packages = ["numpy"]

Hiding, Detecting, Protecting

Digital Media Security in the Age of Machine Learning

UM6P College of Computing - Guest Lecture

Yassine Yousfi

Hiding, Detecting, Protecting

Digital Media Life Security in the Age of Machine Learning Artificial Intelligence

UM6P College of Computing - Guest Lecture

Yassine Yousfi

Digital Life

BC (Before ChatGPT) AD (After Deep Learning)
Digital Images Social Media
Text Messages and Emails Large Language Models generated content
Static Documents AI Agents Automation

Digital Life Security

Deepfakes

Description

War on encryption

Description

Source: https://www.gp-digital.org/world-map-of-encryption/

Sensitive Communications

Description

Source: https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/

Coding Agents

Description

Prompt Injection

Description

Source: Understanding prompt injections: a frontier security challenge. OpenAI

LLMs are also protected content

Description

Artificial Intelligence

Software

C++

Description

Machine Learning

Structured (tabular) data

Description

Deep Learning

Computer Vision

Description

Deeper Learning

Large Language Models

Description

Deeperer Learning

Agents

Description

Artificial Intelligence Progress

Description

Kiela, Douwe, et al. "Dynabench: Rethinking benchmarking in NLP."
Proceedings of the 2021 conference of the North American chapter of the Association for Computational Linguistics

Hiding

Steganography

Steganography

Hide in the noise

Least Significant Bit Steganography

Original

Significant Bit



Bit Plane

Hide in the Bit Plane

Character Embedding Demo

Cover

Bit Plane



Character



Stego

Stego Bit Plane

Hide in the noise

Content Adaptive Steganography

Cover

Kernel


Convolved

Hide in the noise

Content Adaptive Steganography

Stego
Stego changes

Steganography Demo

Detecting

Steganalysis

Steganalysis

Detect in the noise

Description

Boroumand, Mehdi, Mo Chen, and Jessica Fridrich. "Deep residual network for steganalysis of digital images." IEEE Transactions on Information Forensics and Security 14.5 (2018)

Detect in the noise

Description

Outputs of Layer 7 from SRNet visualized as grayscale images.

Yousfi, Yassine. "Deep Learning for Image Steganography and Steganalysis: Challenges, Advances, and Opportunities." State University of New York at Binghamton, 2022.

Source Mismatch

Detectors are sensitive to:

Source Mismatch

Description

Giboulot, Quentin, et al. "Effects and solutions of cover-source mismatch in image steganalysis." Signal Processing: Image Communication 86 (2020)

Mechanistic Interpretability of Steganalysis Models

Description

Examples of visible local traces of Steganography found using SRNet.

Yousfi, Yassine, Jan Butora, and Jessica Fridrich. "CNN steganalyzers leverage local embedding artifacts." 2021 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2021.

Mechanistic Interpretability of Steganalysis Models

Description

Examples of visible local traces of Steganography found using SRNet.

Yousfi, Yassine, Jan Butora, and Jessica Fridrich. "CNN steganalyzers leverage local embedding artifacts." 2021 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 2021.

Generative Steganography

Vibe (Agentic) Steganography

Description

AUTO STEGO

Protecting

Watermarking

Watermarking

Description

Source: Shutterstock lol

Watermarking

Description

Watermarking

Description
Description

Boenisch, Franziska. "A systematic review on model watermarking for neural networks." Frontiers in Big Data 4 (2021).

Watermarking

Description

Thank You

Questions?