A novel active warden steganographic attack for next-generation steganography

Aaron Sharp, Qilin Qi, Yaoqing Yang, Dongming Peng, Hamid Sharif

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Digital steganography is often divided into two categories of research: steganographer and attacker, where a steganographer attempts to successfully hide the existence of hidden data and an attacker attempts to uncover and destroy said data. Often steganographic attacks utilize passive techniques, where the attacker monitors messages and alters or destroys the cover media only if the media is suspected to contain a message. Passive attacks are much more prevalent than active attacks for a variety of reasons. Generally passive attacks are more efficient and effective in determining the existence of hidden data in a given cover media, however, most passive attacks are not generic enough to detect the presence of a hidden message outside of a very small subset of steganographic algorithms. Conversely, current active attacks are very cost effective and often severely degrade or destroy the quality of the cover media. In this paper, we propose a novel active steganographic attack called the Discrete Spring Transform (DST). The concept of the DST attack is that of likening the cover media to a spring, in that it can be physically altered or manipulated in a manner of ways, while the basic structure and integrity of the spring is preserved despite these alterations. Since many steganographic schemes rely on the fact that the cover media remains somewhat stable the DST is effective in destroying the stego media for such types of steganographic algorithms. It follows that the DST is an effective and highly adaptable active attack that can be applied to a variety of cover media, including video. We will demonstrate that the attack is capable of defeating next-generation steganographic algorithms, including motion-vector steganography and RST-resilient algorithms by increasing the Bit Error Rate (BER) of the steganographic algorithm to approximately 0.5 while maintaining the quality of the cover media, where the Peak Signal-to-Noise Ratio (PSNR) of the image-derived media always remains above 30db.

Original languageEnglish (US)
Title of host publication2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013
Pages1138-1143
Number of pages6
DOIs
StatePublished - Sep 16 2013
Event2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013 - Cagliari, Sardinia, Italy
Duration: Jul 1 2013Jul 5 2013

Publication series

Name2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013

Other

Other2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013
CountryItaly
CityCagliari, Sardinia
Period7/1/137/5/13

Fingerprint

Steganography
Mathematical transformations
Set theory
Bit error rate
Signal to noise ratio
Costs

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Sharp, A., Qi, Q., Yang, Y., Peng, D., & Sharif, H. (2013). A novel active warden steganographic attack for next-generation steganography. In 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013 (pp. 1138-1143). [6583717] (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013). https://doi.org/10.1109/IWCMC.2013.6583717

A novel active warden steganographic attack for next-generation steganography. / Sharp, Aaron; Qi, Qilin; Yang, Yaoqing; Peng, Dongming; Sharif, Hamid.

2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. 2013. p. 1138-1143 6583717 (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sharp, A, Qi, Q, Yang, Y, Peng, D & Sharif, H 2013, A novel active warden steganographic attack for next-generation steganography. in 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013., 6583717, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, pp. 1138-1143, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Cagliari, Sardinia, Italy, 7/1/13. https://doi.org/10.1109/IWCMC.2013.6583717
Sharp A, Qi Q, Yang Y, Peng D, Sharif H. A novel active warden steganographic attack for next-generation steganography. In 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. 2013. p. 1138-1143. 6583717. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013). https://doi.org/10.1109/IWCMC.2013.6583717
Sharp, Aaron ; Qi, Qilin ; Yang, Yaoqing ; Peng, Dongming ; Sharif, Hamid. / A novel active warden steganographic attack for next-generation steganography. 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. 2013. pp. 1138-1143 (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).
@inproceedings{bd2861adb96e4137bcddc64732fb1a25,
title = "A novel active warden steganographic attack for next-generation steganography",
abstract = "Digital steganography is often divided into two categories of research: steganographer and attacker, where a steganographer attempts to successfully hide the existence of hidden data and an attacker attempts to uncover and destroy said data. Often steganographic attacks utilize passive techniques, where the attacker monitors messages and alters or destroys the cover media only if the media is suspected to contain a message. Passive attacks are much more prevalent than active attacks for a variety of reasons. Generally passive attacks are more efficient and effective in determining the existence of hidden data in a given cover media, however, most passive attacks are not generic enough to detect the presence of a hidden message outside of a very small subset of steganographic algorithms. Conversely, current active attacks are very cost effective and often severely degrade or destroy the quality of the cover media. In this paper, we propose a novel active steganographic attack called the Discrete Spring Transform (DST). The concept of the DST attack is that of likening the cover media to a spring, in that it can be physically altered or manipulated in a manner of ways, while the basic structure and integrity of the spring is preserved despite these alterations. Since many steganographic schemes rely on the fact that the cover media remains somewhat stable the DST is effective in destroying the stego media for such types of steganographic algorithms. It follows that the DST is an effective and highly adaptable active attack that can be applied to a variety of cover media, including video. We will demonstrate that the attack is capable of defeating next-generation steganographic algorithms, including motion-vector steganography and RST-resilient algorithms by increasing the Bit Error Rate (BER) of the steganographic algorithm to approximately 0.5 while maintaining the quality of the cover media, where the Peak Signal-to-Noise Ratio (PSNR) of the image-derived media always remains above 30db.",
author = "Aaron Sharp and Qilin Qi and Yaoqing Yang and Dongming Peng and Hamid Sharif",
year = "2013",
month = "9",
day = "16",
doi = "10.1109/IWCMC.2013.6583717",
language = "English (US)",
isbn = "9781467324793",
series = "2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013",
pages = "1138--1143",
booktitle = "2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013",

}

TY - GEN

T1 - A novel active warden steganographic attack for next-generation steganography

AU - Sharp, Aaron

AU - Qi, Qilin

AU - Yang, Yaoqing

AU - Peng, Dongming

AU - Sharif, Hamid

PY - 2013/9/16

Y1 - 2013/9/16

N2 - Digital steganography is often divided into two categories of research: steganographer and attacker, where a steganographer attempts to successfully hide the existence of hidden data and an attacker attempts to uncover and destroy said data. Often steganographic attacks utilize passive techniques, where the attacker monitors messages and alters or destroys the cover media only if the media is suspected to contain a message. Passive attacks are much more prevalent than active attacks for a variety of reasons. Generally passive attacks are more efficient and effective in determining the existence of hidden data in a given cover media, however, most passive attacks are not generic enough to detect the presence of a hidden message outside of a very small subset of steganographic algorithms. Conversely, current active attacks are very cost effective and often severely degrade or destroy the quality of the cover media. In this paper, we propose a novel active steganographic attack called the Discrete Spring Transform (DST). The concept of the DST attack is that of likening the cover media to a spring, in that it can be physically altered or manipulated in a manner of ways, while the basic structure and integrity of the spring is preserved despite these alterations. Since many steganographic schemes rely on the fact that the cover media remains somewhat stable the DST is effective in destroying the stego media for such types of steganographic algorithms. It follows that the DST is an effective and highly adaptable active attack that can be applied to a variety of cover media, including video. We will demonstrate that the attack is capable of defeating next-generation steganographic algorithms, including motion-vector steganography and RST-resilient algorithms by increasing the Bit Error Rate (BER) of the steganographic algorithm to approximately 0.5 while maintaining the quality of the cover media, where the Peak Signal-to-Noise Ratio (PSNR) of the image-derived media always remains above 30db.

AB - Digital steganography is often divided into two categories of research: steganographer and attacker, where a steganographer attempts to successfully hide the existence of hidden data and an attacker attempts to uncover and destroy said data. Often steganographic attacks utilize passive techniques, where the attacker monitors messages and alters or destroys the cover media only if the media is suspected to contain a message. Passive attacks are much more prevalent than active attacks for a variety of reasons. Generally passive attacks are more efficient and effective in determining the existence of hidden data in a given cover media, however, most passive attacks are not generic enough to detect the presence of a hidden message outside of a very small subset of steganographic algorithms. Conversely, current active attacks are very cost effective and often severely degrade or destroy the quality of the cover media. In this paper, we propose a novel active steganographic attack called the Discrete Spring Transform (DST). The concept of the DST attack is that of likening the cover media to a spring, in that it can be physically altered or manipulated in a manner of ways, while the basic structure and integrity of the spring is preserved despite these alterations. Since many steganographic schemes rely on the fact that the cover media remains somewhat stable the DST is effective in destroying the stego media for such types of steganographic algorithms. It follows that the DST is an effective and highly adaptable active attack that can be applied to a variety of cover media, including video. We will demonstrate that the attack is capable of defeating next-generation steganographic algorithms, including motion-vector steganography and RST-resilient algorithms by increasing the Bit Error Rate (BER) of the steganographic algorithm to approximately 0.5 while maintaining the quality of the cover media, where the Peak Signal-to-Noise Ratio (PSNR) of the image-derived media always remains above 30db.

UR - http://www.scopus.com/inward/record.url?scp=84883702905&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883702905&partnerID=8YFLogxK

U2 - 10.1109/IWCMC.2013.6583717

DO - 10.1109/IWCMC.2013.6583717

M3 - Conference contribution

AN - SCOPUS:84883702905

SN - 9781467324793

T3 - 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013

SP - 1138

EP - 1143

BT - 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013

ER -