skip to main content
10.1145/3658664.3659660acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper
Open access

Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography

Published: 24 June 2024 Publication History

Abstract

Natural steganography concerns embedding a secret message in a cover-source following some distribution S_1, such that after embedding the distribution of the stego-media mimics another cover-source with distribution S_2 (without embedding). Prior works have studied natural steganography over image files, where S_1 and S_2 correspond to the light intensity distribution of a photo taken respectively at some ISO_1 and ISO_2, and much effort has been dedicated to various embedding methods. On the other hand, while the nature of mimicking the distribution S_2 by embedding messages into S_1 sources means that accurate estimations of such distributions are crucial, relatively little attention has been given to this aspect. Furthermore, deploying these stegosystems in practice requires users to estimate the noise distributions of their cameras, which poses a challenging technological barrier for average users and limits the utility of the stegosystems. An objective of this work is to verify the existing claim that, for each fixed ISO value, the pixel values follow a family of Gaussian distributions where the variance is an affine function of the mean. Towards estimating and verifying the concerned distributions, we have created a comprehensive image dataset with the mainstream Sony A6400 camera in a professional photo-shooting environment. Analyses over our dataset reveal that parameters of the light intensity distributions appear to have more complicated behaviour than reported in prior works -- they seem to depend on the overall exposure level induced by the camera settings. For the ease of analysis, we have also developed a set of tools for automating the parameter estimation process. We believe that these tools will eventually improve the accessibility of natural steganography.

References

[1]
Patrick Bas. 2017. An embedding mechanism for natural steganography after down-sampling. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2127--2131.
[2]
Patrick Bas. 2016. Natural steganography: cover-source switching for better steganography. arXiv preprint arXiv:1607.07824.
[3]
Patrick Bas. 2016. Steganography via cover-source switching. In 2016 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1--6.
[4]
Christian Cachin. 1998. An information-theoretic model for steganography. In Information Hiding. David Aucsmith, (Ed.) Springer Berlin Heidelberg, Berlin, Heidelberg, 306--318. isbn: 978--3--540--49380--8.
[5]
William S. Cleveland. 1979. Robust locally weighted regression and smoothing scatterplots. Journal of the American statistical association, 74, 368, 829--836.
[6]
William S. Cleveland and Susan J. Devlin. 1988. Locally weighted regression: an approach to regression analysis by local fitting. Journal of the American statistical association, 83, 403, 596--610.
[7]
Tomás Denemark, Patrick Bas, and Jessica Fridrich. 2018. Natural steganography in JPEG compressed images. In Electronic Imaging.
[8]
Martin A. Fischler and Robert C. Bolles. 1981. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. Communications of the ACM, 24, 6, 381--395.
[9]
Peter J. Huber. 2004. Robust statistics. Vol. 523. John Wiley & Sons.
[10]
Art B. Owen. 2007. A robust hybrid of lasso and ridge regression. Contemporary Mathematics, 443, 7, 59--72.
[11]
Pranab Kumar Sen. 1968. Estimates of the regression coefficient based on Kendall's tau. Journal of the American statistical association, 63, 324, 1379--1389.
[12]
Théo Taburet, Patrick Bas, Jessica Fridrich, and Wadih Sawaya. 2019. Computing dependencies between DCT coefficients for natural steganography in JPEG domain. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 57--62.
[13]
Théo Taburet, Patrick Bas,Wadih Sawaya, and Jessica Fridrich. 2019. A natural steganography embedding scheme dedicated to color sensors in the JPEG domain. In Electronic Imaging 2019.
[14]
Théo Taburet, Patrick Bas, Wadih Sawaya, and Jessica Fridrich. 2020. Natural steganography in JPEG domain with a linear development pipeline. IEEE Transactions on Information Forensics and Security, 16, 173--186.
[15]
2024. Toolkit for gaussian parameter estimation. https://github.com/gaussianst ego/ns-estimator. (2024).
[16]
Ivy K. Y. Woo, Sheung Yiu, Hoover H. F. Yin, and Russell W. F. Lai. Photos of a White Wall in Varying Illumination Settings using Sony A6400. https://doi.org /10.5281/zenodo.11106590. Zenodo, (May 2024).

Index Terms

  1. Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security
    June 2024
    305 pages
    ISBN:9798400706370
    DOI:10.1145/3658664
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 June 2024

    Check for updates

    Author Tags

    1. dataset
    2. natural steganography
    3. noise distributions

    Qualifiers

    • Short-paper

    Conference

    IH&MMSEC '24
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 139
      Total Downloads
    • Downloads (Last 12 months)139
    • Downloads (Last 6 weeks)33
    Reflects downloads up to 08 Mar 2025

    Other Metrics

    Citations

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media