Abstract
Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper first analyzes this abnormality and points out that it is caused by the non-uniformity in probability of coincidence of \(8\,\times \,8\) embedding blocks and \(8\,\times \,8\) JPEG blocks. Based on this observation, we propose that further randomizing data embedding positions can overcome the non-monotonic security performance. Experimental results have demonstrated a complete removal of bumps in the detection rate curve of YASS after further randomization.
Similar content being viewed by others
References
C.-C. Chang, C.-J. Lin, LIBSVM, A library for support vector machines. ACM Trans. Intel. Syst. Technol. 2(3), 27 (2011). Software available at http://www.csie.ntu.edu.tw/ cjlin/libsvm. Accessed 10 Sep. 2013
C. Chen, Y. Q. Shi, JPEG image steganalysis utilizing both intrablock and interblock correlations. Proc. IEEE Int. Symp. Circuits Syst. (Seattle, Washington, U.S.A.), pp. 3029–3032 (2008)
A. Delforouzi, M. Pooyan, Adaptive digital audio steganography based on integer wavelet transform. Circuits Syst. Signal Process 27, 247–259 (2008)
J. Fridrich, Feature- Based steganalysis for JPEG images and its implications for future design of steganographic schemes. Proc. 6th Int. Workshop Information Hiding, pp. 67–81 (2004)
F. Huang, J. Huang, Y.Q. Shi, An experimental study on the security performance of YASS. IEEE Trans. Inf. Forensics Secur. 5, 374–380 (2010)
Y. Kim, Z. Duric, D. Richards, Modified matrix encoding technique for minimal distortion steganography. Proc. 8th Int. Workshop Information Hiding, (Alexandria, VA, USA), pp. 314–327 (2006)
J. Kodovský, T. Pevný, J. Fridrich, Modern steganalysis can detect YASS. Proc IS&T/SPIE, Electronic Imaging, Media Forensics and Security II (N. D. Memon, J. Dittmann, eds), 7541, (San Jose, CA), 754102–754102-11 (2010)
B. Li, Y. Q. Shi, J. Huang, Steganalysis of YASS. Proc. 10th ACM workshop Multimedia and Security, (New York, NY, USA), pp. 139–148 (2008)
NRCS, Nrcs photo gallery, http://photogallery.nrcs.usda.gov. Accessed 10 Sep. 2013
T. Pevný, J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX (E. J. Delp, P. W. Wong, eds.), 6505, (San Jose, CA), pp. 31–314 (2007)
N. Provos, Defending against statistical steganalysis. Proc. 10th USENIX Security Symposium, (Washington DC, USA), pp. 323–335 (2001)
A. Sarkar, K. Solanki, B. S. Manjunath, Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents X (E. J. Delp and P. W. Wong, eds.), 6819, (San Jose, CA), 681917–681917-11 (2008)
Y. Q. Shi, C. Chen, W. Chen, A Markov process based approach to effective attacking JPEG steganography. Proc. 8th Int. Workshop Information Hiding, pp. 249–264 (2006)
K. Solanki, A. Sarkar, B.S. Manjunath, YASS: yet another steganographic scheme that resists blind steganalysis. Proc. 9th Int. Workshop Information Hiding, pp. 16–31 (2007)
A. Sur, A.S. Nair, A. Kumar, A. Jain, S. Nandi, Steganalysis of network packet length based data hiding. Circuits Syst. Signal Process 32, 1239–1256 (2013)
A. Westfeld, F5-a steganographic algorithm. Proc. 4th Int. Workshop Information Hiding, (Pittsburgh, PA, USA), pp. 289–302 (2001)
L. Yu, Y. Zhao, R. Ni, Y. Q. Shi, A high-performance YASS-like scheme using randomized big-blocks. Proc. Int. Conf. Multimedia & Expo., pp. 474–479 (2010)
Acknowledgments
This work was supported in part by the Natural Science Foundation of China (61210006, 61272355), the Program for Changjiang Scholars and Innovative Research Team in University (IRT 201206), the State Key Laboratory of Rail Traffic Control and Safety (RCS2012ZT010).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, L., Zhao, Y., Ni, R. et al. On YASS’s Non-monotonic Security Performance. Circuits Syst Signal Process 33, 3527–3537 (2014). https://doi.org/10.1007/s00034-014-9815-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00034-014-9815-4