batch steganography and pooled steganalysis
play

Batch Steganography and Pooled Steganalysis Andrew Ker - PowerPoint PPT Presentation

Batch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 8 th Information Hiding Workshop 11 July 2006 The Prisoners Problem


  1. Batch Steganography and Pooled Steganalysis Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 8 th Information Hiding Workshop 11 July 2006

  2. “The Prisoners’ Problem” Steganographer or ? cover object Warden embedding algorithm stego object payload

  3. …more realistic? Steganographer or ? many covers Warden embedding algorithm some stego objects, some covers payload

  4. …more realistic? Steganographer any ? many covers Warden embedding algorithm some stego objects, some covers payload

  5. Batch Steganography The Steganographer: • has N covers each with same capacity C , • wants to embed a payload of BNC , B< 1 is the proportional bandwidth • embeds Cp in each of Nr covers, leaving the other N (1 — r ) alone. N (1 — r ) Nr p is the proportion of capacity used when a cover is embedded in r is the rate at which covers are used constraints: rp = B p � 1 r � 1

  6. Pooled Steganalysis l The Warden: • has a quantitative steganalysis method which estimates the proportionate payload in each cover: X 1 , X 2 ,.. ., X N X 1 X 2 X 3 X N .. . • wants to pool this evidence to answer the hypothesis test H 0 : r = 0 H 1 : p, r > 0 • for now, does not aim to estimate B , r , p or separate individual stego objects from covers.

  7. Assumptions • N fixed • The Shift Hypothesis: If proportion of capacity p is embedded in cover i , X i = p + ǫ i ψ where the error ǫ i is independent of p Will write ψ for error pdf Ψ for error cdf 0 p • Assumptions about the shape of ψ : “Bell shaped” Symmetric about 0 Unimodal Suitably smooth But we do not assume finite variance

  8. Outline • Three pooling strategies: I: Count positive observations II: Average observation III: Generalised likelihood ratio test for H 0 : r = 0 H 1 : p, r > 0 • For each, consider • False positive rate @ 50% false negatives, • Steganographer’s best embedding counterstrategy, • How performance depends on B and N . • Results of some simulation experiments • Conclusions

  9. I: Count Positive Observations ♯P = |{ X i : X i > 0 }| • Pooled statistic: This is just the sign test for whether the median of observed dist is greater than 0 H 0 : ♯P ∼ Bi( N, 1 2 ) ≈ N( N 2 , N 4 ) • Null distribution: H 1 : ♯P ∼ Bi( N (1 − r ) , 1 • Stego distribution: 2 ) + Bi( Nr, Ψ( p )) median( ♯P ) ≈ 1 2 N + Nr (Ψ( p ) − 1 2 ) � � 2 ( Ψ( p ) − 1 1 2 − 2 BN ) Φ • Median p-value: p An increasing function of p ; steganographer should take p = 1 r = B

  10. II: Average Observation � X = 1 ¯ X i • Pooled statistic: N · H 0 : ¯ ∼ N(0 , σ 2 /N ) • Null distribution: X H 1 : median( ¯ X ) ≈ rp = B • Stego distribution: 1 Φ( − 1 2 ) σ BN • Median p-value: Independent of choice of p

  11. III: Likelihood Ratio L ( X 1 ,. .. ,X N ; ˆ r, ˆ p ) • Pooled statistic: ℓ = log L ( X 1 ,. .. ,X N ; r =0 , p = 0) Likelihood function based on mixture pdf f ( x ) = (1 − r ) ψ ( x ) + rψ ( x − p ) ∼ λχ 2 · • Null distribution: ℓ d Theorem [see Appendix] Under some assumptions... (omitted here) In the limit as N → ∞ , for small B , E[ ℓ ] is maximized when p =1 , r = B , and then � ψ ′ ( x ) 2 E [ ℓ ] ∼ NB 2 ψ ( x ) + ψ ′′ ( x ) d x 2 • Median (mean) p-value: maximized when p =1 , r = B function of NB 2

  12. Strategies Summarised Pooling Total capacity Best steg. False +ve rate at strategy 50% false –ve ∝ BN ∝ strategy decreasing p = 1 1 Count positive function of N 2 r = B observations 1 B N 2 decreasing Average 1 function of any 2 N observation 1 B N 2 Generalised decreasing p = 1 Likelihood Ratio 1 function of r = B 2 N Test B 2 N (for small B ) ( known) ψ

  13. Experimental Results • Covers: A set of 14000 grayscale images • Steganography: LSB Replacement • Steganalysis: “Sample Pairs” [Dumitrescu, IHW 2002] • N =10, 100, 1000 ♯P, ¯ For a random batch of size N , compute X, ℓ 5000 samples with no steganography, to fit null distributions 500 samples each with a range of p , r such that rp = B =0.01 Measure false positive rate @ 50% false negatives

  14. Experimental Results: B = 0 . 01 10 0 N=10 10 0 N=100 10 0 N=1000 10 -2 -2 10 -4 10 -6 10 10 -4 -1 10 10 -8 10 -6 -8 10 -2 10 0.1 1 0.01 0.1 1 0.01 0.1 1 r r r Steganography concentrated in fewest covers Count positive observations Average observation Steganography spread over Generalised likelihood ratio all covers

  15. Not in this talk • Technical statistical difficulties. • Empirical investigation of relationship between B and N . • A critical problem: bias in the quantitative steganalysis method. Further Work • Other strategies for Warden e.g. “count observations greater than some threshold t ” • Try to relax some of the assumptions Uniformity of covers/embedding Shift hypothesis

  16. Conclusions • Batch steganography and pooled steganalysis are interesting and relevant problems. Complicated by the plethora of possible pooling strategies for the Warden. Mathematical analysis can be intractable. • Common theme: B should shrink as N grows, for fixed risk. Conjecture: Steganographic capacity is proportional to the square root of the total cover size. • Common theme: Steganographer should concentrate the steganography. Not true for all pooling strategies! Nonetheless, seems to be true for all “sensible” pooling strategies… Lessons for adaptive embedding? The End adk@comlab.ox.ac.uk

Recommend


More recommend