Steganography attack based on Discrete Spring Transform and image geometrization

Qilin Qi, Aaron Sharp, Yaoqing Yang, Dongming Peng, Hamid Sharif

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In order to prevent harmful secret information sharing by steganography, a new active-warden countermeasure approach against steganography is proposed in this paper. Differently from the other countermeasure approaches presented in current literature which need to have some knowledge of the steganographic algorithms to be attacked, our proposed method is a generic method which is independent of any particular steganography methods being utilized. In other words, our approach blindly attacks the steganography without any prior knowledge of the used algorithms or their existence. In general, the hidden information is embedded in a carrier by adjusting the coefficients of the audio or image. In our method, by exploiting the large margin between the numerical value and visual perception of the images, large amounts of visually non-detectable distortions are incurred in the image. As a result, the hidden message is destroyed by this method while the perceptual quality of the image is maintained. Inspired by the print-scan process in which most of the steganographic methods cannot survive, a transform called Discrete Spring Transform (DST) is proposed in this paper as the foundation of our attack algorithm. An image geometrization method is also developed to reconstruct the image in this paper. The simulation results have demonstrated that the PSNR of the attacked image is above 30dB with a high perceptive quality while the BER of the hidden steganographic message in the attacked image is above 0.5.

Original languageEnglish (US)
Title of host publicationIWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages554-558
Number of pages5
ISBN (Electronic)9781479909599
DOIs
StatePublished - Sep 22 2014
Event10th International Wireless Communications and Mobile Computing Conference, IWCMC 2014 - Nicosia, Cyprus
Duration: Aug 4 2014Aug 8 2014

Publication series

NameIWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference

Other

Other10th International Wireless Communications and Mobile Computing Conference, IWCMC 2014
CountryCyprus
CityNicosia
Period8/4/148/8/14

Fingerprint

Steganography
Mathematical transformations

Keywords

  • human visual system
  • multimedia security
  • print-scan process
  • steganography

ASJC Scopus subject areas

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Qi, Q., Sharp, A., Yang, Y., Peng, D., & Sharif, H. (2014). Steganography attack based on Discrete Spring Transform and image geometrization. In IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference (pp. 554-558). [6906416] (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IWCMC.2014.6906416

Steganography attack based on Discrete Spring Transform and image geometrization. / Qi, Qilin; Sharp, Aaron; Yang, Yaoqing; Peng, Dongming; Sharif, Hamid.

IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., 2014. p. 554-558 6906416 (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Qi, Q, Sharp, A, Yang, Y, Peng, D & Sharif, H 2014, Steganography attack based on Discrete Spring Transform and image geometrization. in IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference., 6906416, IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference, Institute of Electrical and Electronics Engineers Inc., pp. 554-558, 10th International Wireless Communications and Mobile Computing Conference, IWCMC 2014, Nicosia, Cyprus, 8/4/14. https://doi.org/10.1109/IWCMC.2014.6906416
Qi Q, Sharp A, Yang Y, Peng D, Sharif H. Steganography attack based on Discrete Spring Transform and image geometrization. In IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc. 2014. p. 554-558. 6906416. (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference). https://doi.org/10.1109/IWCMC.2014.6906416
Qi, Qilin ; Sharp, Aaron ; Yang, Yaoqing ; Peng, Dongming ; Sharif, Hamid. / Steganography attack based on Discrete Spring Transform and image geometrization. IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 554-558 (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference).
@inproceedings{bf8713d850bf42abbf83505e9fedbdce,
title = "Steganography attack based on Discrete Spring Transform and image geometrization",
abstract = "In order to prevent harmful secret information sharing by steganography, a new active-warden countermeasure approach against steganography is proposed in this paper. Differently from the other countermeasure approaches presented in current literature which need to have some knowledge of the steganographic algorithms to be attacked, our proposed method is a generic method which is independent of any particular steganography methods being utilized. In other words, our approach blindly attacks the steganography without any prior knowledge of the used algorithms or their existence. In general, the hidden information is embedded in a carrier by adjusting the coefficients of the audio or image. In our method, by exploiting the large margin between the numerical value and visual perception of the images, large amounts of visually non-detectable distortions are incurred in the image. As a result, the hidden message is destroyed by this method while the perceptual quality of the image is maintained. Inspired by the print-scan process in which most of the steganographic methods cannot survive, a transform called Discrete Spring Transform (DST) is proposed in this paper as the foundation of our attack algorithm. An image geometrization method is also developed to reconstruct the image in this paper. The simulation results have demonstrated that the PSNR of the attacked image is above 30dB with a high perceptive quality while the BER of the hidden steganographic message in the attacked image is above 0.5.",
keywords = "human visual system, multimedia security, print-scan process, steganography",
author = "Qilin Qi and Aaron Sharp and Yaoqing Yang and Dongming Peng and Hamid Sharif",
year = "2014",
month = "9",
day = "22",
doi = "10.1109/IWCMC.2014.6906416",
language = "English (US)",
series = "IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "554--558",
booktitle = "IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference",

}

TY - GEN

T1 - Steganography attack based on Discrete Spring Transform and image geometrization

AU - Qi, Qilin

AU - Sharp, Aaron

AU - Yang, Yaoqing

AU - Peng, Dongming

AU - Sharif, Hamid

PY - 2014/9/22

Y1 - 2014/9/22

N2 - In order to prevent harmful secret information sharing by steganography, a new active-warden countermeasure approach against steganography is proposed in this paper. Differently from the other countermeasure approaches presented in current literature which need to have some knowledge of the steganographic algorithms to be attacked, our proposed method is a generic method which is independent of any particular steganography methods being utilized. In other words, our approach blindly attacks the steganography without any prior knowledge of the used algorithms or their existence. In general, the hidden information is embedded in a carrier by adjusting the coefficients of the audio or image. In our method, by exploiting the large margin between the numerical value and visual perception of the images, large amounts of visually non-detectable distortions are incurred in the image. As a result, the hidden message is destroyed by this method while the perceptual quality of the image is maintained. Inspired by the print-scan process in which most of the steganographic methods cannot survive, a transform called Discrete Spring Transform (DST) is proposed in this paper as the foundation of our attack algorithm. An image geometrization method is also developed to reconstruct the image in this paper. The simulation results have demonstrated that the PSNR of the attacked image is above 30dB with a high perceptive quality while the BER of the hidden steganographic message in the attacked image is above 0.5.

AB - In order to prevent harmful secret information sharing by steganography, a new active-warden countermeasure approach against steganography is proposed in this paper. Differently from the other countermeasure approaches presented in current literature which need to have some knowledge of the steganographic algorithms to be attacked, our proposed method is a generic method which is independent of any particular steganography methods being utilized. In other words, our approach blindly attacks the steganography without any prior knowledge of the used algorithms or their existence. In general, the hidden information is embedded in a carrier by adjusting the coefficients of the audio or image. In our method, by exploiting the large margin between the numerical value and visual perception of the images, large amounts of visually non-detectable distortions are incurred in the image. As a result, the hidden message is destroyed by this method while the perceptual quality of the image is maintained. Inspired by the print-scan process in which most of the steganographic methods cannot survive, a transform called Discrete Spring Transform (DST) is proposed in this paper as the foundation of our attack algorithm. An image geometrization method is also developed to reconstruct the image in this paper. The simulation results have demonstrated that the PSNR of the attacked image is above 30dB with a high perceptive quality while the BER of the hidden steganographic message in the attacked image is above 0.5.

KW - human visual system

KW - multimedia security

KW - print-scan process

KW - steganography

UR - http://www.scopus.com/inward/record.url?scp=84908610869&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84908610869&partnerID=8YFLogxK

U2 - 10.1109/IWCMC.2014.6906416

DO - 10.1109/IWCMC.2014.6906416

M3 - Conference contribution

AN - SCOPUS:84908610869

T3 - IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference

SP - 554

EP - 558

BT - IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference

PB - Institute of Electrical and Electronics Engineers Inc.

ER -