A steganographic method of improved resistance to the rich model­based analysis

Authors

DOI:

https://doi.org/10.15587/1729-4061.2020.201731

Keywords:

statistical indicators, machine learning, neural network, digital steganography, information hiding

Abstract

This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coefficients for a discrete cosine transform (DCT) with different values. This type of analysis implies calculating the number of DCT coefficients pairs, whose coordinates in the frequency domain differ by a fixed quantity (the offset). Based on these values, a classifier is trained for a certain large enough data sample, which, based on the distribution of the DCT coefficients pairs for an individual image, determines the presence of additional information in it.

A method based on the preliminary container modification before embedding a message has been proposed to mitigate the probability of hidden message detection. The so-called Generative Adversarial Network (GAN), consisting of two related neural networks, generator and discriminator, was used for the modification. The generator creates a modified image based on the original container; the discriminator verifies the degree to which the modified image is close to the preset one and provides feedback for the generator.

By using a GAN, based on the original container, such a modified container is generated so that, following the embedding of a known steganographic message, the distribution of DCT coefficients pairs is maximally close to the indicators of the original container.

We have simulated the operation of the proposed modification; based on the simulation results, the probabilities have been computed of the proper detection of the hidden information in the container when it was modified and when it was not. The simulation results have shown that the application of the modification based on modern information technologies (such as machine learning and neural networks) could significantly reduce the likelihood of message detection and improve the resistance against a steganographic analysis

Author Biographies

Nikolay Kalashnikov, Odessa National Polytechnic University Shevchenka ave., 1, Odessa, Ukraine, 65044

Postgraduate Student

Department of Radio Engineering Devices

Olexandr Kokhanov, Odessa National Polytechnic University Shevchenka ave., 1, Odessa, Ukraine, 65044

Doctor of Technical Sciences, Head of Department

Department of Radio Engineering Devices

Olexandr Iakovenko, Odessa National Polytechnic University Shevchenka ave., 1, Odessa, Ukraine, 65044

Postgraduate Student

Department of Radio Engineering Devices

Nataliia Kushnirenko, Odessa National Polytechnic University Shevchenka ave., 1, Odessa, Ukraine, 65044

PhD, Associate Professor

Department of Informatics and Information Systems Protection Management

References

  1. Konahovich, G. F., Puzyrenko, A. Yu. (2006). Komp'yuternaya steganografiya. Teoriya i praktika. Kyiv: «MK-Press», 288.
  2. Usage statistics of JPEG for websites. Available at: https://w3techs.com/technologies/details/im-jpeg
  3. Fridrich, J., Kodovsky, J. (2012). Rich Models for Steganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, 7 (3), 868–882. doi: https://doi.org/10.1109/tifs.2012.2190402
  4. Kodovský, J., Fridrich, J. (2012). Steganalysis of JPEG images using rich models. Media Watermarking, Security, and Forensics 2012. doi: https://doi.org/10.1117/12.907495
  5. Chechel’nickij, V. Ja., Kalashnikov, N. V., Jakovenko, A. A., Kushnirenko, N. I. (2016). Container`s statistic features considering for steganographic algorithm. Electrical and computer systems, 23 (99), 83–87. doi: https://doi.org/10.15276/eltecs.23.99.2016.13
  6. Chechelnytskyi, V. J., Jakovenko, A. A., Kalashnikov, N. V., Kushnіrenko, N. І. (2017). JPEG statistical detection of steganographic messages. Electrical and computer systems, 25 (101), 310–316. doi: https://doi.org/10.15276/eltecs.25.101.2017.36
  7. Bobok, I. I., Kobozeva, A. A. (2019). Steganalysis method efficient for the hidden communication channel with low capacity. Radiotekhnika, 3 (198), 19–31. doi: https://doi.org/10.30837/rt.2019.3.198.02
  8. Kobozeva, A. A., Bobok, I. I. (2019). Method for detecting digital image integrity violations due to its block processing. Radiotekhnika, 4 (199), 130–141. doi: https://doi.org/10.30837/rt.2019.4.199.16
  9. Chen, M., Boroumand, M., Fridrich, J. (2018). Deep Learning Regressors for Quantitative Steganalysis. Electronic Imaging, 2018 (7), 160-1–160-7. doi: https://doi.org/10.2352/issn.2470-1173.2018.07.mwsf-160
  10. Boroumand, M., Fridrich, J., Cogranne, R. (2019). Are we there yet? Electronic Imaging, 2019 (5), 537-1–537-13. doi: https://doi.org/10.2352/issn.2470-1173.2019.5.mwsf-537
  11. Sheisi, H., Mesgarian, J., Rahmani, M. (2012). Steganography: Dct Coefficient Replacement Method andCompare With Jsteg Algorithm. International Journal of Computer and Electrical Engineering, 4 (4), 458–462. doi: https://doi.org/10.7763/ijcee.2012.v4.533
  12. Denemark, T., Bas, P., Fridrich, J. (2018). Natural Steganography in JPEG Compressed Images. Electronic Imaging, 2018 (7), 316-1–316-10. doi: https://doi.org/10.2352/issn.2470-1173.2018.07.mwsf-316
  13. Independent JPEG Group. Available at: http://www.ijg.org/
  14. Oshibki I i II roda pri proverke gipotez, moshchnost'. Available at: http://statistica.ru/theory/oshibki-pri-proverke-gipotez-moshchnost/
  15. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S. et. al. (2014). Generative Adversarial Networks. arXiv.org. Available at: https://arxiv.org/pdf/1406.2661.pdf
  16. Westfeld, A. (2001). F5 – A Steganographic Algorithm. Lecture Notes in Computer Science, 289–302. doi: https://doi.org/10.1007/3-540-45496-9_21

Downloads

Published

2020-04-30

How to Cite

Kalashnikov, N., Kokhanov, O., Iakovenko, O., & Kushnirenko, N. (2020). A steganographic method of improved resistance to the rich model­based analysis. Eastern-European Journal of Enterprise Technologies, 2(9 (104), 37–42. https://doi.org/10.15587/1729-4061.2020.201731

Issue

Section

Information and controlling system