IEEE-WVU, Anchorage - 2008  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Steganography Sami Dokheekh.
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
F5 A Steganographic Algorithm
F5 a Steganographic algorithm - andreas westfeld
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
A Matlab Playground for JPEG Andy Pekarske Nikolay Kolev.
An Introduction Steganography with A Case Study of Steganalysis
1 Outline  Introduction to JEPG2000  Why another image compression technique  Features  Discrete Wavelet Transform  Wavelet transform  Wavelet implementation.
Department of Computer Engineering University of California at Santa Cruz Data Compression (3) Hai Tao.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Watermarking For Image Authentication Presented by San-Hao Wang.
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Digital Watermarking Parag Agarwal
Compression is the reduction in size of data in order to save space or transmission time. And its used just about everywhere. All the images you get on.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Common file formats  Lesson Objective: Understanding common file formats and their differences.  Learning Outcome:  Describe the type of files which.
IEEE-WVU, Anchorage  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Introduction to Steganalysis Schemes Multimedia Security.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
JPEG - JPEG2000 Isabelle Marque JPEGJPEG2000. JPEG Joint Photographic Experts Group Committe created in 1986 by: International Organization for Standardization.
The task of compression consists of two components, an encoding algorithm that takes a file and generates a “compressed” representation (hopefully with.
Cryptographic Anonymity Project Alan Le
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
Information Systems Design and Development Media Types Computing Science.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
CHRIST COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE ENGINEERING AND TECHNOLOGY.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
File Compression 3.3.
JPEG Compression What is JPEG? Motivation
Security and Error Correction/Detection in 802.1x and GSM
Secret Message Sharing Using Online Social Media
Measures for Classification and Detection
File Compression 3.3.
Model-based Steganography
Steganography.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Visit for more Learning Resources
Steganography with Digital Images
High-capacity image hiding scheme based on vector quantization
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography Techniques and their use in Anonymity
Steganography in digital images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Partial reversible data hiding scheme using (7, 4) hamming code
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A Data Hiding Scheme Based Upon Block Truncation Coding
Presentation transcript:

IEEE-WVU, Anchorage  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult

IEEE-WVU, Anchorage  2 The Data Sets Two data sets are provided –PNG: lossless compression –JPEG: lossy compression Prevalence of images on the Internet –Sources: Google images, Yahoo Images, and Flickr

IEEE-WVU, Anchorage  3 Message Sizes For each tool, we provide four different embedding size: –Tiny: < 5% of the channel capacity –Small: > 5% & < 15% of the channel capacity –Medium: > 15% & < 40% of the channel capacity –Large: > 40% of the channel capacity For the PNG set, the message size is explicitly stated For the JPEG set, the message size is NOT stated

IEEE-WVU, Anchorage  4 Message Content Random bit sequences Snippets of mp3 songs Plain text Other images A B C

IEEE-WVU, Anchorage  5 Categories Each set consists of clean and stego images Clean set –Modified: cropping, overlay, object-appending –Non-modified: original Stego set –4 categories for JPEG, 3 categories for PNG, one for each tool

IEEE-WVU, Anchorage  6 Categories JPEG subcategories –Stego Animals Business Maps Natural Tourist Vacation –Clean Misc

IEEE-WVU, Anchorage  7 Clean Manipulated Images Object Appending Image Cropping Overlay

IEEE-WVU, Anchorage  8 PNG Tools Camaleão ( –Simple LSB insertion/modification software –Uses cyclic permutations and block ciphering to hide messages in LSBs SecurEngine ( download_4268.html) download_4268.html –Incorporates 5 crypto algorithms: Blowfish, Gost, Vernam, Cast256, and Mars –LSB encoding

IEEE-WVU, Anchorage  9 PNG Tools Stash-It ( –Windows based stego tool –Simple LSB insertion/modification software –No encryption feature

IEEE-WVU, Anchorage  10 JPEG Tools F5 ( –Resilient to  2 statistical attack –Instead of replacing LSBs directly, F5 decreases the absolute value of the DCT coefficients –Chooses DCT coefficients randomly –Matrix embedding JPHide ( –Uses blowfish to generate a stream of pseudo- random control bits to define bit encodings –Large embeddings trivial to detect

IEEE-WVU, Anchorage  11 JPEG Tools JSteg ( –40 bit RC4 Encryption –Channel capacity determination –LSB encoding in quantized DCT coefficients Outguess ( –Preserves statistics based on frequency counts –Seed based iterator available to choose embedding locations –Change minimization calculation for each seed –Remains one of the most difficult tools to detect

IEEE-WVU, Anchorage  12 PNG Data Set - Breakdown Training TinySmallMediumLarge Camaleão400 SecurEngine Stash-It Total1,1791,1871,1851,180 Non- Modified 2,000 Append- Modified 666 Crop- modified 667 Overlay- modified 667 Total4,000 4,731 total images in the PNG stego category 4,000 total images in the PNG clean category

IEEE-WVU, Anchorage  13 PNG Data Set - Breakdown Testing TinySmallMediumLarge Camaleão250 SecurEngine Stash-It250 Total ,993 total images in the PNG stego category

IEEE-WVU, Anchorage  14 JPEG Data Set - Breakdown Training F5JPHideJStegOutguess Animals1,7322, Business3, Maps3, Natural5,2111, Tourist4,9681, Vacation2, Total22,0115,3141, ,185 total images in the JPEG stego category

IEEE-WVU, Anchorage  15 JPEG Data Set - Breakdown Training Animals-Non-modified61 Business-Non-modified31 Maps-Non-modified28 Natural-Non-modified58 Tourist-Non-modified67 Vacation-Non-modified25 Misc-Non-modified1,996 Misc-Append-modified665 Misc-Crop-modified666 Misc-Overlay-modified662 Total4,259 29,185 total images in the JPEG stego category

IEEE-WVU, Anchorage  16 JPEG Data Set - Breakdown Testing TinySmallMediumLarge F5250 JPHide Jsteg Outguess Outguess Total1,6601, ,596 total images in the JPEG stego category

IEEE-WVU, Anchorage  17 Sample Usage: stegdetect JPEG Training Set Detected, CDetected, INo Steg Clean F JPHide JSteg Outguess Outguess Detected, C: correct algorithm detected Detected, I: incorrect algorithm detected Overall false detect rate for the clean image set is 8.6%

IEEE-WVU, Anchorage  18 Sample Usage: stegdetect JPEG Testing Set Detected, CDetected, INo Steg Clean F JPHide JSteg Outguess Outguess Overall false detect rate for the clean image set is 8.0%

IEEE-WVU, Anchorage  19 Sample Usage: stegdetect Detailed results for JPHide Test Set LargeMediumSmallTiny Detected, C Detected, I Negative

IEEE-WVU, Anchorage  20 Sample Usage: stegdetect Conclusions –Significant differences between the results of training and testing Weaker performance overall for testing Designed difficulty of testing set –Stegdetect performs poorly for large embeddings (non-intuitive), as well as small and tiny embeddings (expected)

IEEE-WVU, Anchorage  21 The Unseen Challenge Data Sets Lossy (JPEG) and Lossless (PNG) imagery 3 tools for PNG set, 4 tools for JPEG set 4 distinct embedding sizes for PNG, varying sizes for JPEG Clean imagery across all sets

IEEE-WVU, Anchorage  22 The Unseen Challenge Data Sets Valid approaches for use: –Detection –Detection and recovery (size or content) –Detection and destruction –Fusion No standard data set exists for steg evaluation! This set is a step in that direction!

IEEE-WVU, Anchorage  23 Download!