Skip to main content
Top

2020 | OriginalPaper | Chapter

14. Blind Quantitative Steganalysis Using CNN–Long Short-Term Memory Architecture

Authors : Anuradha Singhal, Punam Bedi

Published in: Strategic System Assurance and Business Analytics

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Covered communication is termed as steganography. And unveiling details about this camouflaged communication is steganalysis. In the current era, steganalysis helps forensics examiners to analyze and detect malicious communication. Feature extraction, training phase and testing phase are three steps used by traditional machine learning algorithms for learning complex characteristics of images before using them for analysis. Deep learning models, on the other hand, comprise a large number of hidden network layers which are used to capture various statistical information of digital images and learn them automatically. This paper proposes a novel deep neural network technique using convolutional neural network (CNN) with long short-term memory (LSTM) for quantitative steganalysis, prediction of embedded message length in given stego-object. Experiments are performed using Keras Python library. Statistical measure MAE is used to compare proposed quantitative steganalysis. Experimental results show the good performance of the proposed model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Nissar A, Mir A (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20(6):1758–1770CrossRef Nissar A, Mir A (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20(6):1758–1770CrossRef
2.
go back to reference Avcibas I, Memon N, Sankur B (2001) Steganalysis using image quality metrics. In: Proceedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, vol 4314, no. 2, pp 523–531 Avcibas I, Memon N, Sankur B (2001) Steganalysis using image quality metrics. In: Proceedings of SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, vol 4314, no. 2, pp 523–531
3.
go back to reference Bedi P, Bhasin V, Mittal N, Chatterjee T (2014) FS-SDS: feature selection for JPEG steganalysis using stochastic diffusion search. In: SMC. Noida, UP, pp 3797–3802 Bedi P, Bhasin V, Mittal N, Chatterjee T (2014) FS-SDS: feature selection for JPEG steganalysis using stochastic diffusion search. In: SMC. Noida, UP, pp 3797–3802
4.
go back to reference Bhasin V, Bedi P, Singhal A (2014) Feature selection for steganalysis based on modified stochastic diffusion search using fisher score. In: ICACCI. Noida, UP, pp 2323–2330 Bhasin V, Bedi P, Singhal A (2014) Feature selection for steganalysis based on modified stochastic diffusion search using fisher score. In: ICACCI. Noida, UP, pp 2323–2330
5.
go back to reference Bhasin V, Bedi P, Goel A, Gupta S (2015) StegTrack: tracking images with hidden content. In: WCI, pp 318–323 Bhasin V, Bedi P, Goel A, Gupta S (2015) StegTrack: tracking images with hidden content. In: WCI, pp 318–323
6.
go back to reference Bhasin V, Bedi P, Singh N, Aggarwal C (2015) FS-EHS: harmony search based feature selection algorithm for steganalysis using ELM. In: IBICA, pp 393–402 Bhasin V, Bedi P, Singh N, Aggarwal C (2015) FS-EHS: harmony search based feature selection algorithm for steganalysis using ELM. In: IBICA, pp 393–402
7.
go back to reference Lou DC, Chou CL, Tso HK, Chiu CC (2012) Active steganalysis for histogram-shifting based reversible data hiding. Opt Commun 285(10–11):2510–2518CrossRef Lou DC, Chou CL, Tso HK, Chiu CC (2012) Active steganalysis for histogram-shifting based reversible data hiding. Opt Commun 285(10–11):2510–2518CrossRef
8.
go back to reference Lou DC, Chou CL, Wei HY, Huang HF (2013) Active steganalysis for interpolation-error based reversible data hiding. Pattern Recognit Lett 34(9):1032–1036CrossRef Lou DC, Chou CL, Wei HY, Huang HF (2013) Active steganalysis for interpolation-error based reversible data hiding. Pattern Recognit Lett 34(9):1032–1036CrossRef
9.
go back to reference Pevný T, Fridrich J, Ker AD (2009) From blind to quantitative steganalysis. Proc SPIE, Electron Imaging, Secur Forensics Multimed XI 7254(18–21):1–14 Pevný T, Fridrich J, Ker AD (2009) From blind to quantitative steganalysis. Proc SPIE, Electron Imaging, Secur Forensics Multimed XI 7254(18–21):1–14
10.
go back to reference Fridrich J, Goljan M, Hogea D, Soukal D (2003) Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimed Syst 9(3):288–302CrossRef Fridrich J, Goljan M, Hogea D, Soukal D (2003) Quantitative steganalysis of digital images: estimating the secret message length. ACM Multimed Syst 9(3):288–302CrossRef
11.
go back to reference Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. Proc SPIE, Electron Imaging, Secur, Steganography, Watermarking Multimed Contents 5306(19–22):23–34CrossRef Fridrich J, Goljan M (2004) On estimation of secret message length in LSB steganography in spatial domain. Proc SPIE, Electron Imaging, Secur, Steganography, Watermarking Multimed Contents 5306(19–22):23–34CrossRef
12.
go back to reference Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural. In: Advances in neural information processing systems, pp 1097–1105 Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural. In: Advances in neural information processing systems, pp 1097–1105
13.
go back to reference Hinton G et al (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process Mag 29(6):82–97CrossRef Hinton G et al (2012) Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process Mag 29(6):82–97CrossRef
14.
go back to reference Bahdana D, Cho K, Bengio Y (2015) Neural machine translation by jointly learning to align and translate. Iclr, pp 1–15, Sep 1 2015 Bahdana D, Cho K, Bengio Y (2015) Neural machine translation by jointly learning to align and translate. Iclr, pp 1–15, Sep 1 2015
15.
go back to reference Karpathy A (2015) The unreasonable effectiveness of recurrent neural networks, May 21 2015 Karpathy A (2015) The unreasonable effectiveness of recurrent neural networks, May 21 2015
16.
go back to reference Karpathy A, Johnson J, Fei-Fei L (2015) Visualizing and understanding recurrent networks. arXiv preprint, Jun 5 2015 Karpathy A, Johnson J, Fei-Fei L (2015) Visualizing and understanding recurrent networks. arXiv preprint, Jun 5 2015
17.
go back to reference LeCun Y (2016) LeNet-5, convolutional neural networks (2015). Retrieved June 1 (2016) LeCun Y (2016) LeNet-5, convolutional neural networks (2015). Retrieved June 1 (2016)
18.
go back to reference Lawrence S, Giles CL, Tsoi AC, Back AD (1997) Face recognition: a convolutional neural-network approach. EEE Trans Neural Netw 8(1):98–113CrossRef Lawrence S, Giles CL, Tsoi AC, Back AD (1997) Face recognition: a convolutional neural-network approach. EEE Trans Neural Netw 8(1):98–113CrossRef
19.
go back to reference Greff K, Srivastav RK, Koutník J, Steunebrink BR, Schmidhuber J (2017) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222–2232CrossRef Greff K, Srivastav RK, Koutník J, Steunebrink BR, Schmidhuber J (2017) LSTM: A search space odyssey. IEEE Trans Neural Netw Learn Syst 28(10):2222–2232CrossRef
20.
go back to reference Holotyak T, Fridrich J, Voloshynovskyy S (2006) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: 9th IFIP TC-6 TC-11 conference on communications and multimedia security (CMS 2005), pp 273–274 Holotyak T, Fridrich J, Voloshynovskyy S (2006) Blind statistical steganalysis of additive steganography using wavelet higher order statistics. In: 9th IFIP TC-6 TC-11 conference on communications and multimedia security (CMS 2005), pp 273–274
21.
go back to reference Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inf Forensics Security 1(1):111–119CrossRef Lyu S, Farid H (2006) Steganalysis using higher-order image statistics. IEEE Trans Inf Forensics Security 1(1):111–119CrossRef
22.
go back to reference Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimed, Spec Issue Secur 8(4):22–28CrossRef Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color and gray-scale images. IEEE Multimed, Spec Issue Secur 8(4):22–28CrossRef
23.
go back to reference Gul G, Kurugollu F (2010) SVD-based universal spatial domain image steganalysis, vol 2, Jun 2010, pp 349–353 Gul G, Kurugollu F (2010) SVD-based universal spatial domain image steganalysis, vol 2, Jun 2010, pp 349–353
24.
go back to reference Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents, vol 5681, no 16–20, pp 595–606, Jan 2005 Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, electronic imaging, security, steganography, and watermarking of multimedia contents, vol 5681, no 16–20, pp 595–606, Jan 2005
25.
go back to reference Jiang M, Menion N, Wong E, Wu X (2004) Quantitative steganalysis of binary images. In: International conference on image processing. ICIP’04, IEEE, pp 29–32 Jiang M, Menion N, Wong E, Wu X (2004) Quantitative steganalysis of binary images. In: International conference on image processing. ICIP’04, IEEE, pp 29–32
26.
go back to reference Modaghegh H, Seyedin SA (2015) A new fast and efficient active steganalysis based on combined geometrical blind source separation. Multimed Tools Appl 74(15):5825–5843CrossRef Modaghegh H, Seyedin SA (2015) A new fast and efficient active steganalysis based on combined geometrical blind source separation. Multimed Tools Appl 74(15):5825–5843CrossRef
27.
go back to reference Kodovský J, Fridrich J (2013) Quantitative steganalysis using rich models. In: Media watermarking, security, and forensics, International Society for Optics and Photonics, vol 8665, p 86650O Kodovský J, Fridrich J (2013) Quantitative steganalysis using rich models. In: Media watermarking, security, and forensics, International Society for Optics and Photonics, vol 8665, p 86650O
28.
go back to reference Yang C, Liu F, Luo X, Zeng Y (2013) Pixel group trace model-based quantitative steganalysis for multiple least-significant bits steganography. IEEE Trans Inf Forensics Secur, pp 216–228 Yang C, Liu F, Luo X, Zeng Y (2013) Pixel group trace model-based quantitative steganalysis for multiple least-significant bits steganography. IEEE Trans Inf Forensics Secur, pp 216–228
29.
go back to reference Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB steganography via sample pairs analysis. In: 5th international workshop on information hiding, Lecture notes in computer science, vol 2578, no 7–9, pp 355–372, October 2002 Dumitrescu S, Wu X, Wang Z (2002) Detection of LSB steganography via sample pairs analysis. In: 5th international workshop on information hiding, Lecture notes in computer science, vol 2578, no 7–9, pp 355–372, October 2002
30.
go back to reference Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol 6819, no 27–31, pp 1–17, Jan 2008 Ker AD, Böhme R (2008) Revisiting weighted stego-image steganalysis. In: Proceedings SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol 6819, no 27–31, pp 1–17, Jan 2008
31.
go back to reference Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, Electronic Imaging, Security, vol 5681, no 16–20, pp 595–606, Jan 2005 Soukal D, Fridrich J, Goljan M (2005) Maximum likelihood estimation of secret message length embedded using steganography in spatial domain. In: Proceedings of SPIE, Electronic Imaging, Security, vol 5681, no 16–20, pp 595–606, Jan 2005
32.
go back to reference Vinyals O, Toshev A, Bengio S, Erhan D (2015) Show and tell: a neural image caption generator. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3156–3164 Vinyals O, Toshev A, Bengio S, Erhan D (2015) Show and tell: a neural image caption generator. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3156–3164
33.
go back to reference Sainath TN, Vinyals O, Senior A, Sak H (2015) Convolutional, long short-term memory, fully connected deep neural networks. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 4580–4584, Apr 19 2015 Sainath TN, Vinyals O, Senior A, Sak H (2015) Convolutional, long short-term memory, fully connected deep neural networks. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 4580–4584, Apr 19 2015
34.
go back to reference Glorot X, Bordes A, Bengio Y Deep sparse rectifier neural networks. In: Proceedings of the fourteenth international conference on artificial intelligence and statistics, pp 315–323, Jun 14 Glorot X, Bordes A, Bengio Y Deep sparse rectifier neural networks. In: Proceedings of the fourteenth international conference on artificial intelligence and statistics, pp 315–323, Jun 14
35.
go back to reference He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778 He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
36.
go back to reference Baccouche M, Mamalet F, Wolf C, Garcia C, Baskurt A (2016) Sequential deep learning for human action recognition. In: Lecture Notes in Computer Science. 7065. Springer, pp 29–39, Nov 2016 Baccouche M, Mamalet F, Wolf C, Garcia C, Baskurt A (2016) Sequential deep learning for human action recognition. In: Lecture Notes in Computer Science. 7065. Springer, pp 29–39, Nov 2016
37.
38.
go back to reference Wallach I, Dzamba M, Heifets A (2015) AtomNet: a deep convolutional neural network for bioactivity prediction in structure-based drug discovery. arXiv preprint arXiv:1510.02855, Oct 10 2015 Wallach I, Dzamba M, Heifets A (2015) AtomNet: a deep convolutional neural network for bioactivity prediction in structure-based drug discovery. arXiv preprint arXiv:​1510.​02855, Oct 10 2015
39.
go back to reference Willmott CJ, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. In: IOP conference series: materials science and engineering, Shanghai, China, pp 79–82 Willmott CJ, Matsuura K (2005) Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. In: IOP conference series: materials science and engineering, Shanghai, China, pp 79–82
41.
go back to reference Westfeld A (2001) High capacity despite better steganalysis (F5—a steganographic algorithm). In: 4th international workshop on information hiding, vol 2137 of Lecture notes in computer science, New York, pp 289–302 Westfeld A (2001) High capacity despite better steganalysis (F5—a steganographic algorithm). In: 4th international workshop on information hiding, vol 2137 of Lecture notes in computer science, New York, pp 289–302
42.
go back to reference Vapnik V (1998) Statistical learning theory, Wiley Vapnik V (1998) Statistical learning theory, Wiley
43.
go back to reference Sallee P (2003) Model-based steganography. Proceedings of 2nd international workshop digital watermarking, vol 2939, pp 154–167, Oct 2003 Sallee P (2003) Model-based steganography. Proceedings of 2nd international workshop digital watermarking, vol 2939, pp 154–167, Oct 2003
44.
go back to reference Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph, pp 167–190 Sallee P (2005) Model-based methods for steganography and steganalysis. Int J Image Graph, pp 167–190
45.
go back to reference Sadek RA (2012) SVD based image processing applications: state of the art, contributions and research challenges. In arXiv preprint arXiv:1211.7102 Sadek RA (2012) SVD based image processing applications: state of the art, contributions and research challenges. In arXiv preprint arXiv:​1211.​7102
46.
go back to reference Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX security symposium, Washington DC, USA, 2001 Provos N (2001) Defending against statistical steganalysis. In: 10th USENIX security symposium, Washington DC, USA, 2001
47.
go back to reference Pevný T, Fridrich J, Ker AD (2012) From blind to quantitative steganalysis. IEEE Trans Inf Forensics Secur 7(2):445–454CrossRef Pevný T, Fridrich J, Ker AD (2012) From blind to quantitative steganalysis. IEEE Trans Inf Forensics Secur 7(2):445–454CrossRef
48.
go back to reference Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: 12th international conference on information hiding, vol 6387 Springer LNCS, pp 161–177 Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: 12th international conference on information hiding, vol 6387 Springer LNCS, pp 161–177
49.
go back to reference Fridrich J, Kodovsk J (2013) Steganalysis of LSB replacement using parity-aware features. In: Information Hiding, vol 7692, no. Lecture notes in computer science, pp. 31–45 Fridrich J, Kodovsk J (2013) Steganalysis of LSB replacement using parity-aware features. In: Information Hiding, vol 7692, no. Lecture notes in computer science, pp. 31–45
Metadata
Title
Blind Quantitative Steganalysis Using CNN–Long Short-Term Memory Architecture
Authors
Anuradha Singhal
Punam Bedi
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-3647-2_14

Premium Partner