skip to main content
10.1145/3577163.3595095acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests

Published:28 June 2023Publication History

ABSTRACT

This paper addresses how to fairly compare ROCs of ad hoc (or data driven) detectors with tests derived from statistical models of digital media. We argue that the ways ROCs are typically drawn for each detector type correspond to different hypothesis testing problems with different optimality criteria, making the ROCs uncomparable. To understand the problem and why it occurs, we model a source of natural images as a mixture of scene oracles and derive optimal detectors for the task of image steganalysis. Our goal is to guarantee that, when the data follows the statistical model adopted for the hypothesis test, the ROC of the optimal detector bounds the ROC of the ad hoc detector. While the results are applicable beyond the field of image steganalysis, we use this setup to point out possible inconsistencies when comparing both types of detectors and explain guidelines for their proper comparison. Experiments on an artificial cover source with a known model with real steganographic algorithms and deep learning detectors are used to confirm our claims.

References

  1. P. Bas. Steganography via cover-source switching. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pages 1--6, December 4-7 2016.Google ScholarGoogle ScholarCross RefCross Ref
  2. P. Bas, T. Filler, and T. Pevný. Break our steganographic system - the ins and outs of organizing BOSS. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, volume 6958 of Lecture Notes in Computer Science, pages 59--70, Prague, Czech Republic, May 18-20, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  3. P. Bas and T. Furon. BOWS-2. http://bows2.ec-lille.fr, July 2007.Google ScholarGoogle Scholar
  4. R. Böhme. Improved Statistical Steganalysis Using Models of Heterogeneous Cover Signals. PhD thesis, Faculty of Computer Science, Technische Universität Dresden, Germany, 2008.Google ScholarGoogle Scholar
  5. M. Boroumand, J. Fridrich, and R. Cogranne. Are we there yet" In A. Alattar and N. D. Memon, editors, Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 26-30, 2019.Google ScholarGoogle Scholar
  6. J. Butora and J. Fridrich. Reverse JPEG compatibility attack. IEEE Transactions on Information Forensics and Security, 15:1444--1454, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Butora, Y. Yousfi, and J. Fridrich. How to pretrain for steganalysis. In D. Borghys and P. Bas, editors, The 9th ACM Workshop on Information Hiding and Multimedia Security, Brussels, Belgium, 2021. ACM Press.Google ScholarGoogle Scholar
  8. R. Cogranne. Selection-channel-aware reverse JPEG compatibility for highly reliable steganalysis of JPEG images. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, pages 2772--2776, Barcelona, Spain, May 4-8, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. Cogranne, Q. Giboulot, and P. Bas. The ALASKA steganalysis challenge: A first step towards steganalysis "Into the wild". In R. Cogranne and L. Verdoliva, editors, The 7th ACM Workshop on Information Hiding and Multimedia Security, Paris, France, July 3-5, 2019. ACM Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Cogranne and F. Retraint. Application of hypothesis testing theory for optimal detection of LSB matching data hiding. Signal Processing, 93(7):1724--1737, July, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Cogranne and F. Retraint. An asymptotically uniformly most powerful test for LSB Matching detection. IEEE Transactions on Information Forensics and Security, 8(3):464--476, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Cogranne, V. Sedighi, T. Pevný, and J. Fridrich. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? In IEEE International Workshop on Information Forensics and Security, Rome, Italy, November 16-19, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. Cogranne, C. Zitzmann, L. Fillatre, F. Retraint, I. Nikiforov, and P. Cornu. A cover image model for reliable steganalysis. In T. Filler, T. Pevný, A. Ker, and S. Craver, editors, Information Hiding, 13th International Conference, Lecture Notes in Computer Science, pages 178--192, Prague, Czech Republic, May 18-20, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. Cogranne, C. Zitzmann, F. Retraint, I. Nikiforov, L. Fillatre, and P. Cornu. Statistical detection of LSB Matching using hypothesis testing theory. In M. Kirchner and D. Ghosal, editors, Information Hiding, 14th International Conference, volume 7692 of Lecture Notes in Computer Science, pages 46--62, Berkeley, California, May 15-18, 2012.Google ScholarGoogle Scholar
  15. E. Dworetzky, E. Kaziakhmedov, and J. Fridrich. Advancing the JPEG com- patibility attack: Theory, performance, robustness, and practice. In Y. Yousfi, C. Pasquini, and A. Bharati, editors, The 11th ACM Workshop on Information Hiding and Multimedia Security, Chicago, IL, June 28--30, 2023. ACM Press.Google ScholarGoogle Scholar
  16. L. Fillatre. Adaptive steganalysis of least significant bit replacement in grayscale images. IEEE Transactions on Signal Processing, 60(2):556--569, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Filler and J. Fridrich. Fisher information determines capacity of ∈-secure steganography. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of Lecture Notes in Computer Science, pages 31--47, Darmstadt, Germany, June 7-10, 2009. Springer-Verlag, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Fridrich and J. Kodovský. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 7(3):868--882, June 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Q. Giboulot, P. Bas, and R. Cogranne. Multivariate side-informed Gaussian embedding minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 17:1841--1854, 2022.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Q. Giboulot, R. Cogranne, and P. Bas. Detectability-based JPEG steganography modeling the processing pipeline: The noise-content trade-off. IEEE Transactions on Information Forensics and Security, 16:2202--2217, 2021.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. V. Holub, J. Fridrich, and T. Denemark. Universal distortion design for stegano- graphy in an arbitrary domain. EURASIP Journal on Information Security, Special Issue on Revised Selected Papers of the 1st ACM IH and MMS Workshop, 2014:1, 2014.Google ScholarGoogle Scholar
  22. J. Indritz. An inequality for Hermite polynomials. 12(6):981--983, 1961.Google ScholarGoogle Scholar
  23. S. M. Kay. Fundamentals of Statistical Signal Processing, Volume II: Detection Theory, volume II. Upper Saddle River, NJ: Prentice Hall, 1998.Google ScholarGoogle Scholar
  24. A. D. Ker. Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6):441--444, June 2005.Google ScholarGoogle ScholarCross RefCross Ref
  25. A. D. Ker. Estimating steganographic fisher information in real images. In S. Katzenbeisser and A.-R. Sadeghi, editors, Information Hiding, 11th International Conference, volume 5806 of Lecture Notes in Computer Science, pages 73--88, Darmstadt, Germany, June 7-10, 2009. Springer-Verlag, New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. D. Ker. On the relationship between embedding costs and steganographic capacity. In M. Stamm, M. Kirchner, and S. Voloshynovskiy, editors, The 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, June 20-22, 2017. ACM Press.Google ScholarGoogle Scholar
  27. K. Lee and A. Westfeld. Generalized category attack - improving histogram- based attack on JPEG LSB embedding. In T. Furon, F. Cayre, G. Doërr, and P. Bas, editors, Information Hiding, 9th International Workshop, volume 4567 of Lecture Notes in Computer Science, pages 378--392, Saint Malo, France, June 11-13, 2007. Springer-Verlag, Berlin.Google ScholarGoogle ScholarCross RefCross Ref
  28. E.L. Lehmann and J.P. Romano. Testing Statistical Hypotheses, Third Edition. Springer, 3rd edition, 2005.Google ScholarGoogle Scholar
  29. B. Li, M. Wang, and J. Huang. A new cost function for spatial image steganography. In Proceedings IEEE, International Conference on Image Processing, ICIP, Paris, France, October 27--30, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  30. J. Magnus and H. Neudecker. Matrix Differential Calculus with Applications in Statistics and Econometrics. John Wiley & Sons, 3rd edition, 2007.Google ScholarGoogle Scholar
  31. M. K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin. Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters, 6(12):300--303, December 1999.Google ScholarGoogle ScholarCross RefCross Ref
  32. V. Sedighi, R. Cogranne, and J. Fridrich. Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 11(2):221--234, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. T. Taburet, P. Bas, W. Sawaya, and J. Fridrich. A natural steganography embed- ding scheme dedicated to color sensors in the JPEG domain. In A. Alattar and N. D. Memon, editors, Proceedings IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2019, San Francisco, CA, January 26-30, 2019.Google ScholarGoogle Scholar
  34. T. Thai, R. Cogranne, and F. Retraint. Statistical model of quantized DCT coeffi- cients: Application in the steganalysis of Jsteg algorithm. Image Processing, IEEE Transactions on, 23(5):1--14, May 2014.Google ScholarGoogle Scholar
  35. T. H. Thai, R. Cogranne, and F. Retraint. Optimal detection of OutGuess using an accurate model of DCT coefficients. In Sixth IEEE International Workshop on Information Forensics and Security, Atlanta, GA, December 3-5, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  36. Thanh Hai Thai, R. Cogranne, and F. Retraint. Camera model identification based on the heteroscedastic noise model. Image Processing, IEEE Transactions on, 23(1):250--263, Jan 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. J. Zhang, I. J. Cox, and G. Doerr. Steganalysis for LSB matching in images with high-frequency noise. In IEEE 9th Workshop on Multimedia Signal Processing, pages 385--388, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  38. T. Zhang and X. Ping. A fast and effective steganalytic technique against Jsteg- like algorithms. In Proceedings of the ACM Symposium on Applied Computing, pages 307--311, Melbourne, FL, March 9-12, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On Comparing Ad Hoc Detectors with Statistical Hypothesis Tests

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IH&MMSec '23: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security
          June 2023
          190 pages
          ISBN:9798400700545
          DOI:10.1145/3577163

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 June 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate128of318submissions,40%
        • Article Metrics

          • Downloads (Last 12 months)45
          • Downloads (Last 6 weeks)6

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader