Toss that BOSSbase, Alice!

نویسندگان

  • Vahid Sedighi
  • Jessica J. Fridrich
  • Rémi Cogranne
چکیده

Steganographic schemes for digital images are routinely designed and benchmarked based on feedback obtained on the standard image set called BOSSbase 1.01. While standardized image sets are important for advancing the field, relying on results from a single source may not provide fair benchmarking and may even lead to designs that are overoptimized and highly suboptimal on other image sources. In this paper, we investigate four modern steganographic schemes for the spatial domain, WOW, S-UNIWARD, HILL, and MiPOD on two more versions of BOSSbase. We observed that with their default settings, the mutual ranking and detectability of all four embedding algorithms can dramatically change across the three image sources. For example, in a version of BOSSbase whose images were cropped instead of resized, all four schemes exhibit almost the same empirical security when steganalyzed with the spatial rich model (SRM). On the other hand, in decompressed JPEG images, WOW is the most secure embedding algorithm out of the four, and this stays true irrespectively of the JPEG quality factor when steganalyzing with both SRM and maxSRM. The empirical security of all four schemes can be increased by optimizing the parameters for each source. This is especially true for decompressed JPEGs. However, the ranking of stego schemes still varies depending on the source. Through this work, we strive to make the community aware of the fact that empirical security of steganographic algorithms is not absolute but needs to be considered within a given environment, which includes the cover source.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Variable Bias Coin Tossing

Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable bias coin toss (VBCT). This generates a...

متن کامل

Defining the Long-Toss: A Professional Baseball Epidemiological Study

BACKGROUND Despite widespread use of long-toss throwing in baseball as a component of arm conditioning, interval throwing programs, and rehabilitation, long-toss distance and throwing mechanics remain controversial. PURPOSE To ascertain the perceived definition of long-toss throwing through a survey of professional pitchers, pitching coaches (PCs), and certified athletic trainers (ATCs) assoc...

متن کامل

JPEG Steganalysis Based on DenseNet

Current research has indicated that convolution neural networks (CNNs) can work well for steganalysis in the spatial domain. There are, however, fewer works based on CNN in the JPEG domain. In this paper, we have proposed a 32layer CNN architecture that is based on Dense Convolutional Network (DenseNet) for JPEG steganalysis. The proposed CNN architecture can reuse features by concatenating fea...

متن کامل

People toss coins with more vigor when the stakes are higher

We trust that the uncertainty regarding the outcome of a coin toss makes it a fair procedure for making a decision. Small differences in the force used to toss a coin should not affect this uncertainty. However, the voluntary movement involved in tossing a coin is subject to motivational influences arising from the anticipation of the value of the outcome of the toss. Presented here are measure...

متن کامل

Electing a Leader

The following scenario was examined in [1]: we toss  ideal coins, then toss those which show tails after the first toss, then toss those which show tails after the second toss, etc. Observe that if, at a given toss, only heads appear, then the process immediately terminates. Suppose instead that we require the coins (all of which showed heads) to be tossed again? Under such a change of rules, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016