Skip to main content

2020 | OriginalPaper | Buchkapitel

14. Blind Quantitative Steganalysis Using CNN–Long Short-Term Memory Architecture

verfasst von : Anuradha Singhal, Punam Bedi

Erschienen in: Strategic System Assurance and Business Analytics

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Covered communication is termed as steganography. And unveiling details about this camouflaged communication is steganalysis. In the current era, steganalysis helps forensics examiners to analyze and detect malicious communication. Feature extraction, training phase and testing phase are three steps used by traditional machine learning algorithms for learning complex characteristics of images before using them for analysis. Deep learning models, on the other hand, comprise a large number of hidden network layers which are used to capture various statistical information of digital images and learn them automatically. This paper proposes a novel deep neural network technique using convolutional neural network (CNN) with long short-term memory (LSTM) for quantitative steganalysis, prediction of embedded message length in given stego-object. Experiments are performed using Keras Python library. Statistical measure MAE is used to compare proposed quantitative steganalysis. Experimental results show the good performance of the proposed model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nissar A, Mir A (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20(6):1758–1770CrossRef Nissar A, Mir A (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20(6):1758–1770CrossRef
2.
Zurück zum Zitat Avcibas I, Memon N, Sankur B (2001) Steganalysis using image quality metrics. In: Proceedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, vol 4314, no. 2, pp 523–531 Avcibas I, Memon N, Sankur B (2001) Steganalysis using image quality metrics. In: Proceedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, vol 4314, no. 2, pp 523–531
3.
Zurück zum Zitat Bedi P, Bhasin V, Mittal N, Chatterjee T (2014) FS-SDS: feature selection for JPEG steganalysis using stochastic diffusion search. In: SMC. Noida, UP, pp 3797–3802 Bedi P, Bhasin V, Mittal N, Chatterjee T (2014) FS-SDS: feature selection for JPEG steganalysis using stochastic diffusion search. In: SMC. Noida, UP, pp 3797–3802
4.
Zurück zum Zitat Bhasin V, Bedi P, Singhal A (2014) Feature selection for steganalysis based on modified stochastic diffusion search using fisher score. In: ICACCI. Noida, UP, pp 2323–2330 Bhasin V, Bedi P, Singhal A (2014) Feature selection for steganalysis based on modified stochastic diffusion search using fisher score. In: ICACCI. Noida, UP, pp 2323–2330
5.
Zurück zum Zitat Bhasin V, Bedi P, Goel A, Gupta S (2015) StegTrack: tracking images with hidden content. In: WCI, pp 318–323 Bhasin V, Bedi P, Goel A, Gupta S (2015) StegTrack: tracking images with hidden content. In: WCI, pp 318–323
6.
Zurück zum Zitat Bhasin V, Bedi P, Singh N, Aggarwal C (2015) FS-EHS: harmony search based feature selection algorithm for steganalysis using ELM. In: IBICA, pp 393–402 Bhasin V, Bedi P, Singh N, Aggarwal C (2015) FS-EHS: harmony search based feature selection algorithm for steganalysis using ELM. In: IBICA, pp 393–402
7.
Zurück zum Zitat Lou DC, Chou CL, Tso HK, Chiu CC (2012) Active steganalysis for histogram-shifting based reversible data hiding. Opt Commun 285(10–11):2510–2518CrossRef Lou DC, Chou CL, Tso HK, Chiu CC (2012) Active steganalysis for histogram-shifting based reversible data hiding. Opt Commun 285(10–11):2510–2518CrossRef
8.
Zurück zum Zitat Lou DC, Chou CL, Wei HY, Huang HF (2013) Active steganalysis for interpolation-error based reversible data hiding. Pattern Recognit Lett 34(9):1032–1036CrossRef Lou DC, Chou CL, Wei HY, Huang HF (2013) Active steganalysis for interpolation-error based reversible data hiding. Pattern Recognit Lett 34(9):1032–1036CrossRef
9.
Zurück zum Zitat Pevný T, Fridrich J, Ker AD (2009) From blind to quantitative steganalysis. Proc SPIE, Electron Imaging, Secur Forensics Multimed XI 7254(18–21):1–14 Pevný T, Fridrich J, Ker AD (2009) From blind to quantitative steganalysis. Proc SPIE, Electron Imaging, Secur Forensics Multimed XI 7254(18–21):1–14
10.
Zurück zum Zitat Fridrich J, Goljan M, Hogea D, Soukal D (2003) Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimed Syst 9(3):288–302CrossRef Fridrich J, Goljan M, Hogea D, Soukal D (2003) Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimed Syst 9(3):288–302CrossRef
11.
Zurück zum Zitat Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. Proc SPIE, Electron Imaging, Secur, Steganography, Watermarking Multimed Contents 5306(19–22):23–34CrossRef Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. Proc SPIE, Electron Imaging, Secur, Steganography, Watermarking Multimed Contents 5306(19–22):23–34CrossRef
12.
Zurück zum Zitat Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural. In: Advances in neural information processing systems, pp 1097–1105 Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural. In: Advances in neural information processing systems, pp 1097–1105
13.
Zurück zum Zitat Hinton G et al (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process Mag 29(6):82–97CrossRef Hinton G et al (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process Mag 29(6):82–97CrossRef
14.
Zurück zum Zitat Bahdana D, Cho K, Bengio Y (2015) Neural machine translation by jointly learning to align and translate. Iclr, pp 1–15, Sep 1 2015 Bahdana D, Cho K, Bengio Y (2015) Neural machine translation by jointly learning to align and translate. Iclr, pp 1–15, Sep 1 2015
15.
Zurück zum Zitat Karpathy A (2015) The unreasonable effectiveness of recurrent neural networks, May 21 2015 Karpathy A (2015) The unreasonable effectiveness of recurrent neural networks, May 21 2015
16.
Zurück zum Zitat Karpathy A, Johnson J, Fei-Fei L (2015) Visualizing and understanding recurrent networks. arXiv preprint, Jun 5 2015 Karpathy A, Johnson J, Fei-Fei L (2015) Visualizing and understanding recurrent networks. arXiv preprint, Jun 5 2015
17.
Zurück zum Zitat LeCun Y (2016) LeNet-5, convolutional neural networks (2015). Retrieved June 1 (2016) LeCun Y (2016) LeNet-5, convolutional neural networks (2015). Retrieved June 1 (2016)
18.
Zurück zum Zitat Lawrence S, Giles CL, Tsoi AC, Back AD (1997) Face recognition: a convolutional neural-network approach. EEE Trans Neural Netw 8(1):98–113CrossRef Lawrence S, Giles CL, Tsoi AC, Back AD (1997) Face recognition: a convolutional neural-network approach. EEE Trans Neural Netw 8(1):98–113CrossRef
19.
Zurück zum Zitat Greff K, Srivastav RK, Koutník J, Steunebrink BR, Schmidhuber J (2017) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222–2232CrossRef Greff K, Srivastav RK, Koutník J, Steunebrink BR, Schmidhuber J (2017) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222–2232CrossRef
20.
Zurück zum Zitat Holotyak T, Fridrich J, Voloshynovskyy S (2006) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: 9th IFIP TC-6 TC-11 conference on communications and multimedia security (CMS 2005), pp 273–274 Holotyak T, Fridrich J, Voloshynovskyy S (2006) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: 9th IFIP TC-6 TC-11 conference on communications and multimedia security (CMS 2005), pp 273–274
21.
Zurück zum Zitat Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inf Forensics Security 1(1):111–119CrossRef Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inf Forensics Security 1(1):111–119CrossRef
22.
Zurück zum Zitat Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimed, Spec Issue Secur 8(4):22–28CrossRef Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimed, Spec Issue Secur 8(4):22–28CrossRef
23.
Zurück zum Zitat Gul G, Kurugollu F (2010) SVD-based universal spatial domain image steganalysis, vol 2, Jun 2010, pp 349–353 Gul G, Kurugollu F (2010) SVD-based universal spatial domain image steganalysis, vol 2, Jun 2010, pp 349–353
24.
Zurück zum Zitat Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents, vol 5681, no 16–20, pp 595–606, Jan 2005 Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents, vol 5681, no 16–20, pp 595–606, Jan 2005
25.
Zurück zum Zitat Jiang M, Menion N, Wong E, Wu X (2004) Quantitative steganalysis of binary images. In: International conference on image processing. ICIP’04, IEEE, pp 29–32 Jiang M, Menion N, Wong E, Wu X (2004) Quantitative steganalysis of binary images. In: International conference on image processing. ICIP’04, IEEE, pp 29–32
26.
Zurück zum Zitat Modaghegh H, Seyedin SA (2015) A new fast and efficient active steganalysis based on combined geometrical blind source separation. Multimed Tools Appl 74(15):5825–5843CrossRef Modaghegh H, Seyedin SA (2015) A new fast and efficient active steganalysis based on combined geometrical blind source separation. Multimed Tools Appl 74(15):5825–5843CrossRef
27.
Zurück zum Zitat Kodovský J, Fridrich J (2013) Quantitative steganalysis using rich models. In: Media watermarking, security, and forensics, International Society for Optics and Photonics, vol 8665, p 86650O Kodovský J, Fridrich J (2013) Quantitative steganalysis using rich models. In: Media watermarking, security, and forensics, International Society for Optics and Photonics, vol 8665, p 86650O
28.
Zurück zum Zitat Yang C, Liu F, Luo X, Zeng Y (2013) Pixel group trace model-based quantitative steganalysis for multiple least-significant bits steganography. IEEE Trans Inf Forensics Secur, pp 216–228 Yang C, Liu F, Luo X, Zeng Y (2013) Pixel group trace model-based quantitative steganalysis for multiple least-significant bits steganography. IEEE Trans Inf Forensics Secur, pp 216–228
29.
Zurück zum Zitat Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB steganography via sample pairs analysis. In: 5th international workshop on information hiding, Lecture notes in computer science, vol 2578, no 7–9, pp 355–372, October 2002 Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB steganography via sample pairs analysis. In: 5th international workshop on information hiding, Lecture notes in computer science, vol 2578, no 7–9, pp 355–372, October 2002
30.
Zurück zum Zitat Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol 6819, no 27–31, pp 1–17, Jan 2008 Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol 6819, no 27–31, pp 1–17, Jan 2008
31.
Zurück zum Zitat Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, Electronic Imaging, Security, vol 5681, no 16–20, pp 595–606, Jan 2005 Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, Electronic Imaging, Security, vol 5681, no 16–20, pp 595–606, Jan 2005
32.
Zurück zum Zitat Vinyals O, Toshev A, Bengio S, Erhan D (2015) Show and tell: a neural image caption generator. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3156–3164 Vinyals O, Toshev A, Bengio S, Erhan D (2015) Show and tell: a neural image caption generator. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3156–3164
33.
Zurück zum Zitat Sainath TN, Vinyals O, Senior A, Sak H (2015) Convolutional, long short-term memory, fully connected deep neural networks. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 4580–4584, Apr 19 2015 Sainath TN, Vinyals O, Senior A, Sak H (2015) Convolutional, long short-term memory, fully connected deep neural networks. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 4580–4584, Apr 19 2015
34.
Zurück zum Zitat Glorot X, Bordes A, Bengio Y Deep sparse rectifier neural networks. In: Proceedings of the fourteenth international conference on artificial intelligence and statistics, pp 315–323, Jun 14 Glorot X, Bordes A, Bengio Y Deep sparse rectifier neural networks. In: Proceedings of the fourteenth international conference on artificial intelligence and statistics, pp 315–323, Jun 14
35.
Zurück zum Zitat He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778 He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
36.
Zurück zum Zitat Baccouche M, Mamalet F, Wolf C, Garcia C, Baskurt A (2016) Sequential deep learning for human action recognition. In: Lecture Notes in Computer Science. 7065. Springer, pp 29–39, Nov 2016 Baccouche M, Mamalet F, Wolf C, Garcia C, Baskurt A (2016) Sequential deep learning for human action recognition. In: Lecture Notes in Computer Science. 7065. Springer, pp 29–39, Nov 2016
37.
Zurück zum Zitat Grefenstette E, Blunsom P, de Freitas N, Hermann KM (2014) A deep architecture for semantic parsing. arXiv:1404.7296, Apr 29 2014 Grefenstette E, Blunsom P, de Freitas N, Hermann KM (2014) A deep architecture for semantic parsing. arXiv:​1404.​7296, Apr 29 2014
38.
Zurück zum Zitat Wallach I, Dzamba M, Heifets A (2015) AtomNet: a deep convolutional neural network for bioactivity prediction in structure-based drug discovery. arXiv preprint arXiv:1510.02855, Oct 10 2015 Wallach I, Dzamba M, Heifets A (2015) AtomNet: a deep convolutional neural network for bioactivity prediction in structure-based drug discovery. arXiv preprint arXiv:​1510.​02855, Oct 10 2015
39.
Zurück zum Zitat Willmott CJ, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. In: IOP conference series: materials science and engineering, Shanghai, China, pp 79–82 Willmott CJ, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. In: IOP conference series: materials science and engineering, Shanghai, China, pp 79–82
41.
Zurück zum Zitat Westfeld A (2001) High capacity despite better steganalysis (F5—a steganographic algorithm). In: 4th international workshop on information hiding, vol 2137 of Lecture notes in computer science, New York, pp 289–302 Westfeld A (2001) High capacity despite better steganalysis (F5—a steganographic algorithm). In: 4th international workshop on information hiding, vol 2137 of Lecture notes in computer science, New York, pp 289–302
42.
Zurück zum Zitat Vapnik V (1998) Statistical learning theory, Wiley Vapnik V (1998) Statistical learning theory, Wiley
43.
Zurück zum Zitat Sallee P (2003) Model-based steganography. Proceedings of 2nd international workshop digital watermarking, vol 2939, pp 154–167, Oct 2003 Sallee P (2003) Model-based steganography. Proceedings of 2nd international workshop digital watermarking, vol 2939, pp 154–167, Oct 2003
44.
Zurück zum Zitat Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph, pp 167–190 Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph, pp 167–190
45.
Zurück zum Zitat Sadek RA (2012) SVD based image processing applications: state of the art, contributions and research challenges. In arXiv preprint arXiv:1211.7102 Sadek RA (2012) SVD based image processing applications: state of the art, contributions and research challenges. In arXiv preprint arXiv:​1211.​7102
46.
Zurück zum Zitat Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX security symposium, Washington DC, USA, 2001 Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX security symposium, Washington DC, USA, 2001
47.
Zurück zum Zitat Pevný T, Fridrich J, Ker AD (2012) From blind to quantitative steganalysis. IEEE Trans Inf Forensics Secur 7(2):445–454CrossRef Pevný T, Fridrich J, Ker AD (2012) From blind to quantitative steganalysis. IEEE Trans Inf Forensics Secur 7(2):445–454CrossRef
48.
Zurück zum Zitat Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: 12th international conference on information hiding, vol 6387 Springer LNCS, pp 161–177 Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: 12th international conference on information hiding, vol 6387 Springer LNCS, pp 161–177
49.
Zurück zum Zitat Fridrich J, Kodovsk J (2013) Steganalysis of LSB replacement using parity-aware features. In: Information Hiding, vol 7692, no. Lecture notes in computer science, pp. 31–45 Fridrich J, Kodovsk J (2013) Steganalysis of LSB replacement using parity-aware features. In: Information Hiding, vol 7692, no. Lecture notes in computer science, pp. 31–45
Metadaten
Titel
Blind Quantitative Steganalysis Using CNN–Long Short-Term Memory Architecture
verfasst von
Anuradha Singhal
Punam Bedi
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-3647-2_14

Premium Partner