Cover Estimation and Payload Location using Markov Random Fields Tu-Thach Quach Sandia National Laboratories

SPIE/IS&T EI 2014 February 4, 2014

Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.

Payload Location: Simple LSB

Payload Location: Simple LSB

Best case: log2 m images to locate payload.

Quach, T.-T., “Optimal Cover Estimation Methods and Steganographic Payload Location,” IEEE Trans. Info. Forensics and Security, 2011.

Payload Location: Group-Parity

Payload Location: Group-Parity

Payload Location: Group-Parity

Payload Location: Group-Parity

Best case: 8k 2 log(km) images to locate payload.

Quach, T.-T., “Locating Payload Embedded by Group-Parity Steganography,” Digital Investigation, 2012.

Practical Payload Location

• Problem: which pixels have been modified?

Practical Payload Location

• Problem: which pixels have been modified? • Approach: estimate the cover image

Cover Estimation Given stego image s, estimate cover image: b c = arg max p(c|s). c

Cover Estimation Given stego image s, estimate cover image: b c = arg max p(c|s). c

• Previous work MAP estimators: →, ←, ↑, ↓, %, &, -, .

Cover Estimation Given stego image s, estimate cover image: b c = arg max p(c|s). c

• Previous work MAP estimators: →, ←, ↑, ↓, %, &, -, . • Current work Markov random fields (MRF): capture 2D statistics in images

Cover Estimation Given stego image s, estimate cover image: b c = arg max p(c|s). c

• Previous work MAP estimators: →, ←, ↑, ↓, %, &, -, . • Current work Markov random fields (MRF): capture 2D statistics in images • Use several cover estimators: error → 0 as number of cover

estimators → ∞

Quach, T., “Locatability of Modified Pixels in Steganographic Images,” in Media Watermarking, Security, and Forensics 2012, Proc. SPIE, 2012.

Markov Random Field

x: input observations, e.g., stego pixels y: output labels, e.g., cover pixels w: model parameters Conditional distribution: p(y|x; w) =

1 e −E (y|x;w) . Z (x; w)

Energy Function Popular energy function: X X fi (yi |x) +w2 E (y|x; w) = w1 fij (yi , yj |x) . | {z } | {z } i∈V

x2

x1 y1 x4

x3 y2

x5 y4

x7

y3 x6

y5 x8

y7

ij∈E

Unary

y6 x9

y8

y9

4-connected grid

Pairwise

Inferencing

Maximum a posteriori (MAP) inferencing: y∗ = argmax p(y|x; w) = argmin E (y|x; w). y

y

Inferencing

Maximum a posteriori (MAP) inferencing: y∗ = argmax p(y|x; w) = argmin E (y|x; w). y

Techniques (NP-Hard in general): • Belief propagation. • Integer programming. • Graph cut.

y

Graph Cut

If y is a binary vector and every fij satisfies submodularity: fij (0, 0|x) + fij (1, 1|x) ≤ fij (0, 1|x) + fij (1, 0|x), a global solution of E can be found in polynomial time using graph cuts.

Kolmogorov, V., Zabih, R., “What Energy Functions Can Be Minimized via Graph Cuts,” IEEE Trans. Pattern Anal. Mach. Intell., 2004.

Graph Cut

0

0

...

...

...

...

1

1

Graph Cut

0

0

...

...

...

...

1

1

Graph Cut

0

0

...

...

...

...

1

1

fij (yi , yj |x) =

a c

b d

= a + (c − a)yi + (d − c)yj + (b + c − a − d)¯ y i yj Assume c − a > 0 and c − d > 0 0

1

fij (yi , yj |x) =

a c

b d

= a + (c − a)yi + (d − c)yj + (b + c − a − d)¯ y i yj Assume c − a > 0 and c − d > 0 0

c-a

j

i

1

fij (yi , yj |x) =

a c

b d

= a + (c − a)yi + (d − c)yj + (b + c − a − d)¯ y i yj Assume c − a > 0 and c − d > 0 0

c-a

j

i

c-d

1

fij (yi , yj |x) =

a c

b d

= a + (c − a)yi + (d − c)yj + (b + c − a − d)¯ y i yj Assume c − a > 0 and c − d > 0 0

c-a

 j

i

c-d

1

Non-Submodular MRF Original non-submodular MRF: X X X fij (yi , yj |x) +w2 fi (yi |x) + w2 E (y|x; w) = w1 f˜ij (yi , yj |x) | {z } | {z } i∈V

ij∈E

submodular

ij∈E

non-submodular

Non-Submodular MRF Original non-submodular MRF: X X X fij (yi , yj |x) +w2 fi (yi |x) + w2 E (y|x; w) = w1 f˜ij (yi , yj |x) | {z } | {z } ij∈E

i∈V

submodular

ij∈E

non-submodular

Quadratic pseudo-boolean optimization (QPBO) relaxation:  X 1 1 0 E (y, ¯ y|x; w) = w1 fi (yi |x) + fi (1 − y¯i |x) 2 2 i∈V   X 1 1 fij (yi , yj |x) + fij (1 − y¯i , 1 − y¯j |x) + w2 2 2 ij∈E   X 1 1 + w2 f˜ij (yi , 1 − y¯j |x) + f˜ij (1 − y¯i , yj |x) 2 2 ij∈E

Non-Submodular MRF

0

E (y, ¯ y|x; w) = w1

X 1 i∈V

+ w2



X 1

ij∈E

+ w2

1 fi (yi |x) + fi (1 − y¯i |x) 2 2

1 fij (yi , yj |x) + fij (1 − y¯i , 1 − y¯j |x) 2 2

X 1

ij∈E

1 f˜ij (yi , 1 − y¯j |x) + f˜ij (1 − y¯i , yj |x) 2 2

• E 0 (y, ¯ y|x; w) is sub-modular: can use graph cut.

 

Non-Submodular MRF

0

E (y, ¯ y|x; w) = w1

X 1 i∈V

+ w2



X 1

ij∈E

+ w2

1 fi (yi |x) + fi (1 − y¯i |x) 2 2

1 fij (yi , yj |x) + fij (1 − y¯i , 1 − y¯j |x) 2 2

X 1

ij∈E

1 f˜ij (yi , 1 − y¯j |x) + f˜ij (1 − y¯i , yj |x) 2 2

• E 0 (y, ¯ y|x; w) is sub-modular: can use graph cut. 0 • E (y, ¯ y|x; w) = E (y|x; w) if yi = 1 − y¯i for all i.

 

Non-Submodular MRF

0

E (y, ¯ y|x; w) = w1

X 1 i∈V

+ w2



X 1

ij∈E

+ w2

1 fi (yi |x) + fi (1 − y¯i |x) 2 2

1 fij (yi , yj |x) + fij (1 − y¯i , 1 − y¯j |x) 2 2

X 1

ij∈E

1 f˜ij (yi , 1 − y¯j |x) + f˜ij (1 − y¯i , yj |x) 2 2

• E 0 (y, ¯ y|x; w) is sub-modular: can use graph cut. 0 • E (y, ¯ y|x; w) = E (y|x; w) if yi = 1 − y¯i for all i. • Solve QPBO problem and set yi = ∅ if yi 6= 1 − y¯i : yi ∈ {∅, 0, 1}, partial optimality.

 

Multi-Label MRF

Solve multi-label MRF as a series of binary MRFs using α-expansion algorithm: • At each step, choose α from label space and solve

{yiprevious , α}.

Maximum-Likelihood Learning

• Training set: {(xi , yi )}N i=1 .

Maximum-Likelihood Learning

• Training set: {(xi , yi )}N i=1 . • Find w that maximizes

L(w) =

=

N X

i=1 N X i=1

log p(yi |xi ; w) −E (yi |xi ; w) − log Z (xi ; w).

Maximum-Likelihood Learning

• Training set: {(xi , yi )}N i=1 . • Find w that maximizes

L(w) =

=

N X

i=1 N X i=1

log p(yi |xi ; w) −E (yi |xi ; w) − log Z (xi ; w).

Max-Margin Learning/Structural SVM

minimize w,ξ

N 1 λX kwk22 + ξi 2 N i=1

i

subject to E (y|x ; w) − E (yi |xi ; w) ≥ ∆(y, yi ) − ξi , ∀i, ∀y 6= yi , ξ ≥ 0.

QP solved using cutting plane techniques.

Taskar et al. “Max-Margin Markov Networks,” in NIPS, 2003. Tsochantaridis et al., “Support Vector Machine Learning for Interdependent and Structured Output Spaces,” in ICML, 2004.

LSB Replacement MRF Cover Estimator

For any steganographic algorithm, if pixels are modified via LSB replacement, estimating the cover image is equivalent to identifying which pixels have been modified: a binary labeling problem. • Graph cut • QPBO

LSB Replacement MRF Cover Estimator s: stego image es: LSB flipped version of s

ρ: proportion of pixels modified fi (yi |s) =



− log(1 − ρ) if yi = 0, − log(ρ) if yi = 1.

 − log p(si , sj )    − log p(si , sej ) fij (yi , yj |s) = − log p(e si , sj )    − log p(e si , sej )

if yi if yi if yi if yi

=0 =0 =1 =1

and and and and

yj yj yj yj

= 0, = 1, = 0, = 1.

LSB Matching MRF Cover Estimator

For steganographic algorithms where pixels are modified via LSB matching, yi ∈ {−1, 0, 1}: tri-label MRF. • α-expansion.

LSB Matching MRF Cover Estimator s: stego image s + y: cover estimate ρ: proportion of pixels modified  − log(1 − ρ)    ρ  −  log( 2 ) − log(ρ) fi (yi |s) =      ∞ fij (yi , yj |s) =

if yi = 0, if 1 ≤ si + yi ≤ 254 and yi 6= 0, if (si = 1 and yi = −1) or (si = 254 and yi = 1), otherwise.

  − log p(si + yi , sj + yj ) 



if 0 ≤ si + yi ≤ 255 and 0 ≤ sj + yj ≤ 255, otherwise.

Experiments

• Image set: BOSSbase 9074 grayscale images 512×512 • Split into training and test sets: • Training set: 7074 (learn joint probabilities), 1000 (learn MRF model parameters) • Test set: remaining 1000

Experiments

• Image set: BOSSbase 9074 grayscale images 512×512 • Split into training and test sets: • Training set: 7074 (learn joint probabilities), 1000 (learn MRF model parameters) • Test set: remaining 1000 • Learning parameters: • Split each image into 64 non-overlapping 64×64 images, total 64000 images • Randomly choose 20000 images and embed at 0.5 bpp • Parameters: w1 = 0.9986 and w2 = 0.5413

Payload Location: Simple LSBR

N 1 10 100 200 300 400 500 1000

MRF 66165 (50.48%) 96516 (73.64%) 120744 (92.12%) 125997 (96.13%) 128584 (98.10%) 129895 (99.10%) 130516 (99.58%) 131007 (99.95%)

MAP 65750 (50.16%) 93978 (71.70%) 118066 (90.08%) 122567 (93.51%) 125193 (95.51%) 126846 (96.78%) 128062 (97.70%) 129595 (98.87%)

MAP + MRF 66325 (50.60%) 102046 (77.85%) 123858 (94.50%) 127047 (96.93%) 128502 (98.04%) 129521 (98.82%) 130161 (99.30%) 130783 (99.78%)

Parameter Sensitivity Fix w1 = 1 and vary w2 from 0.3 through 0.7 in increments of 0.01 5

1.35

x 10

1.3 1.25

Located payload

1.2 1.15 1.1 1.05 1 0.95 0.9

0

200

400 600 800 Number of stego images

1000

1200

Payload Location: Simple LSB Matching

N 1 10 100 200 300 400 500 1000

MRF 65598 (50.05%) 91333 (69.68%) 112181 (85.59%) 115848 (88.39%) 118943 (90.75%) 121250 (92.51%) 123428 (94.17%) 126850 (96.78%)

MAP 65552 (50.01%) 92652 (70.69%) 108105 (82.48%) 110681 (84.44%) 112667 (85.96%) 114431 (87.30%) 116296 (88.73%) 118931 (90.74%)

MAP + MRF 65602 (50.05%) 96623 (73.72%) 115361 (88.01%) 117677 (89.78%) 118197 (90.18%) 120278 (91.76%) 121634 (92.80%) 124316 (94.85%)

Payload Location: Group-Parity 1000 test images → 64000 64×64 images, k = 2, bpp = 0.5 N 1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 11000 12000 13000 14000 15000 16000

50 121 378 391 442 590 800 812 984 995 1122 1219 1275 1374 1555 1630

MRF (2.44%) (5.91%) (18.46%) (19.09%) (21.58%) (28.81%) (39.06%) (39.65%) (48.05%) (48.58%) (54.79%) (59.52%) (62.26%) (67.09%) (75.93%) (79.59%)

11 27 81 141 245 372 506 657 833 958 1052 1198 1342 1418 1518 1604

MAP (0.54%) (1.32%) (3.96%) (6.88%) (11.96%) (18.16%) (24.71%) (32.08%) (40.67%) (46.78%) (51.37%) (58.50%) (65.53%) (69.24%) (74.12%) (78.32%)

MAP 114 335 820 1202 1406 1581 1765 1813 1909 1944 1953 1996 1997 2010 2017 2029

+ MRF (5.57%) (16.36%) (40.04%) (58.69%) (68.65%) (77.20%) (86.18%) (88.53%) (93.21%) (94.92%) (95.36%) (97.46%) (97.51%) (98.14%) (98.49%) (99.07%)

Conclusions

• Cover estimation is an important forensic tool: payload

location is just one application.

Conclusions

• Cover estimation is an important forensic tool: payload

location is just one application. • MRF approach is fast, captures high-dimensional

dependencies, suitable for images (not limited to).

Conclusions

• Cover estimation is an important forensic tool: payload

location is just one application. • MRF approach is fast, captures high-dimensional

dependencies, suitable for images (not limited to). • Future work: • Incoporate dependencies beyond adjacent pixels.

Conclusions

• Cover estimation is an important forensic tool: payload

location is just one application. • MRF approach is fast, captures high-dimensional

dependencies, suitable for images (not limited to). • Future work: • Incoporate dependencies beyond adjacent pixels. • Apply to steganography: good cover model → single-letter distortions.

Thank You

[email protected]

Cover Estimation and Payload Location using Markov ...

Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly ... Maximum a posteriori (MAP) inferencing:.

607KB Sizes 0 Downloads 218 Views

Recommend Documents

Cover Estimation and Payload Location using Markov ...
Payload location accuracy is robust to various w2. 4.2 Simple LSB Replacement Steganography. For each cover image in test set B, we embed a fixed payload of 0.5 bpp using LSB replacement with the same key. We then estimate the cover images, or the mo

A Grid-Based Location Estimation Scheme using Hop ...
Report DCS-TR-435, Rutgers University, April 2001. [13] J. G. Lim, K. L. Chee, H. B. Leow, Y. K. Chong, P. K. Sivaprasad and. SV Rao, “Implementing a ...

Semiparametric Estimation of Markov Decision ...
Oct 12, 2011 - procedure generalizes the computationally attractive methodology of ... pecially in the recent development of the estimation of dynamic games. .... distribution of εt ensures we can apply Hotz and Miller's inversion theorem.

Optimal Cover Estimation Methods and Steganographic ...
WAM locator reflects pixels at the borders of the stego image to achieve the best ... We also use border reflection in .... http://ece.unm.edu/˜tuthach/decoder.html.

Realtime Experiments in Markov-Based Lane Position Estimation ...
where P(zt) has the purpose of normalizing the sum of all. P(v1,t = la,v2,t = lb|zt). .... laptops was made through the IEEE 802.11b standard D-Link. DWL-AG660 ...

Realtime Experiments in Markov-Based Lane Position Estimation ...
C. M. Clark is an Assistant Professor at the Computer Science Depart- ment, California Polytechnic State University, San Luis Obispo, CA, USA ..... Estimated vs. actual lane positions for computer 1 (top) and computer 2 (bottom). be explained ...

online bayesian estimation of hidden markov models ...
pose a set of weighted samples containing no duplicate and representing p(xt−1|yt−1) ... sion cannot directly be used because p(xt|xt−1, yt−1) de- pends on xt−2.

Soft Margin Estimation of Hidden Markov Model ...
measured by the generalization ability of the machine learning algorithms. In particular, large margin classification tools, such as support vector machines ...

Sales Planning and Control Using Absorbing Markov ...
A stochastic model that generates data for sales planning and control is described. An example is .... the salesman opportunities to call on his most valuable cus- tomers. 63 ..... The Institute of Business and Economic. Research, 1966, 45-56.

Using hidden Markov chains and empirical Bayes ... - Springer Link
Page 1 ... Consider a lattice of locations in one dimension at which data are observed. ... distribution of the data and we use the EM-algorithm to do this. From the ...

On Locating Steganographic Payload using Residuals
ri = (si − ˜si)(si − ̂ci). (1) are computed, where ˜si indicates si with the LSB flipped. The residuals quantify the difference between the stego image and the cover estimate. If ̂ci is an unbiased estimator for ci, the estimation error is in

System and method for obtaining and using location specific information
Sep 1, 2010 - supports the coordinate entry or linked to an existing Web ..... positions to any GPS receiver that is within the communica tion path and is tuned ...

System and method for obtaining and using location specific information
(73) Assignee: Apple Inc., Cupertino, CA (US). (21) App1.No.: 12/874,155. (22) Filed: Sep. 1, 2010. Related US. Patent Documents. Reissue of: (64) Patent No.:.

Location-Aware Sign-On and Key Exchange using ...
Uses the consumer mobile device (smartphone) as an agent to perform location- aware sign-on procedures on behalf of the user. • Uses Attribute-Based Encryption (ABE) to construct a secure key exchange protocol. • Uses Bluetooth Low Energy beacons

A User Location and Tracking System using Wireless Local Area ...
A User Location and Tracking System using Wireless Local Area Network. Kent Nishimori ... Area Network signal strength and Geographical. Information ..... The initial K-nearest neighbor algorithm [1] takes all of the K selected reference points and a

Location-Aware Sign-on and Key Exchange using ...
backend system verifies the username and password (or the hash of the password) against a database, and then grants, or not, access to a system. .... this key exchange, and as compared to traditional key exchange formats: • ABE is ...

Nonlinear Estimation and Multiple Sensor Fusion Using ...
The author is with the Unmanned Systems Lab in the Department of Mechanical Engineering, Naval Postgraduate School, Monterey, CA, 93943. (phone:.

3D shape estimation and texture generation using ...
plausible depth illusions via local foreshortening of surface textures rendered from a stretched spatial frequency envelope. Texture foreshortening cues were exploited by a multi-stage image analysis method that revealed local dominant orientation, d

Photometric Stereo and Weather Estimation Using ...
We extend photometric stereo to make it work with in- ternet images, which are typically associated with differ- ent viewpoints and significant noise. For popular tourism sites, thousands of images can be obtained from internet search engines. With t

Decentralized Position and Attitude Estimation Using ...
cation might be backup to GPS. ..... is chosen to get the best alignment possible, meaning the ... To be precise, there are two solutions to the arctan func-.

3D shape estimation and texture generation using ... - Semantic Scholar
The surfaces of 3D objects may be represented as a connected distribution of surface patches that point in various directions with respect to the observer.

inteligibility improvement using snr estimation
Speech enhancement is one of the most important topics in speech signal processing. Several techniques have been proposed for this purpose like the spectral subtraction approach, the signal subspace approach, adaptive noise canceling and Wiener filte