganographic Systems

36

2.4.1 Paradigm I: Modify with Caution

36

2.4.2 Paradigm II: Cover Generation

37

2.4.3 Dominant Paradigm

39

2.5 Adversary Models

40

2.5.1 Passive Warden

40

2.5.2 Active Warden

42

2.6 Embedding Domains

44

2.6.1 Artificial Channels

44

2.6.2 Spatial and Time Domains

45

2.6.3 Transformed Domain

45

2.6.4 Selected Cover Formats: JPEG and MP3

49

2.6.4.1 Essentials of JPEG Still Image Compression

49

2.6.4.2 Essentials of MP3 Audio Compression

51

2.6.5 Exotic Covers

52

2.7 Embedding Operations

53

2.7.1 LSB Replacement

54

2.7.2 LSB Matching (±1)

55

2.7.3 Mod-k Replacement, Mod-k Matching, and Generalisations

59

2.7.4 Multi-Sample Rules

61

2.7.5 Adaptive Embedding

62

2.8 Protocols and Message Coding

63

2.8.1 Public-Key Steganography

64

2.8.2 Maximising Embedding Efficiency

67

2.8.2.1 Embedding Efficiency with Respect to the Number of Changes

67

2.8.2.2 Embedding Efficiency with Respect to the Severity of Changes

69

2.8.2.3 Summary

71

2.9 Specific Detection Techniques

71

2.9.1 Calibration of JPEG Histograms

71

2.9.2 Universal Detectors

74

2.9.3 Quantitative Steganalysis

77

2.10 Selected Estimators for LSB Replacement in Spatial Domain Images

78

2.10.1 RS Analysis

78

2.10.2 Sample Pair Analysis

81

2.10.3 Higher-Order Structural Steganalysis

83

2.10.3.1 Least-Squares Solutions to SPA

84

2.10.3.2 Maximum-Likelihood Solutions to SPA

84

2.10.3.3 Triples and Quadruples Analysis

85

2.10.4 Weighted Stego Image Steganalysis

87

2.11 Summary and Further Steps

90

Chapter 3 Towards a Theory of Cover Models

92

3.1 Steganalyst's Problem Formalised

92

3.1.1 The Plausibility Heuristic

92

3.1.2 Application to Digital Steganography

94

3.1.3 Incognisability of the Cover Distribution

96

3.2 Cover Models

97

3.2.1 Defining Cover Models

97

3.2.2 Options for Formulating Cover Models

99

3.2.3 Cover Models and Detection Performance (by Example)

3.2.3 Cover Models and Detection Performance (by Example)

3.2.4 Summary and Motivations for Studying Cover Models

105

3.3 Dealing with Heterogeneous Cover Sources

106

3.3.1 Mixture Distributions

108

3.3.2 The Mixture Cover Model

108

3.4 Relation to Prior Information-Theoretic Work

110

3.4.1 Theoretical Limits

111

3.4.2 Observability Bounds

112

3.4.3 Computational Bounds

114

3.4.4 Applicability of the Theory of Cover Models

115

3.4.5 Indeterminacy in the Cover

117

3.5 Instances of Cover Models for Heterogeneous Sources

119

3.6 Summary

120

Part II Specific Advances in Steganalysis

122

Chapter 4 Detection of Model-Based Steganography with First-Order Statistics

123

4.1 Fundamentals of Model-Based Steganography

123

4.2 MB1: An Embedding Function for JPEG Covers

126

4.3 Detection Method

129

4.4 Experimental Validation

132

4.5 Summary and Outlook

135

4.5.1 Limitations and Future Directions for MB1Steganalysis

136

4.5.2 Possible (Short-Term) Countermeasures

137

4.5.3 Implications for More Secure Steganography

138

Chapter 5 Models of Heterogeneous Covers for Quantitative Steganalysis

139

5.1 Metrics for Quantitative Steganalysis

140

5.1.1 Conventional Metrics

140

5.1.2 Improved Metrics Based on a Distribution Model

142

5.1.3 Decomposition of Estimation Errors

147

5.1.3.1 Shape of the Error Distribution Components

148

5.1.3.2 Relative Size of Cover-Specific and Message-Specific Errors

151

5.2 Measurement of Sensitivity to Cover Properties

153

5.2.1 Method

154

5.2.2 Modelling the Shape of the Between-Image Distribution

156

5.2.3 Modelling the Shape of the Within-Image Distribution

160

5.3 Summary and Conclusion

163

6 Improved Weighted Stego Image Steganalysis

166

6.1 Enhanced WS for Never-Compressed Covers

166

6.1.1 Enhanced Predictor

167

6.1.2 Enhanced Calculation of Weights

172

6.1.3 Enhanced Bias Correction

177

6.1.4 Experimental Results

177

6.2 Adaptation of WS to JPEG Pre-Compressed Covers

183

6.2.1 Improved Predictor

184

6.2.2 Estimation of the Cover's JPEG Compression Quality

187

6.2.3 Experimental Results

188

6.3 Summary and Outlook

193

Chapter 7 Using Encoder Artefacts for Steganalysis of Compressed Audio Streams

194

7.1 MP3 Steganography and Steganalysis

194

7.1.1 Problem Statement in the Mixture Cover Model Framework

196

7.1.2 Level of Analysis and Related Work

196

7.1.3 Method

198

7.2 Description of Features

200

7.2.1 Features Based on the Compression Size Control Mechanism

201

7.2.2 Features Based on Model Decisions

203

7.2.3 Features Based on Capability Usage

205

7.2.4 Feature Based on Stream Formatting

206

7.3 Experimental Results for Encoder Detection

207

7.3.1 Single-Compressed Audio Files

207

7.3.2 Importance of Individual Features

210

7.3.3 Influence of Double-Compression

210

7.4 Experimental Results for Improved Steganalysis

212

7.5 Explorative Analysis of Encoder Similarities

213

7.6 Summary and Discussion

215

7.6.1 Limitations and Future Directions

215

7.6.2 Transferability to Other Formats

216

7.6.3 Related Applications

217

Part III Synthesis

218

Chapter 8 General Discussion

219

8.1 Summary of Results

219

8.1.1 Results Based on Informal Arguments

219

8.1.2 Results Based on Mathematical Proofs

220

8.1.3 Results Based on Empirical Evidence

221

8.2 Limitations

222

8.3 Directions for Future Research

223

8.3.1 Theoretical Challenges

224

8.3.2 Empirical Challenges

224

8.3.3 Practical Challenges

225

8.4 Conclusion and Outlook

225

Appendix A Description of Covers Used in the Experiments

228

Appendix B Spurious Steganalysis Results Using the `van Hateren' Image Database

231

Appendix C Proof of Weighted Stego Image (WS) Estimator

235

Appendix D Derivation of Linear Predictor for Enhanced WS

236

Appendix E Game for Formal Security Analysis

238

Appendix F Derivation of ROC Curves and AUC Metric for Example Cover Models

240

Appendix G Supplementary Figures and Tables

242

References

252

List of Tables

271

List of Figures

273

List of Acronyms

275

List of Symbols

278

List of Functions

283

Index

285