• Corpus ID: 2372102

Natural Steganography: cover-source switching for better steganography

@article{Bas2016NaturalSC,
  title={Natural Steganography: cover-source switching for better steganography},
  author={Patrick Bas},
  journal={ArXiv},
  year={2016},
  volume={abs/1607.07824}
}
  • P. Bas
  • Published 26 July 2016
  • Computer Science
  • ArXiv
This paper proposes a new steganographic scheme relying on the principle of " cover-source switching " , the key idea being that the embedding should switch from one cover-source to another. The proposed implementation, called Natural Steganography, considers the sensor noise naturally present in the raw images and uses the principle that, by the addition of a specific noise the steganographic embedding tries to mimic a change of ISO sensitivity. The embedding methodology consists in 1… 
Steganography via cover-source switching
  • P. Bas
  • Computer Science
    2016 IEEE International Workshop on Information Forensics and Security (WIFS)
  • 2016
TLDR
This paper proposes a new steganographic scheme relying on the principle of “cover-source switching”, the key idea being that the embedding should switch from one cover-source to another, and shows that this methodology is easily tractable whenever the processes are known and enables to embed large and undetectable payloads.
An embedding mechanism for natural steganography after down-sampling
  • P. Bas
  • Computer Science
    2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
  • 2017
TLDR
This paper investigates in this paper how to generate a stego-signal once the image is down-sampled, and shows that the use of a convolution kernel with overlapping boundaries implies a synchronization mechanism similar to the one used by the CMD and Synch embedding schemes, but motivated here by statistical foundations.
A Comparative Study of Recent Steganography Techniques for Multiple Image Formats
TLDR
The comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file formats are presented.

References

SHOWING 1-10 OF 39 REFERENCES
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography
TLDR
A complete methodology for designing practical and highly-undetectable stegosystems for real digital media and explains why high-dimensional models might be problem in steganalysis, and introduces HUGO, a new embedding algorithm for spatial-domain digital images and its performance with LSB matching.
Perturbed quantization steganography with wet paper codes
TLDR
A new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having to share the selection channel with the recipient is introduced.
Side-informed steganography with additive distortion
TLDR
This paper describes a general principle for incorporating the side-information in any steganographic scheme designed to minimize embedding distortion and appears to improve empirical security of existing embedding schemes by a rather large margin.
Selection-channel-aware rich model for Steganalysis of digital images
TLDR
This paper demonstrates on three state-of-the-art content-adaptive steganographic schemes that even an imprecise knowledge of the embedding probabilities can substantially increase the detection accuracy in comparison with feature sets that do not consider the selection channel.
Universal distortion function for steganography in an arbitrary domain
TLDR
This paper proposes a universal distortion design called universal wavelet relative distortion (UNIWARD) that can be applied for embedding in an arbitrary domain and demonstrates experimentally using rich models as well as targeted attacks that steganographic methods built using UNIWARD match or outperform the current state of the art in the spatial domain, JPEG domain, and side-informed JPEG domain.
The Steganographer is the Outlier: Realistic Large-Scale Steganalysis
TLDR
This work presents a method for a completely new kind of steganalysis that works reliably, completely unsupervised, when tested against some of the standard steganography methods available to nonexperts, and determines good parameters for the detector and creates a two-player game between the guilty actor and the steganalyst.
A Strategy of Clustering Modification Directions in Spatial Image Steganography
TLDR
Experimental results show that the proposed CMD strategy, incorporated into existing steganographic schemes, can effectively overcome the challenges posed by the modern steganalyzers with high-dimensional features.
Steganalysis in resized images
  • Jan Kodovský, J. Fridrich
  • Computer Science
    2013 IEEE International Conference on Acoustics, Speech and Signal Processing
  • 2013
TLDR
This paper studies how downsampling affects steganographic security and indicates the existence of a new scaling law expressing the length of secure payload when the cover length is not modified by adding or removing pixels but, instead, by subsampling.
Pre-processing for Adding Noise Steganography
TLDR
A pre-processing step is suggested in order to reduce noise before embedding by adding a noise signal without increasing local variances to enable embedding of steganography images.
Blind Statistical Steganalysis of Additive Steganography Using Wavelet Higher Order Statistics
TLDR
This paper focuses on the class of supervised steganalysis techniques developed for the additive steganography, which can be described as y = f(x, s, K) = x + g(s, K), where stego image y is obtained from the cover image x by adding a low-amplitude cover image independent Stego signals that may be also depended on secret stEGo key K and the secret data s.
...
...