Advanced Statistical Steganalysis (eBook)

(Autor)

eBook Download: PDF
2010 | 2010
XVI, 288 Seiten
Springer Berlin (Verlag)
978-3-642-14313-7 (ISBN)

Lese- und Medienproben

Advanced Statistical Steganalysis - Rainer Böhme
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.

Foreword 
8 
Acknowledgements 
10 
Contents 
12 
Chapter 1 Introduction 17
1.1 Steganography and Steganalysis as Empirical Sciences 17
1.2 Objective and Approach 18
1.3 Outline 20
Part I Background and Advances in Theory 24
Chapter 2 Principles of Modern Steganography and Steganalysis 25
2.1 Digital Steganography and Steganalysis 25
2.1.1 Steganographic System 26
2.1.2 Steganalysis 27
2.1.3 Relevance in Social and Academic Contexts 27
2.2 Conventions 28
2.3 Design Goals and Metrics 31
2.3.1 Capacity 31
2.3.2 Steganographic Security 32
2.3.3 Robustness 35
2.3.4 Further Metrics 36
2.4 Paradigms for the Design of Steganographic Systems 36
2.4.1 Paradigm I: Modify with Caution 36
2.4.2 Paradigm II: Cover Generation 37
2.4.3 Dominant Paradigm 39
2.5 Adversary Models 40
2.5.1 Passive Warden 40
2.5.2 Active Warden 42
2.6 Embedding Domains 44
2.6.1 Artificial Channels 44
2.6.2 Spatial and Time Domains 45
2.6.3 Transformed Domain 45
2.6.4 Selected Cover Formats: JPEG and MP3 49
2.6.4.1 Essentials of JPEG Still Image Compression 49
2.6.4.2 Essentials of MP3 Audio Compression 51
2.6.5 Exotic Covers 52
2.7 Embedding Operations 53
2.7.1 LSB Replacement 54
2.7.2 LSB Matching (±1) 55
2.7.3 Mod-k Replacement, Mod-k Matching, and Generalisations 59
2.7.4 Multi-Sample Rules 61
2.7.5 Adaptive Embedding 62
2.8 Protocols and Message Coding 63
2.8.1 Public-Key Steganography 64
2.8.2 Maximising Embedding Efficiency 67
2.8.2.1 Embedding Efficiency with Respect to the Number of Changes 67
2.8.2.2 Embedding Efficiency with Respect to the Severity of Changes 69
2.8.2.3 Summary 71
2.9 Specific Detection Techniques 71
2.9.1 Calibration of JPEG Histograms 71
2.9.2 Universal Detectors 74
2.9.3 Quantitative Steganalysis 77
2.10 Selected Estimators for LSB Replacement in Spatial Domain Images 78
2.10.1 RS Analysis 78
2.10.2 Sample Pair Analysis 81
2.10.3 Higher-Order Structural Steganalysis 83
2.10.3.1 Least-Squares Solutions to SPA 84
2.10.3.2 Maximum-Likelihood Solutions to SPA 84
2.10.3.3 Triples and Quadruples Analysis 85
2.10.4 Weighted Stego Image Steganalysis 87
2.11 Summary and Further Steps 90
Chapter 3 Towards a Theory of Cover Models 92
3.1 Steganalyst's Problem Formalised 92
3.1.1 The Plausibility Heuristic 92
3.1.2 Application to Digital Steganography 94
3.1.3 Incognisability of the Cover Distribution 96
3.2 Cover Models 97
3.2.1 Defining Cover Models 97
3.2.2 Options for Formulating Cover Models 99
3.2.3 Cover Models and Detection Performance (by Example) 
101 
3.2.4 Summary and Motivations for Studying Cover Models 105
3.3 Dealing with Heterogeneous Cover Sources 106
3.3.1 Mixture Distributions 108
3.3.2 The Mixture Cover Model 108
3.4 Relation to Prior Information-Theoretic Work 110
3.4.1 Theoretical Limits 111
3.4.2 Observability Bounds 112
3.4.3 Computational Bounds 114
3.4.4 Applicability of the Theory of Cover Models 115
3.4.5 Indeterminacy in the Cover 117
3.5 Instances of Cover Models for Heterogeneous Sources 119
3.6 Summary 120
Part II Specific Advances in Steganalysis 122
Chapter 4 Detection of Model-Based Steganography with First-Order Statistics 123
4.1 Fundamentals of Model-Based Steganography 123
4.2 MB1: An Embedding Function for JPEG Covers 126
4.3 Detection Method 129
4.4 Experimental Validation 132
4.5 Summary and Outlook 135
4.5.1 Limitations and Future Directions for MB1Steganalysis 136
4.5.2 Possible (Short-Term) Countermeasures 137
4.5.3 Implications for More Secure Steganography 138
Chapter 5 Models of Heterogeneous Covers for Quantitative Steganalysis 139
5.1 Metrics for Quantitative Steganalysis 140
5.1.1 Conventional Metrics 140
5.1.2 Improved Metrics Based on a Distribution Model 142
5.1.3 Decomposition of Estimation Errors 147
5.1.3.1 Shape of the Error Distribution Components 148
5.1.3.2 Relative Size of Cover-Specific and Message-Specific Errors 151
5.2 Measurement of Sensitivity to Cover Properties 153
5.2.1 Method 154
5.2.2 Modelling the Shape of the Between-Image Distribution 156
5.2.3 Modelling the Shape of the Within-Image Distribution 160
5.3 Summary and Conclusion 163
6 Improved Weighted Stego Image Steganalysis 166
6.1 Enhanced WS for Never-Compressed Covers 166
6.1.1 Enhanced Predictor 167
6.1.2 Enhanced Calculation of Weights 172
6.1.3 Enhanced Bias Correction 177
6.1.4 Experimental Results 177
6.2 Adaptation of WS to JPEG Pre-Compressed Covers 183
6.2.1 Improved Predictor 184
6.2.2 Estimation of the Cover's JPEG Compression Quality 187
6.2.3 Experimental Results 188
6.3 Summary and Outlook 193
Chapter 7 Using Encoder Artefacts for Steganalysis of Compressed Audio Streams 194
7.1 MP3 Steganography and Steganalysis 194
7.1.1 Problem Statement in the Mixture Cover Model Framework 196
7.1.2 Level of Analysis and Related Work 196
7.1.3 Method 198
7.2 Description of Features 200
7.2.1 Features Based on the Compression Size Control Mechanism 201
7.2.2 Features Based on Model Decisions 203
7.2.3 Features Based on Capability Usage 205
7.2.4 Feature Based on Stream Formatting 206
7.3 Experimental Results for Encoder Detection 207
7.3.1 Single-Compressed Audio Files 207
7.3.2 Importance of Individual Features 210
7.3.3 Influence of Double-Compression 210
7.4 Experimental Results for Improved Steganalysis 212
7.5 Explorative Analysis of Encoder Similarities 213
7.6 Summary and Discussion 215
7.6.1 Limitations and Future Directions 215
7.6.2 Transferability to Other Formats 216
7.6.3 Related Applications 217
Part III Synthesis 218
Chapter 8 General Discussion 219
8.1 Summary of Results 219
8.1.1 Results Based on Informal Arguments 219
8.1.2 Results Based on Mathematical Proofs 220
8.1.3 Results Based on Empirical Evidence 221
8.2 Limitations 222
8.3 Directions for Future Research 223
8.3.1 Theoretical Challenges 224
8.3.2 Empirical Challenges 224
8.3.3 Practical Challenges 225
8.4 Conclusion and Outlook 225
Appendix A Description of Covers Used in the Experiments 228
Appendix B Spurious Steganalysis Results Using the `van Hateren' Image Database 231
Appendix C Proof of Weighted Stego Image (WS) Estimator 235
Appendix D Derivation of Linear Predictor for Enhanced WS 236
Appendix E Game for Formal Security Analysis 238
Appendix F Derivation of ROC Curves and AUC Metric for Example Cover Models 240
Appendix G Supplementary Figures and Tables 242
References 252
List of Tables 271
List of Figures 273
List of Acronyms 275
List of Symbols 278
List of Functions 283
Index 285

Erscheint lt. Verlag 9.8.2010
Reihe/Serie Information Security and Cryptography
Information Security and Cryptography
Zusatzinfo XVI, 288 p. 67 illus.
Verlagsort Berlin
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Grafik / Design
Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Schlagworte Complexity • Compressed audio streams • Cover models • cryptography • Data Compression • Digital steganalysis • Digital steganography • Heterogeneous cover signals • Information Hiding • Information Theory • Mixture Models • Multimedia • Probability • Quantitative steganalysis • SIG • Signal Processing
ISBN-10 3-642-14313-X / 364214313X
ISBN-13 978-3-642-14313-7 / 9783642143137
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99