首页 > 最新文献

Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security最新文献

英文 中文
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security 第五届ACM信息隐藏与多媒体安全研讨会论文集
M. Stamm, Matthias Kirchner, S. Voloshynovskiy
Welcome to the 5th ACM Workshop on Information Hiding and Multimedia Security Workshop -- IH&MMSec'17 in Philadelphia, PA, held June 20-21, 2017. In response to our call for papers, 34 excellent papers were submitted from authors throughout North America, Europe, and Asia. The best 18 of these papers were accepted (53% acceptance rate) and assembled into a strong technical program. The accepted papers cover the fields of steganography and steganalysis in digital media, multimedia forensics, digital watermarking, data hiding in natural language, deep learning approaches to both forensics and steganalysis. We sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions. The technical program also includes two invited keynote speakers. The first presentation is given by Dr. Anupam Das from Carnegie Mellon University on the topic of using motion sensors in smartphones to track users. The second presentation is given by Dr. Rachel Greenstadt from Drexel University on the topic of how stylometry and machine learning can be used to determine the author of both written documents and software. As usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants. Also, at the end of the second day before the start of the social event, time is reserved for a rump session during which the participants are encouraged to share their work in progress, discuss unpublished results, demo new products, and make relevant announcements. A great team effort put together the technical program. The Program Committee assisted by 29 external reviewers provided timely and high-quality reviews. A double-blind review process was used to ensure fairness. Each paper was carefully read and appraised by at least three reviewers, however the majority of papers were reviewed by four reviewers. To let the Program Chairs select the best quality and relevant work, papers with conflicting reviews were discussed at length. We thank all participants for their help in putting together this great program.
欢迎参加2017年6月20日至21日在费城举行的第五届ACM信息隐藏和多媒体安全研讨会——IH&MMSec'17。在我们的论文征稿中,来自北美、欧洲和亚洲的作者提交了34篇优秀的论文。其中最好的18篇论文被接受(53%的录取率),并汇编成一个强大的技术方案。被接受的论文涵盖了数字媒体中的隐写和隐写分析、多媒体取证、数字水印、自然语言中的数据隐藏、取证和隐写分析的深度学习方法等领域。我们衷心感谢所有投稿作者的贡献和审稿人的宝贵帮助。我们希望所选的论文能够引起该领域的研究人员以及工业界和政府机构的参与者的广泛兴趣。技术项目还包括两位受邀主讲嘉宾。第一个演讲是由卡内基梅隆大学的Anupam Das博士做的,主题是在智能手机中使用运动传感器来跟踪用户。第二场演讲是由德雷克塞尔大学的Rachel Greenstadt博士做的,主题是如何使用文体学和机器学习来确定书面文档和软件的作者。与往常一样,研讨会分为三天,第二天下午专门用于社交活动。社交活动的目的是促进讨论,并帮助建立参与者之间未来合作的关系。此外,在社交活动开始的第二天结束时,还会预留时间进行收尾环节,鼓励参与者分享他们正在进行的工作,讨论未发表的结果,演示新产品,并发布相关公告。一个伟大的团队共同完成了这个技术项目。项目委员会在29名外部评审人员的协助下,提供了及时、高质量的评审。采用双盲审查程序以确保公平。每篇论文都由至少三位审稿人仔细阅读和评估,但大多数论文是由四位审稿人审查的。为了让项目主席选择最好的质量和相关的工作,论文相互矛盾的评论进行了详细的讨论。我们感谢所有参与者的帮助,使这个伟大的项目得以完成。
{"title":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","authors":"M. Stamm, Matthias Kirchner, S. Voloshynovskiy","doi":"10.1145/3082031","DOIUrl":"https://doi.org/10.1145/3082031","url":null,"abstract":"Welcome to the 5th ACM Workshop on Information Hiding and Multimedia Security Workshop -- IH&MMSec'17 in Philadelphia, PA, held June 20-21, 2017. \u0000 \u0000In response to our call for papers, 34 excellent papers were submitted from authors throughout North America, Europe, and Asia. The best 18 of these papers were accepted (53% acceptance rate) and assembled into a strong technical program. The accepted papers cover the fields of steganography and steganalysis in digital media, multimedia forensics, digital watermarking, data hiding in natural language, deep learning approaches to both forensics and steganalysis. \u0000 \u0000We sincerely thank all the submitting authors for their contributions, and the reviewers for their invaluable help. We expect the selected papers to be of wide interest to researchers working in the field and to participants from industry and from government institutions. \u0000 \u0000The technical program also includes two invited keynote speakers. The first presentation is given by Dr. Anupam Das from Carnegie Mellon University on the topic of using motion sensors in smartphones to track users. The second presentation is given by Dr. Rachel Greenstadt from Drexel University on the topic of how stylometry and machine learning can be used to determine the author of both written documents and software. \u0000 \u0000As usual, the workshop is structured into three days with the afternoon of the second day devoted to a social event. The social event is designed to promote discussions and to help establish relationships for future collaboration among participants. Also, at the end of the second day before the start of the social event, time is reserved for a rump session during which the participants are encouraged to share their work in progress, discuss unpublished results, demo new products, and make relevant announcements. \u0000 \u0000A great team effort put together the technical program. The Program Committee assisted by 29 external reviewers provided timely and high-quality reviews. A double-blind review process was used to ensure fairness. Each paper was carefully read and appraised by at least three reviewers, however the majority of papers were reviewed by four reviewers. To let the Program Chairs select the best quality and relevant work, papers with conflicting reviews were discussed at length. We thank all participants for their help in putting together this great program.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116459453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Stylometry to Attribute Programmers and Writers 用文体学给程序员和作家定性
R. Greenstadt
In this talk, I will discuss my lab's work in the emerging field of adversarial stylometry and machine learning. Machine learning algorithms are increasingly being used in security and privacy domains, in areas that go beyond intrusion or spam detection. For example, in digital forensics, questions often arise about the authors of documents: their identity, demographic background, and whether they can be linked to other documents. The field of stylometry uses linguistic features and machine learning techniques to answer these questions. We have applied stylometry to difficult domains such as underground hacker forums, open source projects (code), and tweets. I will discuss our Doppelgnger Finder algorithm, which enables us to group Sybil accounts on underground forums and detect blogs from Twitter feeds and reddit comments. In addition, I will discuss our work attributing unknown source code and binaries.
在这次演讲中,我将讨论我的实验室在对抗性文体学和机器学习的新兴领域的工作。机器学习算法越来越多地用于安全和隐私领域,而不仅仅是入侵或垃圾邮件检测。例如,在数字取证中,经常会出现关于文件作者的问题:他们的身份、人口统计背景以及他们是否可以与其他文件相关联。文体学领域使用语言特征和机器学习技术来回答这些问题。我们已经将文体学应用于复杂的领域,如地下黑客论坛、开源项目(代码)和tweet。我将讨论我们的Doppelgnger Finder算法,它使我们能够在地下论坛上对Sybil帐户进行分组,并从Twitter提要和reddit评论中检测博客。此外,我将讨论我们对未知源代码和二进制文件的归属工作。
{"title":"Using Stylometry to Attribute Programmers and Writers","authors":"R. Greenstadt","doi":"10.1145/3082031.3092567","DOIUrl":"https://doi.org/10.1145/3082031.3092567","url":null,"abstract":"In this talk, I will discuss my lab's work in the emerging field of adversarial stylometry and machine learning. Machine learning algorithms are increasingly being used in security and privacy domains, in areas that go beyond intrusion or spam detection. For example, in digital forensics, questions often arise about the authors of documents: their identity, demographic background, and whether they can be linked to other documents. The field of stylometry uses linguistic features and machine learning techniques to answer these questions. We have applied stylometry to difficult domains such as underground hacker forums, open source projects (code), and tweets. I will discuss our Doppelgnger Finder algorithm, which enables us to group Sybil accounts on underground forums and detect blogs from Twitter feeds and reddit comments. In addition, I will discuss our work attributing unknown source code and binaries.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128515399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Square Root Law of Steganography: Bringing Theory Closer to Practice 隐写术的平方根定律:使理论更接近实践
Andrew D. Ker
There are two interpretations of the term "square root law of steganography". As a rule of thumb, that the secure capacity of an imperfect stegosystem scales only with the square root of the cover size (not linearly as for perfect stegosystems), it acts as a robust guide in multiple steganographic domains. As a mathematical theorem, it is unfortunately limited to artificial models of covers that are a long way from real digital media objects: independent pixels or first-order stationary Markov chains. It is also limited to models of embedding where the changes are uniformly distributed and, for the most part, independent. This paper brings the theoretical square root law closer to the practice of digital media steganography, by extending it to cases where the covers are Markov Random Fields, including inhomogeneous Markov chains and Ising models. New proof techniques are required. We also consider what a square root law should say about adaptive embedding, where the changes are not uniformly located, and state a conjecture.
“隐写术的平方根定律”一词有两种解释。作为经验法则,不完美的隐写系统的安全能力仅与覆盖大小的平方根相关(不像完美的隐写系统那样呈线性),它在多个隐写领域中起到了强大的指导作用。不幸的是,作为一个数学定理,它仅限于与真实数字媒体对象相去甚远的封面的人工模型:独立像素或一阶固定马尔可夫链。它也局限于嵌入模型,其中的变化是均匀分布的,并且在大多数情况下是独立的。本文通过将理论平方根定律扩展到覆盖马尔可夫随机场的情况,包括非齐次马尔可夫链和伊辛模型,使其更接近数字媒体隐写术的实践。需要新的证明技术。我们还考虑了关于自适应嵌入的平方根定律,其中变化不是均匀分布的,并提出了一个猜想。
{"title":"The Square Root Law of Steganography: Bringing Theory Closer to Practice","authors":"Andrew D. Ker","doi":"10.1145/3082031.3083235","DOIUrl":"https://doi.org/10.1145/3082031.3083235","url":null,"abstract":"There are two interpretations of the term \"square root law of steganography\". As a rule of thumb, that the secure capacity of an imperfect stegosystem scales only with the square root of the cover size (not linearly as for perfect stegosystems), it acts as a robust guide in multiple steganographic domains. As a mathematical theorem, it is unfortunately limited to artificial models of covers that are a long way from real digital media objects: independent pixels or first-order stationary Markov chains. It is also limited to models of embedding where the changes are uniformly distributed and, for the most part, independent. This paper brings the theoretical square root law closer to the practice of digital media steganography, by extending it to cases where the covers are Markov Random Fields, including inhomogeneous Markov chains and Ising models. New proof techniques are required. We also consider what a square root law should say about adaptive embedding, where the changes are not uniformly located, and state a conjecture.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards Imperceptible Natural Language Watermarking for German 德语不可感知自然语言水印研究
Oren Halvani, M. Steinebach, L. Graner
Watermarking natural language is still a challenge in the domain of digital watermarking. Here, only the textual information must be used as a cover. No format changes or modified illustrations are accepted. Still, natural language watermarking (NLW) has some important applications, especially in leakage tracking, where a small set of individually marked copies of a confidently text is distributed. Properties of watermarking schemes such as imperceptibility, blindness or adaptability to non-English languages are of importance here. In order to address these three simultaneously, we present a blind NLW scheme, consisting of four independent embedding methods, which operate on the phonetical, morphological, lexical and syntactical layer of German texts. An evaluation based on 1,645 assessments provided by 131 test persons reveals promising results.
自然语言水印仍然是数字水印领域的一个挑战。在这里,只有文本信息必须用作掩护。不接受格式更改或修改插图。尽管如此,自然语言水印(NLW)仍有一些重要的应用,特别是在泄漏跟踪中,在泄漏跟踪中,一组单独标记的文本副本被分发。水印方案的不可感知性、盲性和对非英语语言的适应性等特性在这里很重要。为了同时解决这三个问题,我们提出了一种盲NLW方案,该方案由四种独立的嵌入方法组成,分别作用于德语文本的语音、形态、词汇和句法层。131名测试人员提供的1645份评估报告显示出了令人鼓舞的结果。
{"title":"Towards Imperceptible Natural Language Watermarking for German","authors":"Oren Halvani, M. Steinebach, L. Graner","doi":"10.1145/3082031.3084682","DOIUrl":"https://doi.org/10.1145/3082031.3084682","url":null,"abstract":"Watermarking natural language is still a challenge in the domain of digital watermarking. Here, only the textual information must be used as a cover. No format changes or modified illustrations are accepted. Still, natural language watermarking (NLW) has some important applications, especially in leakage tracking, where a small set of individually marked copies of a confidently text is distributed. Properties of watermarking schemes such as imperceptibility, blindness or adaptability to non-English languages are of importance here. In order to address these three simultaneously, we present a blind NLW scheme, consisting of four independent embedding methods, which operate on the phonetical, morphological, lexical and syntactical layer of German texts. An evaluation based on 1,645 assessments provided by 131 test persons reveals promising results.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132855490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Minimum Distortion: High Capacity Watermarking Technique for Relational Data 最小失真:关系数据的高容量水印技术
M. L. P. Gort, C. F. Uribe, J. Nummenmaa
In this paper, a new multi-attribute and high capacity image-based watermarking technique for relational data is proposed. The embedding process causes low distortion into the data considering the usability restrictions defined over the marked relation. The conducted experiments show the high resilience of the proposed technique against tuple deletion and tuple addition attacks. An interesting trend of the extracted watermark is analyzed when, within certain limits, if the number of embedded marks is small, the watermark signal far from being compromised, discretely improves in the case of tuple addition attacks. According to the results, marking 13% of the attributes and under an attack of 100% of tuples addition, 96% of the watermark is extracted. Also, while previous techniques embed up to 61% of the watermark, under the same conditions, we guarantee to embed 99.96% of the marks.
提出了一种基于图像的关系数据多属性高容量水印技术。考虑到在标记关系上定义的可用性限制,嵌入过程使数据失真很小。实验结果表明,该技术对元组删除和元组添加攻击具有很高的弹性。分析了提取的水印的一个有趣趋势,即在一定范围内,如果嵌入的水印数量较少,在元组加法攻击的情况下,水印信号不但没有被破坏,反而离散地得到改善。结果表明,标记13%的属性,在100%的元组添加攻击下,水印的提取率为96%。此外,虽然以前的技术嵌入高达61%的水印,在相同的条件下,我们保证嵌入99.96%的标记。
{"title":"A Minimum Distortion: High Capacity Watermarking Technique for Relational Data","authors":"M. L. P. Gort, C. F. Uribe, J. Nummenmaa","doi":"10.1145/3082031.3083241","DOIUrl":"https://doi.org/10.1145/3082031.3083241","url":null,"abstract":"In this paper, a new multi-attribute and high capacity image-based watermarking technique for relational data is proposed. The embedding process causes low distortion into the data considering the usability restrictions defined over the marked relation. The conducted experiments show the high resilience of the proposed technique against tuple deletion and tuple addition attacks. An interesting trend of the extracted watermark is analyzed when, within certain limits, if the number of embedded marks is small, the watermark signal far from being compromised, discretely improves in the case of tuple addition attacks. According to the results, marking 13% of the attributes and under an attack of 100% of tuples addition, 96% of the watermark is extracted. Also, while previous techniques embed up to 61% of the watermark, under the same conditions, we guarantee to embed 99.96% of the marks.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133191890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Image Forensics Based on Transfer Learning and Convolutional Neural Network 基于迁移学习和卷积神经网络的图像取证
Yifeng Zhan, Yifang Chen, Qiong Zhang, Xiangui Kang
There have been a growing number of interests in using the convolutional neural network(CNN) in image forensics, where some excellent methods have been proposed. Training the randomly initialized model from scratch needs a big amount of training data and computational time. To solve this issue, we present a new method of training an image forensic model using prior knowledge transferred from the existing steganalysis model. We also find out that CNN models tend to show poor performance when tested on a different database. With knowledge transfer, we are able to easily train an excellent model for a new database with a small amount of training data from the new database. Performance of our models are evaluated on Bossbase and BOW by detecting five forensic types, including median filtering, resampling, JPEG compression, contrast enhancement and additive Gaussian noise. Through a series of experiments, we demonstrate that our proposed method is very effective in two scenario mentioned above, and our method based on transfer learning can greatly accelerate the convergence of CNN model. The results of these experiments show that our proposed method can detect five different manipulations with an average accuracy of 97.36%.
卷积神经网络(CNN)在图像取证中的应用已经引起了越来越多的兴趣,并提出了一些很好的方法。从头开始训练随机初始化模型需要大量的训练数据和计算时间。为了解决这一问题,我们提出了一种利用现有隐写分析模型的先验知识来训练图像取证模型的新方法。我们还发现CNN模型在不同的数据库上测试时往往表现不佳。通过知识转移,我们可以使用新数据库中的少量训练数据轻松地为新数据库训练出优秀的模型。通过检测五种取证类型,包括中值滤波、重采样、JPEG压缩、对比度增强和加性高斯噪声,我们的模型在bosbase和BOW上进行了性能评估。通过一系列的实验,我们证明了我们提出的方法在上述两种情况下都是非常有效的,并且我们基于迁移学习的方法可以大大加快CNN模型的收敛速度。实验结果表明,该方法可以检测出5种不同的操作,平均准确率为97.36%。
{"title":"Image Forensics Based on Transfer Learning and Convolutional Neural Network","authors":"Yifeng Zhan, Yifang Chen, Qiong Zhang, Xiangui Kang","doi":"10.1145/3082031.3083250","DOIUrl":"https://doi.org/10.1145/3082031.3083250","url":null,"abstract":"There have been a growing number of interests in using the convolutional neural network(CNN) in image forensics, where some excellent methods have been proposed. Training the randomly initialized model from scratch needs a big amount of training data and computational time. To solve this issue, we present a new method of training an image forensic model using prior knowledge transferred from the existing steganalysis model. We also find out that CNN models tend to show poor performance when tested on a different database. With knowledge transfer, we are able to easily train an excellent model for a new database with a small amount of training data from the new database. Performance of our models are evaluated on Bossbase and BOW by detecting five forensic types, including median filtering, resampling, JPEG compression, contrast enhancement and additive Gaussian noise. Through a series of experiments, we demonstrate that our proposed method is very effective in two scenario mentioned above, and our method based on transfer learning can greatly accelerate the convergence of CNN model. The results of these experiments show that our proposed method can detect five different manipulations with an average accuracy of 97.36%.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images 用于JPEG图像隐写分析的相位感知卷积神经网络
Mo Chen, V. Sedighi, M. Boroumand, J. Fridrich
Detection of modern JPEG steganographic algorithms has traditionally relied on features aware of the JPEG phase. In this paper, we port JPEG-phase awareness into the architecture of a convolutional neural network to boost the detection accuracy of such detectors. Another innovative concept introduced into the detector is the "catalyst kernel" that, together with traditional high-pass filters used to pre-process images allows the network to learn kernels more relevant for detection of stego signal introduced by JPEG steganography. Experiments with J-UNIWARD and UED-JC embedding algorithms are used to demonstrate the merit of the proposed design.
传统上,现代JPEG隐写算法的检测依赖于感知JPEG相位的特征。在本文中,我们将jpeg相位感知移植到卷积神经网络的架构中,以提高此类检测器的检测精度。检测器中引入的另一个创新概念是“催化剂内核”,它与用于预处理图像的传统高通滤波器一起,使网络能够学习与JPEG隐写术引入的隐写信号检测更相关的内核。用J-UNIWARD和ed - jc嵌入算法进行了实验,验证了所提设计的优点。
{"title":"JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images","authors":"Mo Chen, V. Sedighi, M. Boroumand, J. Fridrich","doi":"10.1145/3082031.3083248","DOIUrl":"https://doi.org/10.1145/3082031.3083248","url":null,"abstract":"Detection of modern JPEG steganographic algorithms has traditionally relied on features aware of the JPEG phase. In this paper, we port JPEG-phase awareness into the architecture of a convolutional neural network to boost the detection accuracy of such detectors. Another innovative concept introduced into the detector is the \"catalyst kernel\" that, together with traditional high-pass filters used to pre-process images allows the network to learn kernels more relevant for detection of stego signal introduced by JPEG steganography. Experiments with J-UNIWARD and UED-JC embedding algorithms are used to demonstrate the merit of the proposed design.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131948545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry 高嵌入率的文本隐写:利用递归神经网络生成中国古典诗词
Yubo Luo, Yongfeng Huang
We propose a novel text steganography method using RNN Encoder-Decoder structure to generate quatrains, one genre of Chinese poetry. Compared to other text-generation based steganography methods which have either very low embedding rate or flaws in the naturalness of generated texts, our method has higher embedding rate and better text quality. In this paper, we use the LSTM Encoder-Decoder model to generate the first line of a quatrain with a keyword and then generate the following lines one by one. RNN has proved effective in generating poetry, but when applied to steganograpy, poetry quality decreases sharply, because of the redundancy we create to hide information. To overcome this problem, we propose a template-constrained generation method and develop a word-choosing approach using inner-word mutual information. Through a series of experiments, it is proven that our approach outperforms other poetry steganography methods in both embedding rate and poetry quality.
我们提出了一种新的文本隐写方法,使用RNN编码器-解码器结构来生成中国诗歌的一种体裁——四行诗。相比于其他基于文本生成的隐写方法嵌入率很低或生成文本的自然度存在缺陷,我们的方法具有更高的嵌入率和更好的文本质量。在本文中,我们使用LSTM编码器-解码器模型来生成带有关键字的四行诗的第一行,然后依次生成下面的行。RNN在生成诗歌方面已经被证明是有效的,但是当应用于隐写术时,诗歌的质量会急剧下降,因为我们创造了冗余来隐藏信息。为了克服这一问题,我们提出了一种模板约束生成方法,并开发了一种使用内词互信息的选词方法。通过一系列的实验证明,我们的方法在嵌入率和诗歌质量方面都优于其他诗歌隐写方法。
{"title":"Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry","authors":"Yubo Luo, Yongfeng Huang","doi":"10.1145/3082031.3083240","DOIUrl":"https://doi.org/10.1145/3082031.3083240","url":null,"abstract":"We propose a novel text steganography method using RNN Encoder-Decoder structure to generate quatrains, one genre of Chinese poetry. Compared to other text-generation based steganography methods which have either very low embedding rate or flaws in the naturalness of generated texts, our method has higher embedding rate and better text quality. In this paper, we use the LSTM Encoder-Decoder model to generate the first line of a quatrain with a keyword and then generate the following lines one by one. RNN has proved effective in generating poetry, but when applied to steganograpy, poetry quality decreases sharply, because of the redundancy we create to hide information. To overcome this problem, we propose a template-constrained generation method and develop a word-choosing approach using inner-word mutual information. Through a series of experiments, it is proven that our approach outperforms other poetry steganography methods in both embedding rate and poetry quality.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Audio Reversible Watermarking Scheme in the intDCT Domain with Modified Prediction Error Expansion 基于改进预测误差扩展的intDCT域音频可逆水印方案
Alejandra Menendez-Ortiz, C. F. Uribe, José Juan García-Hernández
Reversible watermarking schemes (RWS) allow the restoration of the original signals after the watermarks are extracted. Most RWS for audio signals use time-domain for information hiding, although their transparency is hard to maintain for high embedding capacities. Some audio RWS use the frequency domain to improve transparency; however, their embedding capacity is lower than that of time-domain schemes. In this manuscript a RWS for audio signals is proposed, it differs from other schemes that work with the intDCT domain in the use of auditory masking properties, which are exploited to improve transparency, and the increase on embedding capacity is explored through a modified prediction error expansion (PEE). The payload capacity is 27.5 kbps with a degradation over -2 ODG, which are adequate results for practical audio applications. A generalized multi-bit expansion is proposed and experimental results suggest that higher expansion factors improve transparency.
可逆水印方案(RWS)允许在提取水印后恢复原始信号。大多数音频信号的RWS使用时域进行信息隐藏,但由于嵌入容量大,其透明度难以保持。一些音频RWS使用频域来提高透明度;但是,它们的嵌入能力低于时域格式。在本文中,提出了音频信号的RWS,它与使用intDCT域的其他方案不同,它利用听觉掩蔽特性来提高透明度,并通过改进的预测误差扩展(PEE)来探索嵌入容量的增加。负载容量为27.5 kbps,衰减超过-2 ODG,对于实际音频应用来说已经足够了。提出了一种广义的多比特扩展方法,实验结果表明,更高的扩展系数可以提高透明度。
{"title":"Audio Reversible Watermarking Scheme in the intDCT Domain with Modified Prediction Error Expansion","authors":"Alejandra Menendez-Ortiz, C. F. Uribe, José Juan García-Hernández","doi":"10.1145/3082031.3083246","DOIUrl":"https://doi.org/10.1145/3082031.3083246","url":null,"abstract":"Reversible watermarking schemes (RWS) allow the restoration of the original signals after the watermarks are extracted. Most RWS for audio signals use time-domain for information hiding, although their transparency is hard to maintain for high embedding capacities. Some audio RWS use the frequency domain to improve transparency; however, their embedding capacity is lower than that of time-domain schemes. In this manuscript a RWS for audio signals is proposed, it differs from other schemes that work with the intDCT domain in the use of auditory masking properties, which are exploited to improve transparency, and the increase on embedding capacity is explored through a modified prediction error expansion (PEE). The payload capacity is 27.5 kbps with a degradation over -2 ODG, which are adequate results for practical audio applications. A generalized multi-bit expansion is proposed and experimental results suggest that higher expansion factors improve transparency.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129353219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms 利用Gabor对称和加权直方图改进GFR隐写特征
Chao Xia, Qingxiao Guan, Xianfeng Zhao, Zhoujun Xu, Yi Ma
The GFR (Gabor Filter Residual) features, built as histograms of quantized residuals obtained with 2D Gabor filters, can achieve competitive detection performance against adaptive JPEG steganography. In this paper, an improved version of the GFR is proposed. First, a novel histogram merging method is proposed according to the symmetries between different Gabor filters, thus making the features more compact and robust. Second, a new weighted histogram method is proposed by considering the position of the residual value in a quantization interval, making the features more sensitive to the slight changes in residual values. The experiments are given to demonstrate the effectiveness of our proposed methods.
GFR (Gabor Filter残差)特征是由二维Gabor滤波器获得的量化残差的直方图构建而成,可以与自适应JPEG隐写术相比,实现竞争性的检测性能。本文提出了GFR的改进版本。首先,根据不同Gabor滤波器之间的对称性,提出了一种新的直方图合并方法,使特征更加紧凑和鲁棒。其次,提出了一种新的加权直方图方法,考虑残差值在量化区间内的位置,使特征对残差值的微小变化更加敏感。实验证明了所提方法的有效性。
{"title":"Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms","authors":"Chao Xia, Qingxiao Guan, Xianfeng Zhao, Zhoujun Xu, Yi Ma","doi":"10.1145/3082031.3083243","DOIUrl":"https://doi.org/10.1145/3082031.3083243","url":null,"abstract":"The GFR (Gabor Filter Residual) features, built as histograms of quantized residuals obtained with 2D Gabor filters, can achieve competitive detection performance against adaptive JPEG steganography. In this paper, an improved version of the GFR is proposed. First, a novel histogram merging method is proposed according to the symmetries between different Gabor filters, thus making the features more compact and robust. Second, a new weighted histogram method is proposed by considering the position of the residual value in a quantization interval, making the features more sensitive to the slight changes in residual values. The experiments are given to demonstrate the effectiveness of our proposed methods.","PeriodicalId":431672,"journal":{"name":"Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1