=Paper= {{Paper |id=Vol-3200/paper25 |storemode=property |title=Use of the Normalized Gap of Maximum Singular Value of the Image Block to Evaluate the Capacity of the Steganographic Channel |pdfUrl=https://ceur-ws.org/Vol-3200/paper25.pdf |volume=Vol-3200 |authors=Ivan Bobok,Alla Kobozieva,Nataliya Kushnirenko }} ==Use of the Normalized Gap of Maximum Singular Value of the Image Block to Evaluate the Capacity of the Steganographic Channel == https://ceur-ws.org/Vol-3200/paper25.pdf
Use of the Normalized Gap of Maximum Singular Value of the
Image Block to Evaluate the Capacity of the Steganographic
Channel
Ivan Bobok1, Alla Kobozieva2 and Nataliya Kushnirenko3
1,2, 3
         Odessа Polytechnic State University, Shevchenko av., 1, Odesa, 65044, Ukraine


                  Abstract
                  The Least Significant Bit (LSB) method is one of the most widespread and demanded
                  steganographic methods nowadays. Detection and decoding the hidden information, embedded
                  in a container using the LSB, is a challenging task, in particular, in conditions of low capacity
                  of the hidden communication channel. The existing steganalysis algorithms developed to detect
                  the LSB, as a rule, solve the main problem of steganalysis - the detection of a hidden
                  communication channel. However, the problem of the additional information recovery remains
                  unfulfilled. The important step in solving this problem is the evaluation of the hidden
                  (steganographic) channel capacity. In the current work, a digital image is used as container. All
                  the results obtained can also be applied to digital video, which is considered as a sequence of
                  frames. The aim of the work is to get estimates for the value of the capacity of the hidden
                  communication channel, formed by the LSB method. To achieve the aim of the work the
                  following studies carried out: performed additional in-depth investigation of properties of the
                  normalized gap of the maximum singular value of non-intersecting image blocks, obtained by
                  standard splitting; studied properties of a discrete function y(QF), that determines the number of
                  image blocks in which the normalized gap of maximum singular value increases when the image
                  is re-saved to lossy format with quality factor QF. As a result of the research, the estimates of
                  the value of the capacity of the hidden communication channel, created using the LSB method
                  and based on a container in a lossy format, were obtained.

                  Keywords
                  Steganalysis method, digital image, the capacity of the hidden communication channel, the LSB
                  method, the normalized gap of singular value


1. Introduction                                                                                  steganalysis [3]. Powerful efforts of scientists
                                                                                                 around the world today are aimed at solving the
                                                                                                 main task of steganalysis - to identify the presence
    Steganography today is one of the most
                                                                                                 of hidden (additional) information in information
powerful and widely used areas of information
                                                                                                 content [4]. However, in the condition of the
security. One of the main questions here is who
                                                                                                 information confrontation, that takes place in the
holds such a powerful means of protection, since
                                                                                                 modern world [2], these actions are not sufficient.
the use of steganography, unfortunately, can lead
                                                                                                 Only the decoding of hidden information, its
to the setting up of hidden communication with
                                                                                                 recovery will allow achieving the goal of
anti-state, illegal, inhuman goals [1,2]. In such
                                                                                                 steganalysis to the fullest. The extracting of
cases, early detection of hidden communication is
                                                                                                 hidden information and its decoding are the most
critical. The main "weapon" for here is

III International Scientific And Practical Conference “Information
Security And Information Technologies”, September 13–19, 2021,
Odesa, Ukraine
EMAIL: onu_metal@ukr.net (A. 1); alla_kobozeva@ukr.net (A. 2);
infsec2011@gmail.com (A. 3)
ORCID: 0000-0003-4548-0709 (A. 1); 0000-0001-7888-0499
(A. 2); 0000-0003-3722-0229 (A. 3)
                 ©️ 2021 Copyright for this paper by its authors. Use permitted under Creative
                 Commons License Attribution 4.0 International (CC BY 4.0).
                 CEUR Workshop Proceedings (CEUR-WS.org)
complicated tasks. It can be facilitated by                be considered promising for evaluating the
determining/evaluating the capacity of the                 steganographic channel capacity. To ensure the
organized steganographic channel [3,5], which is           possibility of determining/evaluating the capacity
what this work is aimed at.                                of the hidden channel, additional studies of the
    Today, one of the most widespread and                  properties of the function y (QF ) are required.
demanded steganographic methods is the least                  The aim of the work is to obtain estimates for
significant bit modification method - LSB [3].             the value of the capacity of the hidden
However, modern steganalysis methods, as a rule,           communication channel, formed using the LSB
do not evaluate the capacity of the hidden                 method, by identifying the corresponding
communication channel [6,7,8].                             additional properties of y (QF ) .
    In [9], a steganalysis method was proposed,
which aimed at detecting a hidden communication
channel with low capacity. The method was                  2. Main Body
based on properties of the normalized gap of the
maximum singular value of image matrix block.                  Let the image were initially saved in a lossy
In particular, it took into account the number of          format; F1 is the matrix of the image, which is
image blocks, obtained by standard matrix                  subject to examination. Formally, it is saved in a
splitting, in which the normalized gap of the              lossless format. If F1 is a steganographic
maximum singular value increased due to re-                message, then we will assume that it is obtained
saving of image to a lossy format with different
                                                           on the basis of a Jpeg container with a matrix F
quality factors QF. This number was reflected by
                                                           . Let us apply to F1 the steganographic
the discrete function y (QF ) that was built for the
                                                           transformation with the low capacity of        the
image under examination. Let us introduce the
                                                           hidden communication channel (for example,
appropriate notation.
                                                           1%), which formally represented as [11]:
    Let F be the matrix of the digital image,
                                                                         F1,1 = F1 + F ,               (1)
which is split in a standard way into non-
intersecting l×l-blocks with singular values [10]          where F is the matrix representation of the
 1   2  ...  l  0 , which form vector of            additional information, F1,1 is the matrix of the

                     (
singular values  = 1 ,2 ,...,l   )T ; the normalized   image-steganographic message. Let us define
                                                                        ( )
                                                           functions y QF for F1 and F1,1 re-saving them
                                      (
vector of singular values  = 1 ,2 ,...,l      ) is
                                                   T
                                                           with losses with all possible values of the quality
determined by                                              factor QF. For a particular QF, as a rule, the value
                     =  ,                               y (QF ) for F1,1 will be greater than that for F1 .
where        is a norm of vector  . Then the             Geometrically it means that the y (QF ) graph for
normalized gap of the singular value i , i = 1,l is       F1,1 will be higher along the ordinate than the
determined as follows [9]:                                 y (QF ) graph for F1 whether the message or the
           svdgapn (i ) = min  j − i ,
                            i j                           container matches the matrix F1 . However, the
whence it follows that the normalized gap of the           difference between the values of the function
maximum singular value is                                  y (QF ) (between the corresponding graphs) will
                svdgapn (1) = 1 − 2                      be different depending on whether the matrix F1
and                                                        corresponds to the original image or
                 0  svdgapn (1)  1                       steganographic message.
    The efficiency of algorithmic implementation                  Let F1 be the matrix of the container, then
of the method proposed in [9] exceeds the modern           the steganographic message (1) for it will be the
analogues in terms of the detection of the hidden          first and only one. If F1 corresponds to the
communication channel in conditions of a low
                                                           steganographic message, then for it (1) is a
capacity. It means, that the mathematical basis of
                                                           repeated steganographic transformation. Let us
the method provides sensitivity to small
                                                           show that the primary transformation (1) with the
disturbances of the container in the process of
steganographic transformation, and therefore can           help of the matrix F will "lift" the y QF    ( )
graph higher along the ordinate compared to the       will decrease as a result of the steganographic
graph constructed for F1 , than repeated              transformation, the less the normalized gap of the
transformation using the same matrix F .             maximum singular value in the blocks F1
       The steganographic transformation of the       involved in the steganographic transformation,
Jpeg container almost always leads to an increase     the “higher” will be the graph of the function
in the smallest singular values and decrease in the   y (QF ) , obtained when re-saving F1 with losses.
normalized gap of the maximum singular value in
                                                      When re-embedding additional information into a
the blocks involved in the steganographic
                                                      steganographic message formed with a relatively
transformation, thereby increasing the likelihood
                                                      significant primary capacity of the hidden
of the growth of the normalized gap of the
                                                      channel, there will be a significant number of
maximum singular value when the image is re-
                                                      blocks, where, after repeated steganographic
saved into a lossy format. If the additional
                                                      transformation, the normalized gap of the
information is embedded in the image-
                                                      maximum singular value will increase, rather than
steganographic message, then the normalized gap
                                                      decrease, in comparison with the normalized gap
of the maximum singular value in blocks,
                                                      of the maximum singular value in the block of the
involved in the primary steganographic
                                                      input steganographic message. This will lead to
transformation, is less than in the corresponding
                                                      the fact that when re-saving a steganographic
blocks of the original container. After the
                                                      message obtained as a result of a double
additional information is embedded in the
                                                      steganographic transformation, although the
                                                                                 ( )
steganographic message, the smallest singular
values of the corresponding blocks involved in        graph of the function y QF will be higher than
repeated steganographic transformation, which         the graph of a similar function for the input
are no longer comparable to zero in those blocks      steganographic message (obtained as a result of a
that were involved in the primary transformation,     single steganographic transformation), this
can both decrease and increase. This fact can lead    difference will be the smaller, the larger was the
to both an increase and decrease in the normalized    capacity of the hidden channel of primary
gap of the maximum singular value. Re-                steganographic transformation. It was confirmed
embedding the additional information in the           in practice by the results of a computational
steganographic message will generally increase        experiment, in which the following sets of digital
the resulting capacity of the hidden                  images were involved:
communication channel, additionally disturbing
the singular values, but the relative change in the   •   M Tif – 500 images in lossless format (Tiff)
smallest singular values of the container blocks be       (150 images from 4cam_auth base [12], 275
greater than in the smallest singular values of           images from img_Nikon_D70s base [13], 75
steganographic message with the same                      images taken by non-professional camera);
disturbance. Thus, the number of blocks in which      •   M Jpeg ,70 , M Jpeg ,75 , M Jpeg ,80 – each contained
the normalized gap of the maximum singular
value will increase at re-saving with losses of the       500 images, obtained by re-saving of images
steganographic message, obtained as a result of           from the set      M Tif to the Jpeg format with
consecutive          double         steganographic
                                                          QF=70, 75, 80 respectively (the most
transformation will be greater, than when re-
                                                          frequently used quality factors in practice).
saving the primary steganographic message.
                                                          At the first stage, additional information was
However, the degree of this increase will be less
                                                      embedded into the original image (with or without
than the degree of increase using the same (which
                                                      loss) with the capacity of the hidden
is characterized by matrix F ), but the primary      communication channel of 1, 5, 10%. The original
steganographic message on an empty container.         image-container and the obtained steganographic
Moreover, the degree of increase will be smaller      messages were re-saved into lossy format (Jpeg)
the more the capacity of the hidden                   with all quality factors QF  1,2,...100  . As a
communication channel of the primary
                                                      result, discrete functions y0 (QF ) (for the
steganographic transformation. Indeed, the more
the capacity of the hidden communication channel      container),      y1 (QF ) ,     y5 (QF ) , y10 (QF ) ,
of the primary steganographic message, the more       QF  1,2 ,...100  for the steganographic message
the number of container blocks, in which the          were determined, respectively. A value
normalized gap of the maximum singular value          characterizing the change in the function
y0 (QF )   was considered as a quantitative                format (Jpeg) and the quality factor used
characteristic of the image change as a result of          (QF=75). Using a different lossy format (for
the primary steganographic transformation:                 example, Jpeg2000) or a different quality factor
                                  1                        will only change the quantitative indicators of the
           100                    2 2                    histograms.
           
  T0 ,i = 
            1
                y0 (QF ) − yi (QF )  ,
                                     
                                                 (2)              Analysis of the numerical values of (2), (3)
                                                           using the obtained histograms (Fig. 1) allows us
  i  1,5,10.                                            to make conclusions, that the following points are
      At the second stage, additional information          important for evaluation the value of the capacity
was re-embedded with the channel capacity of 1%            of the hidden channel:
into the steganographic messages generated at the          • If for image, which is under examination
first stage (the matrix of additional information               the     value      Ti ,1  125 ,  then     the
 F was randomly generated, the same matrix                     steganographic transformation were not
was used for steganographic messages with the                   applied to it;
channel capacity of 1, 5, 10%, formed on the basis         • If 61  Ti ,1 , then for analyzed image the
of one container ). Steganographic messages
obtained after the repeated steganographic                      capacity of the hidden channel is <5%,
transformation were re-saved with losses (Jpeg                  here the image can be a "clean" container;
format) with QF  1,2,...100  . As a result, discrete    • If 26  Ti ,1 , then for analyzed image the
functions y1,1 (QF ) , y5,1 (QF ) , y10 ,1 (QF ) ,              capacity of the hidden channel is <10%.
                                                                The results obtained at this stage of the
QF  1,2 ,...100          were        obtained     for
                                                           research are not final, the quantitative estimates
steganographic messages with the channel                   obtained for the capacity of the hidden channel
capacity of the primary steganographic                     are one-sided (upper estimates), such that they
transformation of 1, 5, 10%, respectively. By              depend on the value of the capacity of the hidden
analogy with (2), the following value was                  channel of the primary stegano-transformation
considered as a quantitative characteristic of the         of the image in the Jpeg format (QF=75). By
change in the image-steganographic message after           expanding the computational experiment, by
repeated transformation:                                   increasing the variety of values of the capacity
                                   1
                                                           of the hidden channel for the primary stegano-
           100                       2 2
        
  Ti ,1 = 
            1
                yi (QF ) − yi ,1 (QF )  ,
                                        
                                               (3)         transformation (for example, from 1 to К% with a
                                                           step h%), the results obtained can be made more
  i  1,5,10.                                            precise, what will be done in the development of
       The experimental results for the original           the direct method for evaluating the capacity of
images in the lossy format for the case of the Jpeg        the hidden communication channel. Using a
format with the quality factor QF=75 are shown             different lossy format (for example, Jpeg2000) or
in Fig. 1 and in Table 1, where can be observed            a different quality factor QF will change the
the general tendency of qualitative changes in the         quantitative indicators of histograms, therefore,
values of estimates (2), (3) with increasing the           the development of a method requires quantitative
capacity of the hidden channel of the primary              characteristics for all possible (most used) values
steganographic transformation: decreasing the              of the quality factor. Taking into account their
mode of the histogram of values Ti ,1 with a               possible variety, the preliminary step of
                                                           determining QF for a container in a lossy format
simultaneous increase in the value in the mode;            is required before using the method for estimating
decreasing the length of the interval of possible          the capacity of the hidden communication
values Ti ,1 by decreasing the maximum value. Ti ,1        channel. It can be done using, for example, the
. The quality results obtained are typical for lossy       method proposed in [14,15].
images, regardless of the specifics         of     the
                             a                                                 b




                           c                                                     d
Figure 1: Histograms of values Ti ,1 , i  0 ,1,5,10 , for the original image-container, saved in Jpeg with
QF=75: а – T0,1 (the mode equals 13, the value in mode is 19); b – T1,1 (the mode is 10, the value in
mode is 24); c – T5,1 (the mode is 6, the value in mode is 30); d – T10,1 (the mode is 5, the value in
mode is 41)

Table 1
Maximum and minimum values for the experiment Ti ,1 , i  0 ,1,5,10 for image-containers, initially
saved in Jpeg with QF=75
            T0,1                       T1,1                       T5,1                      T10,1
    Max            Min           Max          Min         Max            Min         Max            Min
    146            2.1           124          2.4         61             1.7         26              2



3. Conclusions                                             the maximum singular value increases when
                                                           re-saving with losses, is greater, than in mage-
                                                           container regardless of the container format
     The paper studied the properties of the
                                                           (with/without losses);
normalized gap of the maximum singular value of
                                                        2. The primary steganographic transformation
the image matrix blocks, a discrete function
 y (QF ) , that corresponds to the image in the            of a digital image using a matrix F changes
                                                           («lifts» along the ordinate) the graph of the
                                                            function y (QF ) higher, than a repeated
conditions of its re-saving with losses with
different quality factors and represents the
number of blocks in which the normalized gap of            steganographic transformation using the same
the maximum singular value increases as a result           matrix F ;
of re-saving.                                           3. The higher the capacity of the hidden
        It is found that:                                  communication channel of the primary
1. The number of image-steganographic                      steganographic transformation, the smaller
     message blocks, for which normalized gap of           the difference between corresponding
    functions     y (QF )   for    steganographic    [7] S.S. Chaeikar, M. Zamani, A.A. Manaf,
    messages, obtained by single and double               A.M. Zeki, PSW statistical LSB image
    steganographic transformations, while the             steganalysis, Multimedia Tools and
    same matrix F is used to re-embed                    Applications        volume     77     (2018).
    additional information regardless of the              doi:10.1007/s11042-016-4273-6.
    capacity of the hidden communication             [8] S.T. Veena, S. Arivazhagan, Universal
    channel of the primary steganographic                 secret payload location identification in
    message.                                              spatial LSB stegoimages, Annals of
    As a result of the studies, one-sided                 Telecommunications                  74(2019).
estimates (from above) of the capacity of the             doi:10.1007/s12243-018-0676-x.
hidden communication channel were obtained           [9] I.I. Bobok, A.A. Kobozeva, Steganalysis
in the conditions of the image-container in the           method      efficient     for   the    hidden
Jpeg format (QF=75). The conducted studies and            communication channel with low capacity,
the obtained results indicate that the chosen             Radiotekhnika             198         (2019).
direction is promising for evaluating the capacity        doi:10.30837/rt.2019.3.198.02
of the hidden communication channel of the           [10] J.W. Demmel, Applied Numerical Linear
primary steganographic transformation of a                Algebra, SIAM, 1997.
digital image and is currently being continued by    [11] A.A. Kobozeva, V.A. Khoroshko, Analysis
the authors.                                              of Information Security, DUT, Kyiv, 2009.
                                                     [12] Y. Hsu, S. Chang, Detecting image splicing
                                                          using geometry invariants and camera
4. References                                             characteristics consistency, 2006 IEEE
                                                          International Conference on Multimedia and
[1] W. Mazurczyk, S. Wendzel, S. Zander, A.               Expo,                Toronto,           2006.
    Houmansadr, K. Szczypiorski (Eds.),                   doi:10.1109/ICME.2006.262447
    Information Hiding in Communication              [13] T. Gloe, R. Böhme, The “Dresden Image
    Networks: Fundamentals, Mechanisms,                   Database” for benchmarking digital image
    Applications, and Countermeasures, Wiley,             forensics, 2010 ACM Symposium on
    Hoboken,                                2016.         Applied Computing (SAC ’10), New York,
    doi:10.1002/9781119081715                             2010. P. 1585–1591.
[2] L.G. Pirtskhalava,           V.A. Khoroshko,     [14] A.A. Kobozeva, I.I. Bobok, L.E. Batiene,
    Yu.E. Khokhlachova,             M.E. Shelest,         Steganoanalytical Method Based on the
    Information Confrontation in Modern                   Analysis of Singular Values of Digital Image
    Conditions, Comprint, Kyiv, 2019.                     Matrix Blocks, Problemele Energeticii
[3] A.V. Agranovsky,                A.V. Balakin,         Regionale          3       (2018).      URL:
    V.G. Gribunin. Steganography, Digital                 http://journal.ie.asm.md/ru/contents/electron
    Watermarking,         and        Steganalysis,        ni-jurnal-338-2018
    Vyzovskaya kniga, Moscow, 2009.
[4] K. Karampidis,               E. Kavallieratou,
    G. Papadourakis, A review of image
    steganalysis techniques for digital forensics,
    Journal of Information Security and
    Applications                        40(2018).
    doi:10.1016/j.jisa.2018.04.005.
[5] V.S. Ponomarenko (Ed.), A method for
    estimating the value of the hidden bandwidth
    of a steganographic communication channel.
    Information systems in management,
    education, industry. Kharkiv, 2014.
[6] S.S. Chaeikar, A. Ahmadi, Ensemble SW
    image steganalysis: A low dimension method
    for LSBR detection, Signal Processing:
    Image        Communication          70(2019).
    doi:10.1016/j.image.2018.10.004.