A general attack method for steganography removal using pseudo-CFA re-interpolation

Pradhumna Lal Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Watermarking and steganography are two of the most researched topics in multimedia forensics. However, easy availability of tools and technology has made their misuse a serious concern. To counteract this development some effective tools are necessary to remove malicious steganography. In this work, we introduce a novel watermark attack method which can destroy hidden information embedded in images based on the principle of re-interpolation of Color Filter Array (CFA) artifacts. In digital cameras and scanners, CFA filters are used to acquire low-resolution physical color channel information and produce a high-quality image by subsequent interpolation. We propose to emulate a similar scheme in which image information is removed and reconstructed through interpolation and thereby destroy any hidden information without impairing the visual quality. Most importantly, our presented method is general and does not assume any knowledge of the used watermarking methods, the hidden message or the host image.

Original languageEnglish (US)
Title of host publication2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
Pages454-459
Number of pages6
StatePublished - Dec 1 2011
Event2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011 - Abu Dhabi, United Arab Emirates
Duration: Dec 11 2011Dec 14 2011

Publication series

Name2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011

Other

Other2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
CountryUnited Arab Emirates
CityAbu Dhabi
Period12/11/1112/14/11

Fingerprint

Steganography
Interpolation
Watermarking
Color
Digital cameras
Image quality
Availability
Filter
Attack
Hidden information

Keywords

  • Color Filter Array
  • Multimedia
  • Re-interpolation
  • Watermark Attack
  • Watermark Embedding

ASJC Scopus subject areas

  • Management of Technology and Innovation
  • Economics and Econometrics

Cite this

Shrestha, P. L., Hempel, M., Ma, T., Peng, D., & Sharif, H. (2011). A general attack method for steganography removal using pseudo-CFA re-interpolation. In 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011 (pp. 454-459). [6148481] (2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011).

A general attack method for steganography removal using pseudo-CFA re-interpolation. / Shrestha, Pradhumna Lal; Hempel, Michael; Ma, Tao; Peng, Dongming; Sharif, Hamid.

2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011. 2011. p. 454-459 6148481 (2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shrestha, PL, Hempel, M, Ma, T, Peng, D & Sharif, H 2011, A general attack method for steganography removal using pseudo-CFA re-interpolation. in 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011., 6148481, 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011, pp. 454-459, 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, United Arab Emirates, 12/11/11.
Shrestha PL, Hempel M, Ma T, Peng D, Sharif H. A general attack method for steganography removal using pseudo-CFA re-interpolation. In 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011. 2011. p. 454-459. 6148481. (2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011).
Shrestha, Pradhumna Lal ; Hempel, Michael ; Ma, Tao ; Peng, Dongming ; Sharif, Hamid. / A general attack method for steganography removal using pseudo-CFA re-interpolation. 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011. 2011. pp. 454-459 (2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011).
@inproceedings{94da98b29e674a55aef2a762d41831b1,
title = "A general attack method for steganography removal using pseudo-CFA re-interpolation",
abstract = "Watermarking and steganography are two of the most researched topics in multimedia forensics. However, easy availability of tools and technology has made their misuse a serious concern. To counteract this development some effective tools are necessary to remove malicious steganography. In this work, we introduce a novel watermark attack method which can destroy hidden information embedded in images based on the principle of re-interpolation of Color Filter Array (CFA) artifacts. In digital cameras and scanners, CFA filters are used to acquire low-resolution physical color channel information and produce a high-quality image by subsequent interpolation. We propose to emulate a similar scheme in which image information is removed and reconstructed through interpolation and thereby destroy any hidden information without impairing the visual quality. Most importantly, our presented method is general and does not assume any knowledge of the used watermarking methods, the hidden message or the host image.",
keywords = "Color Filter Array, Multimedia, Re-interpolation, Watermark Attack, Watermark Embedding",
author = "Shrestha, {Pradhumna Lal} and Michael Hempel and Tao Ma and Dongming Peng and Hamid Sharif",
year = "2011",
month = "12",
day = "1",
language = "English (US)",
isbn = "9781908320001",
series = "2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011",
pages = "454--459",
booktitle = "2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011",

}

TY - GEN

T1 - A general attack method for steganography removal using pseudo-CFA re-interpolation

AU - Shrestha, Pradhumna Lal

AU - Hempel, Michael

AU - Ma, Tao

AU - Peng, Dongming

AU - Sharif, Hamid

PY - 2011/12/1

Y1 - 2011/12/1

N2 - Watermarking and steganography are two of the most researched topics in multimedia forensics. However, easy availability of tools and technology has made their misuse a serious concern. To counteract this development some effective tools are necessary to remove malicious steganography. In this work, we introduce a novel watermark attack method which can destroy hidden information embedded in images based on the principle of re-interpolation of Color Filter Array (CFA) artifacts. In digital cameras and scanners, CFA filters are used to acquire low-resolution physical color channel information and produce a high-quality image by subsequent interpolation. We propose to emulate a similar scheme in which image information is removed and reconstructed through interpolation and thereby destroy any hidden information without impairing the visual quality. Most importantly, our presented method is general and does not assume any knowledge of the used watermarking methods, the hidden message or the host image.

AB - Watermarking and steganography are two of the most researched topics in multimedia forensics. However, easy availability of tools and technology has made their misuse a serious concern. To counteract this development some effective tools are necessary to remove malicious steganography. In this work, we introduce a novel watermark attack method which can destroy hidden information embedded in images based on the principle of re-interpolation of Color Filter Array (CFA) artifacts. In digital cameras and scanners, CFA filters are used to acquire low-resolution physical color channel information and produce a high-quality image by subsequent interpolation. We propose to emulate a similar scheme in which image information is removed and reconstructed through interpolation and thereby destroy any hidden information without impairing the visual quality. Most importantly, our presented method is general and does not assume any knowledge of the used watermarking methods, the hidden message or the host image.

KW - Color Filter Array

KW - Multimedia

KW - Re-interpolation

KW - Watermark Attack

KW - Watermark Embedding

UR - http://www.scopus.com/inward/record.url?scp=84857464005&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84857464005&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84857464005

SN - 9781908320001

T3 - 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011

SP - 454

EP - 459

BT - 2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011

ER -