Skip to main content
Log in

On YASS’s Non-monotonic Security Performance

  • Short Paper
  • Published:
Circuits, Systems, and Signal Processing Aims and scope Submit manuscript

Abstract

Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper first analyzes this abnormality and points out that it is caused by the non-uniformity in probability of coincidence of \(8\,\times \,8\) embedding blocks and \(8\,\times \,8\) JPEG blocks. Based on this observation, we propose that further randomizing data embedding positions can overcome the non-monotonic security performance. Experimental results have demonstrated a complete removal of bumps in the detection rate curve of YASS after further randomization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. C.-C. Chang, C.-J. Lin, LIBSVM, A library for support vector machines. ACM Trans. Intel. Syst. Technol. 2(3), 27 (2011). Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm. Accessed 10 Sep. 2013

  2. C. Chen, Y. Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations. Proc. IEEE Int. Symp. Circuits Syst. (Seattle, Washington, U.S.A.), pp. 3029–3032 (2008)

  3. A. Delforouzi, M. Pooyan, Adaptive digital audio steganography based on integer wavelet transform. Circuits Syst. Signal Process 27, 247–259 (2008)

    Article  MathSciNet  Google Scholar 

  4. J. Fridrich, Feature- Based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proc. 6th Int. Workshop Information Hiding, pp. 67–81 (2004)

  5. F. Huang, J. Huang, Y.Q. Shi, An experimental study on the security performance of YASS. IEEE Trans. Inf. Forensics Secur. 5, 374–380 (2010)

    Article  Google Scholar 

  6. Y. Kim, Z. Duric, D. Richards, Modified matrix encoding technique for minimal distortion steganography. Proc. 8th Int. Workshop Information Hiding, (Alexandria, VA, USA), pp. 314–327 (2006)

  7. J. Kodovský, T. Pevný, J. Fridrich, Modern steganalysis can detect YASS. Proc IS&T/SPIE, Electronic Imaging, Media Forensics and Security II (N. D. Memon, J. Dittmann, eds), 7541, (San Jose, CA), 754102–754102-11 (2010)

  8. B. Li, Y. Q. Shi, J. Huang, Steganalysis of YASS. Proc. 10th ACM workshop Multimedia and Security, (New York, NY, USA), pp. 139–148 (2008)

  9. NRCS, Nrcs photo gallery, http://photogallery.nrcs.usda.gov. Accessed 10 Sep. 2013

  10. T. Pevný, J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX (E. J. Delp, P. W. Wong, eds.), 6505, (San Jose, CA), pp. 31–314 (2007)

  11. N. Provos, Defending against statistical steganalysis. Proc. 10th USENIX Security Symposium, (Washington DC, USA), pp. 323–335 (2001)

  12. A. Sarkar, K. Solanki, B. S. Manjunath, Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents X (E. J. Delp and P. W. Wong, eds.), 6819, (San Jose, CA), 681917–681917-11 (2008)

  13. Y. Q. Shi, C. Chen, W. Chen, A Markov process based approach to effective attacking JPEG steganography. Proc. 8th Int. Workshop Information Hiding, pp. 249–264 (2006)

  14. K. Solanki, A. Sarkar, B.S. Manjunath, YASS: yet another steganographic scheme that resists blind steganalysis. Proc. 9th Int. Workshop Information Hiding, pp. 16–31 (2007)

  15. A. Sur, A.S. Nair, A. Kumar, A. Jain, S. Nandi, Steganalysis of network packet length based data hiding. Circuits Syst. Signal Process 32, 1239–1256 (2013)

    Article  Google Scholar 

  16. A. Westfeld, F5-a steganographic algorithm. Proc. 4th Int. Workshop Information Hiding, (Pittsburgh, PA, USA), pp. 289–302 (2001)

  17. L. Yu, Y. Zhao, R. Ni, Y. Q. Shi, A high-performance YASS-like scheme using randomized big-blocks. Proc. Int. Conf. Multimedia & Expo., pp. 474–479 (2010)

Download references

Acknowledgments

This work was supported in part by the Natural Science Foundation of China (61210006, 61272355), the Program for Changjiang Scholars and Innovative Research Team in University (IRT 201206), the State Key Laboratory of Rail Traffic Control and Safety (RCS2012ZT010).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao Zhao.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, L., Zhao, Y., Ni, R. et al. On YASS’s Non-monotonic Security Performance. Circuits Syst Signal Process 33, 3527–3537 (2014). https://doi.org/10.1007/s00034-014-9815-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-014-9815-4

Keywords

Navigation