E-Book, Englisch, 288 Seiten
Böhme Advanced Statistical Steganalysis
1. Auflage 2010
ISBN: 978-3-642-14313-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 288 Seiten
Reihe: Information Security and Cryptography
ISBN: 978-3-642-14313-7
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other secrecy techniques. The main theoretical contribution of the book is a proposal to structure approaches to provably secure steganography according to their implied assumptions on the limits of the adversary and on the nature of covers. A further contribution is the emphasis on dealing with heterogeneity in cover distributions, crucial for security analyses. The author's work complements earlier approaches based on information, complexity, probability and signal processing theory, and he presents numerous practical implications. The scientific advances are supported by a survey of the classical steganography literature; a new proposal for a unified terminology and notation that is maintained throughout the book; a critical discussion of the results achieved and their limitations; and an assessment of the possibility of transferring elements of this research's empirical perspective to other domains in information security. The book is suitable for researchers working in cryptography and information security, practitioners in the corporate and national security domains, and graduate students specializing in multimedia security and data hiding.
Autoren/Hrsg.
Weitere Infos & Material
1;Foreword
;8
2;Acknowledgements
;10
3;Contents
;12
4;Chapter 1 Introduction;17
4.1;1.1 Steganography and Steganalysis as Empirical Sciences;17
4.2;1.2 Objective and Approach;18
4.3;1.3 Outline;20
5;Part I Background and Advances in Theory;24
5.1;Chapter 2 Principles of Modern Steganography and Steganalysis;25
5.1.1;2.1 Digital Steganography and Steganalysis;25
5.1.1.1;2.1.1 Steganographic System;26
5.1.1.2;2.1.2 Steganalysis;27
5.1.1.3;2.1.3 Relevance in Social and Academic Contexts;27
5.1.2;2.2 Conventions;28
5.1.3;2.3 Design Goals and Metrics;31
5.1.3.1;2.3.1 Capacity;31
5.1.3.2;2.3.2 Steganographic Security;32
5.1.3.3;2.3.3 Robustness;35
5.1.3.4;2.3.4 Further Metrics;36
5.1.4;2.4 Paradigms for the Design of Steganographic Systems;36
5.1.4.1;2.4.1 Paradigm I: Modify with Caution;36
5.1.4.2;2.4.2 Paradigm II: Cover Generation;37
5.1.4.3;2.4.3 Dominant Paradigm;39
5.1.5;2.5 Adversary Models;40
5.1.5.1;2.5.1 Passive Warden;40
5.1.5.2;2.5.2 Active Warden;42
5.1.6;2.6 Embedding Domains;44
5.1.6.1;2.6.1 Artificial Channels;44
5.1.6.2;2.6.2 Spatial and Time Domains;45
5.1.6.3;2.6.3 Transformed Domain;45
5.1.6.4;2.6.4 Selected Cover Formats: JPEG and MP3;49
5.1.6.4.1;2.6.4.1 Essentials of JPEG Still Image Compression;49
5.1.6.4.2;2.6.4.2 Essentials of MP3 Audio Compression;51
5.1.6.5;2.6.5 Exotic Covers;52
5.1.7;2.7 Embedding Operations;53
5.1.7.1;2.7.1 LSB Replacement;54
5.1.7.2;2.7.2 LSB Matching (±1);55
5.1.7.3;2.7.3 Mod-k Replacement, Mod-k Matching, and Generalisations;59
5.1.7.4;2.7.4 Multi-Sample Rules;61
5.1.7.5;2.7.5 Adaptive Embedding;62
5.1.8;2.8 Protocols and Message Coding;63
5.1.8.1;2.8.1 Public-Key Steganography;64
5.1.8.2;2.8.2 Maximising Embedding Efficiency;67
5.1.8.2.1;2.8.2.1 Embedding Efficiency with Respect to the Number of Changes;67
5.1.8.2.2;2.8.2.2 Embedding Efficiency with Respect to the Severity of Changes;69
5.1.8.2.3;2.8.2.3 Summary;71
5.1.9;2.9 Specific Detection Techniques;71
5.1.9.1;2.9.1 Calibration of JPEG Histograms;71
5.1.9.2;2.9.2 Universal Detectors;74
5.1.9.3;2.9.3 Quantitative Steganalysis;77
5.1.10;2.10 Selected Estimators for LSB Replacement in Spatial Domain Images;78
5.1.10.1;2.10.1 RS Analysis;78
5.1.10.2;2.10.2 Sample Pair Analysis;81
5.1.10.3;2.10.3 Higher-Order Structural Steganalysis;83
5.1.10.3.1;2.10.3.1 Least-Squares Solutions to SPA;84
5.1.10.3.2;2.10.3.2 Maximum-Likelihood Solutions to SPA;84
5.1.10.3.3;2.10.3.3 Triples and Quadruples Analysis;85
5.1.10.4;2.10.4 Weighted Stego Image Steganalysis;87
5.1.11;2.11 Summary and Further Steps;90
5.2;Chapter 3 Towards a Theory of Cover Models;92
5.2.1;3.1 Steganalyst's Problem Formalised;92
5.2.1.1;3.1.1 The Plausibility Heuristic;92
5.2.1.2;3.1.2 Application to Digital Steganography;94
5.2.1.3;3.1.3 Incognisability of the Cover Distribution;96
5.2.2;3.2 Cover Models;97
5.2.2.1;3.2.1 Defining Cover Models;97
5.2.2.2;3.2.2 Options for Formulating Cover Models;99
5.2.2.3;3.2.3 Cover Models and Detection Performance (by Example)
;101
5.2.2.4;3.2.4 Summary and Motivations for Studying Cover Models;105
5.2.3;3.3 Dealing with Heterogeneous Cover Sources;106
5.2.3.1;3.3.1 Mixture Distributions;108
5.2.3.2;3.3.2 The Mixture Cover Model;108
5.2.4;3.4 Relation to Prior Information-Theoretic Work;110
5.2.4.1;3.4.1 Theoretical Limits;111
5.2.4.2;3.4.2 Observability Bounds;112
5.2.4.3;3.4.3 Computational Bounds;114
5.2.4.4;3.4.4 Applicability of the Theory of Cover Models;115
5.2.4.5;3.4.5 Indeterminacy in the Cover;117
5.2.5;3.5 Instances of Cover Models for Heterogeneous Sources;119
5.2.6;3.6 Summary;120
6;Part II Specific Advances in Steganalysis;122
6.1;Chapter 4 Detection of Model-Based Steganography with First-Order Statistics;123
6.1.1;4.1 Fundamentals of Model-Based Steganography;123
6.1.2;4.2 MB1: An Embedding Function for JPEG Covers;126
6.1.3;4.3 Detection Method;129
6.1.4;4.4 Experimental Validation;132
6.1.5;4.5 Summary and Outlook;135
6.1.5.1;4.5.1 Limitations and Future Directions for MB1Steganalysis;136
6.1.5.2;4.5.2 Possible (Short-Term) Countermeasures;137
6.1.5.3;4.5.3 Implications for More Secure Steganography;138
6.2;Chapter 5 Models of Heterogeneous Covers for Quantitative Steganalysis;139
6.2.1;5.1 Metrics for Quantitative Steganalysis;140
6.2.1.1;5.1.1 Conventional Metrics;140
6.2.1.2;5.1.2 Improved Metrics Based on a Distribution Model;142
6.2.1.3;5.1.3 Decomposition of Estimation Errors;147
6.2.1.3.1;5.1.3.1 Shape of the Error Distribution Components;148
6.2.1.3.2;5.1.3.2 Relative Size of Cover-Specific and Message-Specific Errors;151
6.2.2;5.2 Measurement of Sensitivity to Cover Properties;153
6.2.2.1;5.2.1 Method;154
6.2.2.2;5.2.2 Modelling the Shape of the Between-Image Distribution;156
6.2.2.3;5.2.3 Modelling the Shape of the Within-Image Distribution;160
6.2.3;5.3 Summary and Conclusion;163
6.3;6 Improved Weighted Stego Image Steganalysis;166
6.3.1;6.1 Enhanced WS for Never-Compressed Covers;166
6.3.1.1;6.1.1 Enhanced Predictor;167
6.3.1.2;6.1.2 Enhanced Calculation of Weights;172
6.3.1.3;6.1.3 Enhanced Bias Correction;177
6.3.1.4;6.1.4 Experimental Results;177
6.3.2;6.2 Adaptation of WS to JPEG Pre-Compressed Covers;183
6.3.2.1;6.2.1 Improved Predictor;184
6.3.2.2;6.2.2 Estimation of the Cover's JPEG Compression Quality;187
6.3.2.3;6.2.3 Experimental Results;188
6.3.3;6.3 Summary and Outlook;193
6.4;Chapter 7 Using Encoder Artefacts for Steganalysis of Compressed Audio Streams;194
6.4.1;7.1 MP3 Steganography and Steganalysis;194
6.4.1.1;7.1.1 Problem Statement in the Mixture Cover Model Framework;196
6.4.1.2;7.1.2 Level of Analysis and Related Work;196
6.4.1.3;7.1.3 Method;198
6.4.2;7.2 Description of Features;200
6.4.2.1;7.2.1 Features Based on the Compression Size Control Mechanism;201
6.4.2.2;7.2.2 Features Based on Model Decisions;203
6.4.2.3;7.2.3 Features Based on Capability Usage;205
6.4.2.4;7.2.4 Feature Based on Stream Formatting;206
6.4.3;7.3 Experimental Results for Encoder Detection;207
6.4.3.1;7.3.1 Single-Compressed Audio Files;207
6.4.3.2;7.3.2 Importance of Individual Features;210
6.4.3.3;7.3.3 Influence of Double-Compression;210
6.4.4;7.4 Experimental Results for Improved Steganalysis;212
6.4.5;7.5 Explorative Analysis of Encoder Similarities;213
6.4.6;7.6 Summary and Discussion;215
6.4.6.1;7.6.1 Limitations and Future Directions;215
6.4.6.2;7.6.2 Transferability to Other Formats;216
6.4.6.3;7.6.3 Related Applications;217
7;Part III Synthesis;218
7.1;Chapter 8 General Discussion;219
7.1.1;8.1 Summary of Results;219
7.1.1.1;8.1.1 Results Based on Informal Arguments;219
7.1.1.2;8.1.2 Results Based on Mathematical Proofs;220
7.1.1.3;8.1.3 Results Based on Empirical Evidence;221
7.1.2;8.2 Limitations;222
7.1.3;8.3 Directions for Future Research;223
7.1.3.1;8.3.1 Theoretical Challenges;224
7.1.3.2;8.3.2 Empirical Challenges;224
7.1.3.3;8.3.3 Practical Challenges;225
7.1.4;8.4 Conclusion and Outlook;225
7.2;Appendix A Description of Covers Used in the Experiments;228
7.3;Appendix B Spurious Steganalysis Results Using the `van Hateren' Image Database;231
7.4;Appendix C Proof of Weighted Stego Image (WS) Estimator;235
7.5;Appendix D Derivation of Linear Predictor for Enhanced WS;236
7.6;Appendix E Game for Formal Security Analysis;238
7.7;Appendix F Derivation of ROC Curves and AUC Metric for Example Cover Models;240
7.8;Appendix G Supplementary Figures and Tables;242
7.9;References;252
7.10;List of Tables;271
7.11;List of Figures;273
7.12;List of Acronyms;275
7.13;List of Symbols;278
7.14;List of Functions;283
7.15;Index;285




