Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack

被引:1
|
作者
Butora, Jan [1 ]
Bas, Patrick [1 ]
Cogranne, Remi [2 ]
机构
[1] Univ Lille, CNRS, Cent Lille, UMR 9189 CRIStAL, Lille, France
[2] Univ Technol, LIST3N Lab, Troyes, France
关键词
steganalysis; rounding errors; RJCA; JPEG; false alarm; STEGANALYSIS;
D O I
10.1145/3577163.3595092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Reverse JPEG Compatibility Attack can be used for steganalysis of JPEG images compressed with Quality Factor 100 by detecting increased variance of decompression rounding errors. In this work, we point out the dangers associated with this attack by showing that in an uncontrolled environment, the variance can be elevated simply by using a different JPEG compressor. If not careful, the steganalyst can wrongly misclassify cover images. In order to deal with the diversity associated to the devices or softwares generating JPEGs, we propose in this paper to build a deep learning detector trained on a huge dataset of downloaded images. Experimental evaluation shows that such a detector can provide operational false alarms as small as 10(-4), while still correctly classifying 90% of stego images. Furthermore, it is shown that this performance is directly applicable to other image datasets. As a side product, we indicate that the attack is not applicable to images developed with a specific JPEG compressor based on the trunc quantization function.
引用
收藏
页码:59 / 66
页数:8
相关论文
共 50 条
  • [41] Attacks on ML Systems: From Security Analysis to Attack Mitigation
    Zou, Qingtian
    Zhang, Lan
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 119 - 138
  • [42] A Novel Data Analytical Approach for False Data Injection Cyber-Physical Attack Mitigation in Smart Grids
    Wang, Yi
    Amin, Mahmoud M.
    Fu, Jian
    Moussa, Heba B.
    IEEE ACCESS, 2017, 5 : 26022 - 26033
  • [43] Investigation into the sources of persistent ground-penetrating radar false alarms: Data collection, excavation, and analysis
    Rosen, EM
    Blackburn, AC
    Ayers, EL
    Bishop, SS
    DETECTION AND REMEDIATION TECHNOLOGIES FOR MINES AND MINELIKE TARGETS VIII, PTS 1 AND 2, 2003, 5089 : 185 - 190
  • [44] Taming false alarms from a domain-unaware C analyzer by a Bayesian statistical post analysis
    Jung, YB
    Kim, J
    Shin, J
    Yi, K
    STATIC ANALYSIS, PROCEEDINGS, 2005, 3672 : 203 - 217
  • [45] Reliability analysis of detecting false alarms that employ neural networks: A real case study on wind turbines
    Pliego Marugan, Alberto
    Peco Chacon, Ana Maria
    Garcia Marquez, Fausto Pedro
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 191
  • [46] False alarms reduction in non-convulsive status epilepticus detection via continuous EEG analysis
    Wang, Ying
    Long, Xi
    van Dijk, Johannes P.
    Aarts, Ronald M.
    Wang, Lei
    Arends, Johan B. A. M.
    PHYSIOLOGICAL MEASUREMENT, 2020, 41 (05)
  • [47] Analysis and Mitigation of Process Variation Impacts on Power-Attack Tolerance
    Lin, Lang
    Burleson, Wayne
    DAC: 2009 46TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2009, : 238 - 243
  • [48] Secure MPC/ANN-Based False Data Injection Cyber-Attack Detection and Mitigation in DC Microgrids
    Habibi, Mohammad Reza
    Baghaee, Hamid Reza
    Blaabjerg, Frede
    Dragicevic, Tomislav
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1487 - 1498
  • [49] Point Cloud Analysis for ML-Based Malicious Traffic Detection: Reducing Majorities of False Positive Alarms
    Fu, Chuanpu
    Li, Qi
    Xu, Ke
    Wu, Jianping
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1005 - 1019
  • [50] False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment
    Kang, Jeong-won
    Joo, Il-Young
    Choi, Dae-Hyun
    IEEE ACCESS, 2018, 6 : 8841 - 8851