"Break Our Steganographic System": The Ins and Outs of Organizing BOSS
نویسندگان
چکیده
This paper summarizes the rst international challenge on steganalysis called BOSS (an acronym for Break Our Steganographic System). We explain the motivations behind the organization of the contest, its rules together with reasons for them, and the steganographic algorithm developed for the contest. Since the image databases created for the contest signi cantly in uenced the development of the contest, they are described in a great detail. Paper also presents detailed analysis of results submitted to the challenge. One of the main di culty of the contest was the discrepancy between training and testing source of images the so-called cover-source mismatch, which forced the participants to design steganalyzers robust w.r.t. a speci c source of images. We also point to other practical issues related to designing steganographic systems and give several suggestions for future contests in steganalysis. 1 BOSS: Break Our Steganographic System During the years 2005 and 2007, the data-hiding community supported by the European Network of Excellence in Cryptology (ECRYPT) launched two watermarking challenges, BOWS [10] and BOWS-2 [1] (abbreviations of Break Our Watermarking System). The purpose of participants of both challenges was to break watermarking systems under di erent scenarios. The purpose of organizers was not only to assess the robustness and the security of di erent watermarking schemes in the environment similar to real application, but to increase the interest in watermarking and to boost the research progress within the eld. Both watermarking contests showed to be popular (BOWS/BOWS2 played more than 300/150 domains and 10/15 participants respectively were ranked), and novel approaches towards breaking watermarking systems were derived during them. This, combined with a thrill associated with organization and participation, inspired us to organize the BOSS (Break Our Steganographic System) challenge. The most important motivation for the contest was to investigate whether content-adaptive steganography improves steganographic security for empirical covers. For the purpose of this contest, a new spatial-domain content-adaptive algorithm called HUGO (Highly Undetectable steGO) was invented [9]. The fact that in adaptive steganography the selection channel (placement of embedding changes) is publicly known, albeit in a probabilistic form, could in theory be exploited by an attacker. Adaptive schemes introduce more embedding changes than non-adaptive schemes because some pixels are almost forbidden from being modi ed, which causes an adaptive scheme to embed with a larger change rate than a non-adaptive one. On the other hand, the changes are driven to hardto-model regions, because the change rate is not an appropriate measure of statistical detectability as it puts the same weight to all pixels. As compared by the state-of-the-art available in mid 2010, HUGO was largely resistant to steganalysis up to 0.4 bits per pixel in 512× 512 grayscale images. The other incentive for organizing the challenge was a hope to encourage the development of new approaches toward steganalysis, pointing to important deadlocks in steganalysis and hopefully nding solutions to them, nding weaknesses of the proposed steganographic system, and nally raising interest in steganalysis and steganography. While running the contest, we became aware of a similar contest organized within the computer vision community [4]. This paper serves as an introduction to a series of papers [removed for review] describing the attacks on HUGO. Here, we describe the contest, image databases, and the HUGO algorithm to give the papers uniform notation and background. 1.1 Requirements and rules In order BOSS challenge to be attractive and fruitful for the community, we have obeyed following conditions and limitations. All participants were ranked by a scalar criterion, the accuracy of detection on a database of 1, 000 512× 512 grayscale images called BOSSRank. Each image in BOSSRank database was chosen to contain secret message of size 104, 857 bits (0.4 bits per pixel) with probability 50% (naturally the list of stego and cover images was secret). To allow all participants to start with the same degree of knowledge about the steganographic system used in the contest, we started the contest with a warm-up phase on June 28, 2010. The very same day the steganographic algorithm HUGO was presented at International Hiding Conference 2010. For the warm-up phase, we also released the source code of the embedding algorithm. To simplify the steganalysis, a training database of 7, 518 512×512 grayscale images (the BOSSBase) was released along with an implementation of the state-of-the-art feature set (the Cross Domain Features (CDF) [7]) for blind steganalysis. Motivation leading us to supply this material, especially the description and implementation of the embedding algorithm, came from the Kerckho s' principle. We wanted all participants to have an easy access to the score of their predictions, yet prevent them to perform an oracle attack on the evaluation 4 A method to reach 100% accuracy by learning the true classi cation of BOSSRank from a very large number of carefully constructed predictions. Camera model # of images # of images in BOSSBase in BOSSRank Leica M9 2267 847 Canon EOS DIGITAL REBEL XSi 1607 0 PENTAX K20D 1398 0 Canon EOS 400D DIGITAL 1354 0 Canon EOS 7D 1354 0 NIKON D7
منابع مشابه
Pricing Buy-ins and Buy-outs
Pension buy-ins and buy-outs have become an important aspect of managing pension risk in recent years. As a step toward understanding these pension de-risking instruments, we develop models for pricing investment risk and longevity risk embedded in pension buy-ins and buy-outs. We also bring a contingent-claims framework to price credit risk of buy-in bulk annuities. Overall, our model can be u...
متن کاملCentrosome Biology: The Ins and Outs of Centrosome Assembly
As a microtubule-organizing center, the centrosome undergoes a dramatic increase in size - via expansion of the pericentriolar material - during mitosis. Recent work reveals shared assembly properties of a protein scaffold that facilitates and supports this expansion, a process critical to spindle assembly.
متن کاملAnalysis of the Reliability of a Three-Component System with Two Repairmen
In this paper authors have considered a system having three units A, B1 and B2. A is controlled by a controller and B1 and B2 are independent. Two repairmen are involved in repair of the system. One of the repairmen (the first) is the foreman (boss) and the other an assistant (apprentice). Whenever any unit fails, repair is undertaken by boss. If the boss is busy in repairing and at the same ti...
متن کاملGPS/INS Integration for Vehicle Navigation based on INS Error Analysis in Kalman Filtering
The Global Positioning System (GPS) and an Inertial Navigation System (INS) are two basic navigation systems. Due to their complementary characters in many aspects, a GPS/INS integrated navigation system has been a hot research topic in the recent decade. The Micro Electrical Mechanical Sensors (MEMS) successfully solved the problems of price, size and weight with the traditional INS. Therefore...
متن کاملA 40-bp Insertion/Deletion Polymorphism of Murine Double Minute2 (MDM2) Increased the Risk of Breast Cancer in Zahedan, Southeast Iran
Background: MDM2 (Murine Double Minute2) is an oncoprotein that inhibits the P53 activity. Overexpression of MDM2 gene has been reported in several human tumors. In the present study, we aimed to evaluate the impact of 40-bp insertion/deletion (ins/del) polymorphism on the promoter of MDM2 and susceptibility to breast cancer in a sample of Iranian population. Methods: This case-control study wa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011