YASS: Yet Another Steganographic Scheme that Resists Blind Steganalysis
Kaushal Solanki, Anindya Sarkar, and B. S. Manjunath
Department of Electrical and Computer Engineering,⋆⋆
University of California,
Santa Barbara, CA 93106
Mayachitra Inc.,
5266 Hollister Avenue,
Santa Barbara, CA 93111
solanki [at] mayachitra.com,anindya [at] ece.ucsb.edu,manj [at] ece.ucsb.edu
Department of Electrical and Computer Engineering,⋆⋆
University of California,
Santa Barbara, CA 93106
Mayachitra Inc.,
5266 Hollister Avenue,
Santa Barbara, CA 93111
solanki [at] mayachitra.com,anindya [at] ece.ucsb.edu,manj [at] ece.ucsb.edu
Abstract
A new, simple, approach for active steganography is pro- posed in this paper that can successfully resist recent blind steganaly- sis methods, in addition to surviving distortion constrained attacks. We present Yet Another Steganographic Scheme (YASS), a method based on embedding data in randomized locations so as to disable the self- calibration process (such as, by cropping a few pixel rows and/or columns to estimate the cover image features) popularly used by blind steganaly- sis schemes. The errors induced in the embedded data due to the fact that the stego signal must be advertised in a specific format such as JPEG, are dealt with by the use of erasure and error correcting codes. For the presented JPEG steganograhic scheme, it is shown that the detection rates of recent blind steganalysis schemes are close to random guessing, thus confirming the practical applicability of the proposed technique. We also note that the presented steganography framework, of hiding in ran- domized locations and using a coding framework to deal with errors, is quite simple yet very generalizable.
9th International Workshop on Information Hiding, Saint Malo, Brittany, France, Jun. 2007.
Node ID: 471 ,
DB ID: 276 ,
Lab: VRL ,
Target: Workshop
Subject: [Digital Watermarking and Data Hiding] « Look up more