SUDS: Sanitizing Universal and Dependent Steganography
- URL: http://arxiv.org/abs/2309.13467v1
- Date: Sat, 23 Sep 2023 19:39:44 GMT
- Title: SUDS: Sanitizing Universal and Dependent Steganography
- Authors: Preston K. Robinette, Hanchen D. Wang, Nishan Shehadeh, Daniel Moyer,
Taylor T. Johnson
- Abstract summary: Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication.
Current protection mechanisms rely upon steganalysis, but these approaches are dependent upon prior knowledge.
This work focuses on a deep learning sanitization technique called SUDS that is able to sanitize universal and dependent steganography.
- Score: 4.067706508297839
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Steganography, or hiding messages in plain sight, is a form of information
hiding that is most commonly used for covert communication. As modern
steganographic mediums include images, text, audio, and video, this
communication method is being increasingly used by bad actors to propagate
malware, exfiltrate data, and discreetly communicate. Current protection
mechanisms rely upon steganalysis, or the detection of steganography, but these
approaches are dependent upon prior knowledge, such as steganographic
signatures from publicly available tools and statistical knowledge about known
hiding methods. These dependencies render steganalysis useless against new or
unique hiding methods, which are becoming increasingly common with the
application of deep learning models. To mitigate the shortcomings of
steganalysis, this work focuses on a deep learning sanitization technique
called SUDS that is not reliant upon knowledge of steganographic hiding
techniques and is able to sanitize universal and dependent steganography. SUDS
is tested using least significant bit method (LSB), dependent deep hiding
(DDH), and universal deep hiding (UDH). We demonstrate the capabilities and
limitations of SUDS by answering five research questions, including baseline
comparisons and an ablation study. Additionally, we apply SUDS to a real-world
scenario, where it is able to increase the resistance of a poisoned classifier
against attacks by 1375%.
Related papers
- Combining Different Existing Methods for Describing Steganography Hiding Methods [33.986313771360095]
This paper aims to provide an introduction to the concept of descriptive methods for steganography.<n>The main goal of the paper is to explain how existing descriptions and taxonomy objects can be combined to achieve a detailed categorization and description of hiding methods.
arXiv Detail & Related papers (2025-06-02T14:02:54Z) - Epidemiology-informed Network for Robust Rumor Detection [59.89351792706995]
We propose a novel Epidemiology-informed Network (EIN) that integrates epidemiological knowledge to enhance performance.
To adapt epidemiology theory to rumor detection, it is expected that each users stance toward the source information will be annotated.
Our experimental results demonstrate that the proposed EIN not only outperforms state-of-the-art methods on real-world datasets but also exhibits enhanced robustness across varying tree depths.
arXiv Detail & Related papers (2024-11-20T00:43:32Z) - Natias: Neuron Attribution based Transferable Image Adversarial Steganography [62.906821876314275]
adversarial steganography has garnered considerable attention due to its ability to effectively deceive deep-learning-based steganalysis.
We propose a novel adversarial steganographic scheme named Natias.
Our proposed method can be seamlessly integrated with existing adversarial steganography frameworks.
arXiv Detail & Related papers (2024-09-08T04:09:51Z) - Unlearnable Examples Detection via Iterative Filtering [84.59070204221366]
Deep neural networks are proven to be vulnerable to data poisoning attacks.
It is quite beneficial and challenging to detect poisoned samples from a mixed dataset.
We propose an Iterative Filtering approach for UEs identification.
arXiv Detail & Related papers (2024-08-15T13:26:13Z) - Monsters in the Dark: Sanitizing Hidden Threats with Diffusion Models [4.443677138272269]
Steganography is the art of hiding information in plain sight.
Current image steganography defenses rely upon steganalysis, or the detection of hidden messages.
Recent work has focused on a defense mechanism known as sanitization, which eliminates hidden information from images.
arXiv Detail & Related papers (2023-10-10T19:15:11Z) - A New Benchmark and Reverse Validation Method for Passage-level
Hallucination Detection [63.56136319976554]
Large Language Models (LLMs) generate hallucinations, which can cause significant damage when deployed for mission-critical tasks.
We propose a self-check approach based on reverse validation to detect factual errors automatically in a zero-resource fashion.
We empirically evaluate our method and existing zero-resource detection methods on two datasets.
arXiv Detail & Related papers (2023-10-10T10:14:59Z) - Deep Learning for Steganalysis of Diverse Data Types: A review of
methods, taxonomy, challenges and future directions [3.2007743266566617]
Steganography and steganalysis have attracted a great deal of interest, particularly from law enforcement.
This review paper provides a comprehensive overview of deep learning-based steganalysis techniques.
arXiv Detail & Related papers (2023-08-08T18:37:24Z) - A Survey on Malware Detection with Graph Representation Learning [0.0]
Malware detection has become a major concern due to the increasing number and complexity of malware.
In recent years, Machine Learning (ML) and notably Deep Learning (DL) achieved impressive results in malware detection by learning useful representations from data.
This paper provides an in-depth literature review to summarize and unify existing works under the common approaches and architectures.
arXiv Detail & Related papers (2023-03-28T14:27:08Z) - A Study of Augmentation Methods for Handwritten Stenography Recognition [0.0]
We study 22 classical augmentation techniques, most of which are commonly used for HTR of other scripts.
We identify a group of augmentations, including for example contained ranges of random rotation, shifts and scaling, that are beneficial to the use case of stenography recognition.
arXiv Detail & Related papers (2023-03-05T20:06:19Z) - Dissecting Self-Supervised Learning Methods for Surgical Computer Vision [51.370873913181605]
Self-Supervised Learning (SSL) methods have begun to gain traction in the general computer vision community.
The effectiveness of SSL methods in more complex and impactful domains, such as medicine and surgery, remains limited and unexplored.
We present an extensive analysis of the performance of these methods on the Cholec80 dataset for two fundamental and popular tasks in surgical context understanding, phase recognition and tool presence detection.
arXiv Detail & Related papers (2022-07-01T14:17:11Z) - Graph-based Semi-supervised Learning: A Comprehensive Review [51.26862262550445]
Semi-supervised learning (SSL) has tremendous value in practice due to its ability to utilize both labeled data and unlabelled data.
An important class of SSL methods is to naturally represent data as graphs, which corresponds to graph-based semi-supervised learning (GSSL) methods.
GSSL methods have demonstrated their advantages in various domains due to their uniqueness of structure, the universality of applications, and their scalability to large scale data.
arXiv Detail & Related papers (2021-02-26T05:11:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.