Menu
Publications
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
Editor-in-Chief
Nikiforov
Vladimir O.
D.Sc., Prof.
Partners
doi: 10.17586/2226-1494-2022-22-1-74-81
Reduction of LSB detectors set with definite reliability
Read the full article ';
Article in Russian
For citation:
Abstract
For citation:
Solodukha R.A., Perminov G.V., Atlasov I.V. Reduction of LSB detectors set with definite reliability. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2022, vol. 22, no. 1, pp. 74–81 (in Russian). doi: 10.17586/2226-1494-2022-22-1-74-81
Abstract
The article focuses on decreasing the set of steganalytical methods that determine the payload value in the image spatial domain using quantitative detectors of Least Significant Bits (LSB) steganography. It is supposed that methods can trace the same image regularities, and hence their results can correlate. The work presents the results of the development and testing of the technique for reducing the set of steganalytical methods taking into account the accuracy and reliability to the diminution of the computational complexity of steganalytical expertise. The theoretical basis of the proposed solution is the approximation of regression of the first kind by linear regression of the second kind for multivariate random variables. To verify the results, the computational experiment was performed. The payloads were implemented in 10 % increments by automating the freeware steganographic programs CryptArkan and The Third Eye with AutoIt. The steganalytical methods, such as Weighted Stego, Sample Pairs, Triples analysis, Asymptotically Uniformly Most Powerful detection, Pair of Values, were used. The datasets were built in the MATLAB environment; the program was implemented in Python. For the experiment’s reproducibility, the datasets and program code are provided in Kaggle. Interval estimates of methods correlation are calculated based on experimental data for various payload values. The developed technique includes a mathematical model, an algorithm for implementing the model, and a computer program. The proposed technique can be applied in those tasks where accuracy and reliability are taken into account. One of the subject areas demanding such assessments is computer forensics dealing with expertise with probabilistic conclusions. These estimates allow the analyst to vary the number of methods depending on the available computing resources and the time frame of the research.
Keywords: steganalysis, reduction of methods set, reliability, LSB, steganalytical expertise, regression
References
References
1. Zhizhina M.V. Forensic Handwriting Document Expertise. Moscow, JURLITINFORM Publ., 2006, pp. 110–116. (in Russian)
2. Usov A.I., Gradusova O.B., Kuz'min S.A. The use of probabilistic and statistical methods to test the significance of scientific evidence: comparative analysis of current forensic practices in russia and abroad. Theory and Practice of Forensic Science, 2018, vol. 13, no. 4, pp. 6–15. (in Russian). https://doi.org/10.30764/1819-2785-2018-13-4-6-15
3. Förster E., Rönz B. Methoden der Korrelations - und Regressionsanalyse. Berlin, 1979, 324 p.
4. Atlasov I.V., Solodukha R.A. Steganography of Digital Images: Automatization, Optimization and Reliability. Voronezh, Voronezhskij institut MVD Rossii. Available at: www.kaggle.com/dataset/c736afc689f328127816c59961677b3106468ce9f8e4399f3d18a12745c9e94c (accessed: 10.11.2021). (in Russian)
5. Atlasov I., Solodukha R. Reduction of steganalytical methods set with determined reliability. Proc. 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA), 2019, pp. 126–131. https://doi.org/10.1109/SUMMA48161.2019.8947470
6. Wishart J., Bartlett M.S. The distribution of second order moment statistics in a normal system. Mathematical Proceedings of the Cambridge Philosophical Society, 1932, vol. 28, pp. 455–459. https://doi.org/10.1017/S0305004100010690
7. Fisher R.A. Statistical methods for research workers. Oliver and Boyd. 12th ed., revised. Edinburg, London, Oliver and Boyd, 1954.
8. Bartlett M.S. On the theory of statistical regression. Proceedings of the Royal Society of Edinburgh, 1934, vol. 53, pp. 260–283. https://doi.org/10.1017/S0370164600015637
9. Ker A., Böhme R. Revisiting weighted stego-image steganalysis. Proceedings of SPIE, 2008, vol. 6819, pp. 681905. https://doi.org/10.1117/12.766820
10. Dumitrescu S., Wu X., Memon D. On steganalysis of random LSB embedding in continuous-tone images. IEEE International Conference on Image Processing, vol. 3, 2002, pp. 641–644.
11. Ker A. A general framework for structural steganalysis of LSB replacement. Lecture Notes in Computer Science, 2005, vol. 3727, pp. 296–311. https://doi.org/10.1007/11558859_22
12. Fillatre L. Adaptive steganalysis of Least Significant Bit replacement in grayscale natural images. IEEE Transactions on Signal Processing, 2012, vol. 60, no. 2, pp. 556–569. https://doi.org/10.1109/TSP.2011.2174231
13. Westfeld A., Pfitzmann A. Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos and S-Tools-and Some Lessons Learned. Lecture Notes in Computer Science, 2000, vol. 1768, pp. 61–76. https://doi.org/10.1007/10719724_5
14. Pevný Т., Bas P., Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 2010, vol. 5, no. 2, pp. 215–224. https://doi.org/10.1109/TIFS.2010.2045842
15. Fridrich J., Kodovský J. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 2012, vol. 7, no. 3, pp. 868–882. https://doi.org/10.1109/TIFS.2012.2190402
16. Chen C., Shi Y.Q. JPEG image steganalysis utilizing both intrablock and interblock correlations. Proc. of the IEEE International Symposium on Circuits and Systems (ISCAS), 2008, pp. 3029–3032. https://doi.org/10.1109/ISCAS.2008.4542096
2. Usov A.I., Gradusova O.B., Kuz'min S.A. The use of probabilistic and statistical methods to test the significance of scientific evidence: comparative analysis of current forensic practices in russia and abroad. Theory and Practice of Forensic Science, 2018, vol. 13, no. 4, pp. 6–15. (in Russian). https://doi.org/10.30764/1819-2785-2018-13-4-6-15
3. Förster E., Rönz B. Methoden der Korrelations - und Regressionsanalyse. Berlin, 1979, 324 p.
4. Atlasov I.V., Solodukha R.A. Steganography of Digital Images: Automatization, Optimization and Reliability. Voronezh, Voronezhskij institut MVD Rossii. Available at: www.kaggle.com/dataset/c736afc689f328127816c59961677b3106468ce9f8e4399f3d18a12745c9e94c (accessed: 10.11.2021). (in Russian)
5. Atlasov I., Solodukha R. Reduction of steganalytical methods set with determined reliability. Proc. 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA), 2019, pp. 126–131. https://doi.org/10.1109/SUMMA48161.2019.8947470
6. Wishart J., Bartlett M.S. The distribution of second order moment statistics in a normal system. Mathematical Proceedings of the Cambridge Philosophical Society, 1932, vol. 28, pp. 455–459. https://doi.org/10.1017/S0305004100010690
7. Fisher R.A. Statistical methods for research workers. Oliver and Boyd. 12th ed., revised. Edinburg, London, Oliver and Boyd, 1954.
8. Bartlett M.S. On the theory of statistical regression. Proceedings of the Royal Society of Edinburgh, 1934, vol. 53, pp. 260–283. https://doi.org/10.1017/S0370164600015637
9. Ker A., Böhme R. Revisiting weighted stego-image steganalysis. Proceedings of SPIE, 2008, vol. 6819, pp. 681905. https://doi.org/10.1117/12.766820
10. Dumitrescu S., Wu X., Memon D. On steganalysis of random LSB embedding in continuous-tone images. IEEE International Conference on Image Processing, vol. 3, 2002, pp. 641–644.
11. Ker A. A general framework for structural steganalysis of LSB replacement. Lecture Notes in Computer Science, 2005, vol. 3727, pp. 296–311. https://doi.org/10.1007/11558859_22
12. Fillatre L. Adaptive steganalysis of Least Significant Bit replacement in grayscale natural images. IEEE Transactions on Signal Processing, 2012, vol. 60, no. 2, pp. 556–569. https://doi.org/10.1109/TSP.2011.2174231
13. Westfeld A., Pfitzmann A. Attacks on steganographic systems: Breaking the steganographic utilities EzStego, Jsteg, Steganos and S-Tools-and Some Lessons Learned. Lecture Notes in Computer Science, 2000, vol. 1768, pp. 61–76. https://doi.org/10.1007/10719724_5
14. Pevný Т., Bas P., Fridrich J. Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 2010, vol. 5, no. 2, pp. 215–224. https://doi.org/10.1109/TIFS.2010.2045842
15. Fridrich J., Kodovský J. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 2012, vol. 7, no. 3, pp. 868–882. https://doi.org/10.1109/TIFS.2012.2190402
16. Chen C., Shi Y.Q. JPEG image steganalysis utilizing both intrablock and interblock correlations. Proc. of the IEEE International Symposium on Circuits and Systems (ISCAS), 2008, pp. 3029–3032. https://doi.org/10.1109/ISCAS.2008.4542096