TY - GEN
T1 - Steganography attack based on Discrete Spring Transform and image geometrization
AU - Qi, Qilin
AU - Sharp, Aaron
AU - Yang, Yaoqing
AU - Peng, Dongming
AU - Sharif, Hamid
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/9/22
Y1 - 2014/9/22
N2 - In order to prevent harmful secret information sharing by steganography, a new active-warden countermeasure approach against steganography is proposed in this paper. Differently from the other countermeasure approaches presented in current literature which need to have some knowledge of the steganographic algorithms to be attacked, our proposed method is a generic method which is independent of any particular steganography methods being utilized. In other words, our approach blindly attacks the steganography without any prior knowledge of the used algorithms or their existence. In general, the hidden information is embedded in a carrier by adjusting the coefficients of the audio or image. In our method, by exploiting the large margin between the numerical value and visual perception of the images, large amounts of visually non-detectable distortions are incurred in the image. As a result, the hidden message is destroyed by this method while the perceptual quality of the image is maintained. Inspired by the print-scan process in which most of the steganographic methods cannot survive, a transform called Discrete Spring Transform (DST) is proposed in this paper as the foundation of our attack algorithm. An image geometrization method is also developed to reconstruct the image in this paper. The simulation results have demonstrated that the PSNR of the attacked image is above 30dB with a high perceptive quality while the BER of the hidden steganographic message in the attacked image is above 0.5.
AB - In order to prevent harmful secret information sharing by steganography, a new active-warden countermeasure approach against steganography is proposed in this paper. Differently from the other countermeasure approaches presented in current literature which need to have some knowledge of the steganographic algorithms to be attacked, our proposed method is a generic method which is independent of any particular steganography methods being utilized. In other words, our approach blindly attacks the steganography without any prior knowledge of the used algorithms or their existence. In general, the hidden information is embedded in a carrier by adjusting the coefficients of the audio or image. In our method, by exploiting the large margin between the numerical value and visual perception of the images, large amounts of visually non-detectable distortions are incurred in the image. As a result, the hidden message is destroyed by this method while the perceptual quality of the image is maintained. Inspired by the print-scan process in which most of the steganographic methods cannot survive, a transform called Discrete Spring Transform (DST) is proposed in this paper as the foundation of our attack algorithm. An image geometrization method is also developed to reconstruct the image in this paper. The simulation results have demonstrated that the PSNR of the attacked image is above 30dB with a high perceptive quality while the BER of the hidden steganographic message in the attacked image is above 0.5.
KW - human visual system
KW - multimedia security
KW - print-scan process
KW - steganography
UR - http://www.scopus.com/inward/record.url?scp=84908610869&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84908610869&partnerID=8YFLogxK
U2 - 10.1109/IWCMC.2014.6906416
DO - 10.1109/IWCMC.2014.6906416
M3 - Conference contribution
AN - SCOPUS:84908610869
T3 - IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference
SP - 554
EP - 558
BT - IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th International Wireless Communications and Mobile Computing Conference, IWCMC 2014
Y2 - 4 August 2014 through 8 August 2014
ER -