Steganography is used by threat actors to avoid detection or bypass blockages. Among the various approaches, hiding data within digital images is now the preferred offensive technique. Alas, developing attack-agnostic mitigation mechanisms is difficult, especially due to the tight relation between the images and the steganographic approach. Therefore, this paper takes advantage of autoencoders for sanitization, i.e., to disrupt the malicious information hidden in images without altering the visual quality. To this aim, we used an enhanced U-Net-like neural architecture. Results obtained with realistic threats showcased that our approach can effectively disrupt cloaked data and prevent the recovery of the payload while preserving the original image quality.

Erasing the Shadow: Sanitization of Images with Malicious Payloads Using Deep Autoencoders

Angelica Liguori
Co-primo
;
Marco Zuppelli
Co-primo
;
Massimo Guarascio;Luca Caviglione
Ultimo
2024

Abstract

Steganography is used by threat actors to avoid detection or bypass blockages. Among the various approaches, hiding data within digital images is now the preferred offensive technique. Alas, developing attack-agnostic mitigation mechanisms is difficult, especially due to the tight relation between the images and the steganographic approach. Therefore, this paper takes advantage of autoencoders for sanitization, i.e., to disrupt the malicious information hidden in images without altering the visual quality. To this aim, we used an enhanced U-Net-like neural architecture. Results obtained with realistic threats showcased that our approach can effectively disrupt cloaked data and prevent the recovery of the payload while preserving the original image quality.
2024
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
978-3-031-62700-2
Deep Learning, Steganography, Sanitization
File in questo prodotto:
File Dimensione Formato  
2024_ISMIS.pdf

solo utenti autorizzati

Tipologia: Versione Editoriale (PDF)
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 10.52 MB
Formato Adobe PDF
10.52 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/479202
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact