Generic attack against robust steganography based on spring transform and geometrization

Qilin Qi, Aaron Sharp, Dongming Peng, Yaoqing Yang, Hamid Sharif

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

There have been many robust image steganography methods that are invented in recent decades. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of the security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of images while not affecting the normal digital images becomes a challenging problem. Existing steganalysis methods or steganography attacking methods cannot be used for analyzing a large volume of digital images in a short time. In this paper, we propose an effective steganography attacking method that is not limited by the types of the steganography method. The proposed method can process the digital images to remove the potentially dangerous hidden information while keeping the digital image in a high visual quality. Inspired by the way in which printers and scanners work, our method decouples the human visual perception and the digital image's numerical values. It causes the numerical values of the image to change dramatically, and then the hidden information are largely damaged, while at the same time, the visual image quality can be maintained. Our experimental results have demonstrated that the peak signal-to-noise ratio of images can be above 32 dB while the stego data are destroyed.

Original languageEnglish (US)
Pages (from-to)3880-3892
Number of pages13
JournalSecurity and Communication Networks
Volume9
Issue number16
DOIs
StatePublished - Nov 10 2016

Fingerprint

Steganography
Internet
Image quality
Signal to noise ratio

Keywords

  • edge detector
  • human visual system
  • image steganography
  • network security

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Cite this

Generic attack against robust steganography based on spring transform and geometrization. / Qi, Qilin; Sharp, Aaron; Peng, Dongming; Yang, Yaoqing; Sharif, Hamid.

In: Security and Communication Networks, Vol. 9, No. 16, 10.11.2016, p. 3880-3892.

Research output: Contribution to journalArticle

Qi, Qilin ; Sharp, Aaron ; Peng, Dongming ; Yang, Yaoqing ; Sharif, Hamid. / Generic attack against robust steganography based on spring transform and geometrization. In: Security and Communication Networks. 2016 ; Vol. 9, No. 16. pp. 3880-3892.
@article{9539e32e9fa3406f83e0314888b31098,
title = "Generic attack against robust steganography based on spring transform and geometrization",
abstract = "There have been many robust image steganography methods that are invented in recent decades. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of the security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of images while not affecting the normal digital images becomes a challenging problem. Existing steganalysis methods or steganography attacking methods cannot be used for analyzing a large volume of digital images in a short time. In this paper, we propose an effective steganography attacking method that is not limited by the types of the steganography method. The proposed method can process the digital images to remove the potentially dangerous hidden information while keeping the digital image in a high visual quality. Inspired by the way in which printers and scanners work, our method decouples the human visual perception and the digital image's numerical values. It causes the numerical values of the image to change dramatically, and then the hidden information are largely damaged, while at the same time, the visual image quality can be maintained. Our experimental results have demonstrated that the peak signal-to-noise ratio of images can be above 32 dB while the stego data are destroyed.",
keywords = "edge detector, human visual system, image steganography, network security",
author = "Qilin Qi and Aaron Sharp and Dongming Peng and Yaoqing Yang and Hamid Sharif",
year = "2016",
month = "11",
day = "10",
doi = "10.1002/sec.1583",
language = "English (US)",
volume = "9",
pages = "3880--3892",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",
number = "16",

}

TY - JOUR

T1 - Generic attack against robust steganography based on spring transform and geometrization

AU - Qi, Qilin

AU - Sharp, Aaron

AU - Peng, Dongming

AU - Yang, Yaoqing

AU - Sharif, Hamid

PY - 2016/11/10

Y1 - 2016/11/10

N2 - There have been many robust image steganography methods that are invented in recent decades. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of the security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of images while not affecting the normal digital images becomes a challenging problem. Existing steganalysis methods or steganography attacking methods cannot be used for analyzing a large volume of digital images in a short time. In this paper, we propose an effective steganography attacking method that is not limited by the types of the steganography method. The proposed method can process the digital images to remove the potentially dangerous hidden information while keeping the digital image in a high visual quality. Inspired by the way in which printers and scanners work, our method decouples the human visual perception and the digital image's numerical values. It causes the numerical values of the image to change dramatically, and then the hidden information are largely damaged, while at the same time, the visual image quality can be maintained. Our experimental results have demonstrated that the peak signal-to-noise ratio of images can be above 32 dB while the stego data are destroyed.

AB - There have been many robust image steganography methods that are invented in recent decades. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of the security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of images while not affecting the normal digital images becomes a challenging problem. Existing steganalysis methods or steganography attacking methods cannot be used for analyzing a large volume of digital images in a short time. In this paper, we propose an effective steganography attacking method that is not limited by the types of the steganography method. The proposed method can process the digital images to remove the potentially dangerous hidden information while keeping the digital image in a high visual quality. Inspired by the way in which printers and scanners work, our method decouples the human visual perception and the digital image's numerical values. It causes the numerical values of the image to change dramatically, and then the hidden information are largely damaged, while at the same time, the visual image quality can be maintained. Our experimental results have demonstrated that the peak signal-to-noise ratio of images can be above 32 dB while the stego data are destroyed.

KW - edge detector

KW - human visual system

KW - image steganography

KW - network security

UR - http://www.scopus.com/inward/record.url?scp=84991065401&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84991065401&partnerID=8YFLogxK

U2 - 10.1002/sec.1583

DO - 10.1002/sec.1583

M3 - Article

AN - SCOPUS:84991065401

VL - 9

SP - 3880

EP - 3892

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 16

ER -