Skip to main content
Top
Published in: Multimedia Systems 4/2023

21-04-2023 | Regular Paper

Residual guided coordinate attention for selection channel aware image steganalysis

Authors: Kangkang Wei, Weiqi Luo, Minglin Liu, Miaoxin Ye

Published in: Multimedia Systems | Issue 4/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

According to the embedding probability used in modern content adaptive steganography, some selection channel aware (SCA) methods have been proposed to enhance the detection performances of existing steganalytic networks. Unlike existing SCA methods which process the embedding probability just with several convolutional layers, in this paper, we first introduce a residual guided coordinate attention into SCA steganalysis. The proposed method firstly employs a feature extraction module to obtain deeper information of the embedding probability, and then applies the coordinate attention module to catch the key information of feature maps and ignore irrelevant information that probably not be modified by steganography. The experimental results show that the proposed method can significantly enhance the detection performances of the original steganalytic networks in both the spatial and JPEG domains, and outperforms the modern SCA steganalytic methods. Furthermore, some ablation experimental results are given to verify the rationality of the proposed method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inform. Secur. 2014(1), 1–13 (2014)CrossRef Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inform. Secur. 2014(1), 1–13 (2014)CrossRef
2.
go back to reference Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: IEEE International Conference on Image Processing, pp. 4206–4210 (2014) Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: IEEE International Conference on Image Processing, pp. 4206–4210 (2014)
3.
go back to reference Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inform. Foren. Secur. 11(2), 221–234 (2015)CrossRef Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inform. Foren. Secur. 11(2), 221–234 (2015)CrossRef
4.
go back to reference Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inform. Foren. Secur. 9(5), 814–825 (2014)CrossRef Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inform. Foren. Secur. 9(5), 814–825 (2014)CrossRef
5.
go back to reference Li, L., Zhang, W., Qin, C., Chen, K., Zhou, W., Yu, N.: Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181, 107920 (2021)CrossRef Li, L., Zhang, W., Qin, C., Chen, K., Zhou, W., Yu, N.: Adversarial batch image steganography against CNN-based pooled steganalysis. Signal Process. 181, 107920 (2021)CrossRef
6.
go back to reference Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inform. Foren. Secur. 7(3), 868–882 (2012)CrossRef Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inform. Foren. Secur. 7(3), 868–882 (2012)CrossRef
7.
go back to reference Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 15–23 (2015) Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 15–23 (2015)
8.
go back to reference Luo, W., Dang, J., Wang, W., Zhai, F.: Low-complexity jpeg steganalysis via filters optimation from symmetric property. Multimed. Syst. 27(3), 371–377 (2021)CrossRef Luo, W., Dang, J., Wang, W., Zhai, F.: Low-complexity jpeg steganalysis via filters optimation from symmetric property. Multimed. Syst. 27(3), 371–377 (2021)CrossRef
9.
go back to reference Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inform. Foren. Secur. 7(2), 432–444 (2011)CrossRef Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inform. Foren. Secur. 7(2), 432–444 (2011)CrossRef
10.
go back to reference Xu, G., Wu, H.-Z., Shi, Y.-Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708–712 (2016)CrossRef Xu, G., Wu, H.-Z., Shi, Y.-Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708–712 (2016)CrossRef
11.
go back to reference Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inform. Foren. Secur. 12(11), 2545–2557 (2017)CrossRef Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inform. Foren. Secur. 12(11), 2545–2557 (2017)CrossRef
12.
go back to reference Deng, X., Chen, B., Luo, W., Luo, D.: Fast and effective global covariance pooling network for image steganalysis. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 230–234 (2019) Deng, X., Chen, B., Luo, W., Luo, D.: Fast and effective global covariance pooling network for image steganalysis. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 230–234 (2019)
13.
go back to reference Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inform. Foren. Secur. 14(5), 1181–1193 (2018)CrossRef Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inform. Foren. Secur. 14(5), 1181–1193 (2018)CrossRef
14.
go back to reference Fu, T., Chen, L., Fu, Z., Yu, K., Wang, Y.: Ccnet: Cnn model with channel attention and convolutional pooling mechanism for spatial image steganalysis. J. Vis. Commun. Image Represent. 88, 103633 (2022)CrossRef Fu, T., Chen, L., Fu, Z., Yu, K., Wang, Y.: Ccnet: Cnn model with channel attention and convolutional pooling mechanism for spatial image steganalysis. J. Vis. Commun. Image Represent. 88, 103633 (2022)CrossRef
15.
go back to reference Wang, P., Liu, F., Yang, C.: Towards feature representation for steganalysis of spatial steganography. Signal Process. 169, 107422 (2020)CrossRef Wang, P., Liu, F., Yang, C.: Towards feature representation for steganalysis of spatial steganography. Signal Process. 169, 107422 (2020)CrossRef
16.
go back to reference Wang, H., Pan, X., Fan, L., Zhao, S.: Steganalysis of convolutional neural network based on neural architecture search. Multimed. Syst. 27(3), 379–387 (2021)CrossRef Wang, H., Pan, X., Fan, L., Zhao, S.: Steganalysis of convolutional neural network based on neural architecture search. Multimed. Syst. 27(3), 379–387 (2021)CrossRef
17.
go back to reference Wei, K., Luo, W., Tan, S., Huang, J.: Universal deep network for steganalysis of color image based on channel representation. IEEE Trans. Inform. Foren. Secur. 17, 3022–3036 (2022)CrossRef Wei, K., Luo, W., Tan, S., Huang, J.: Universal deep network for steganalysis of color image based on channel representation. IEEE Trans. Inform. Foren. Secur. 17, 3022–3036 (2022)CrossRef
18.
go back to reference Zeng, J., Tan, S., Li, B., Huang, J.: Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans. Inform. Foren. Secur. 13(5), 1200–1214 (2017)CrossRef Zeng, J., Tan, S., Li, B., Huang, J.: Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans. Inform. Foren. Secur. 13(5), 1200–1214 (2017)CrossRef
19.
go back to reference Huang, J., Ni, J., Wan, L., Yan, J.: A customized convolutional neural network with low model complexity for JPEG steganalysis. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 198–203 (2019) Huang, J., Ni, J., Wan, L., Yan, J.: A customized convolutional neural network with low model complexity for JPEG steganalysis. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 198–203 (2019)
20.
go back to reference Yousfi, Y., Butora, J., Fridrich, J., Fuji Tsang, C.: Improving EfficientNet for JPEG steganalysis. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 149–157 (2021) Yousfi, Y., Butora, J., Fridrich, J., Fuji Tsang, C.: Improving EfficientNet for JPEG steganalysis. In: ACM Workshop on Information Hiding and Multimedia Security, pp. 149–157 (2021)
21.
go back to reference Wu, T., Ren, W., Li, D., Wang, L., Jia, J.: Jpeg steganalysis based on denoising network and attention module. Int. J. Intell. Syst. 37(8), 5011–5030 (2022)CrossRef Wu, T., Ren, W., Li, D., Wang, L., Jia, J.: Jpeg steganalysis based on denoising network and attention module. Int. J. Intell. Syst. 37(8), 5011–5030 (2022)CrossRef
22.
go back to reference Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 7132–7141 (2018) Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 7132–7141 (2018)
23.
go back to reference Tan, M., Le, Q.: EfficientNet: Rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105–6114 (2019) Tan, M., Le, Q.: EfficientNet: Rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105–6114 (2019)
24.
go back to reference Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inform. Foren. Secur. 5(4), 705–720 (2010)CrossRef Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inform. Foren. Secur. 5(4), 705–720 (2010)CrossRef
25.
go back to reference Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: IEEE International Workshop on Information Forensics and Security, pp. 48–53 (2014) Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: IEEE International Workshop on Information Forensics and Security, pp. 48–53 (2014)
26.
go back to reference Denemark, T., Fridrich, J., Comesaña-Alfaro, P.: Improving selection-channel-aware steganalysis features. Electron. Imaging 2016(8), 1–8 (2016)CrossRef Denemark, T., Fridrich, J., Comesaña-Alfaro, P.: Improving selection-channel-aware steganalysis features. Electron. Imaging 2016(8), 1–8 (2016)CrossRef
27.
go back to reference Ren, W., Zhai, L., Jia, J., Wang, L., Zhang, L.: Learning selection channels for image steganalysis in spatial domain. Neurocomputing 401, 78–90 (2020)CrossRef Ren, W., Zhai, L., Jia, J., Wang, L., Zhang, L.: Learning selection channels for image steganalysis in spatial domain. Neurocomputing 401, 78–90 (2020)CrossRef
28.
go back to reference Li, Q., Feng, G., Ren, Y., Zhang, X.: Embedding probability guided network for image steg analysis. IEEE Signal Process. Lett. 28(10), 1095–1099 (2021)CrossRef Li, Q., Feng, G., Ren, Y., Zhang, X.: Embedding probability guided network for image steg analysis. IEEE Signal Process. Lett. 28(10), 1095–1099 (2021)CrossRef
29.
go back to reference Denemark, T., Boroumand, M., Fridrich, J.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inform. Foren. Secur. 11(8), 1736–1746 (2016)CrossRef Denemark, T., Boroumand, M., Fridrich, J.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inform. Foren. Secur. 11(8), 1736–1746 (2016)CrossRef
30.
go back to reference Bas, P., Filler, T., Pevnỳ, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: International Workshop on Information Hiding, pp. 59–70 (2011) Bas, P., Filler, T., Pevnỳ, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: International Workshop on Information Hiding, pp. 59–70 (2011)
32.
go back to reference Wang, Q., Wu, B., Zhu, P., Li, P., Zuo, W., Hu, Q.: Eca-net: Efficient channel attention for deep convolutional neural networks. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 11531–11539 (2020) Wang, Q., Wu, B., Zhu, P., Li, P., Zuo, W., Hu, Q.: Eca-net: Efficient channel attention for deep convolutional neural networks. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 11531–11539 (2020)
33.
go back to reference Hou, Q., Zhou, D., Feng, J.: Coordinate attention for efficient mobile network design. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 13713–13722 (2021) Hou, Q., Zhou, D., Feng, J.: Coordinate attention for efficient mobile network design. In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 13713–13722 (2021)
34.
go back to reference Woo, S., Park, J., Lee, J., Kweon, I.S.: CBAM: convolutional block attention module. In: European Conference on Computer Vision, vol. 11211, pp. 3–19 (2018) Woo, S., Park, J., Lee, J., Kweon, I.S.: CBAM: convolutional block attention module. In: European Conference on Computer Vision, vol. 11211, pp. 3–19 (2018)
Metadata
Title
Residual guided coordinate attention for selection channel aware image steganalysis
Authors
Kangkang Wei
Weiqi Luo
Minglin Liu
Miaoxin Ye
Publication date
21-04-2023
Publisher
Springer Berlin Heidelberg
Published in
Multimedia Systems / Issue 4/2023
Print ISSN: 0942-4962
Electronic ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-023-01094-x

Other articles of this Issue 4/2023

Multimedia Systems 4/2023 Go to the issue