Skip to main content

2020 | OriginalPaper | Buchkapitel

Evaluation of Deep Learning and Conventional Approaches for Image Steganalysis

verfasst von : Guoliang Xie, Jinchang Ren, Huimin Zhao, Sophia Zhao, Stephen Marshall

Erschienen in: Advances in Brain Inspired Cognitive Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Steganography is the technique that’s used to embed secret messages into digital media without changing their appearances. As a countermeasure to steganography, steganalysis detects the presence of hidden data in a digital content. For the last decade, the majority of image steganalysis approaches can be formed by two stages. The first stage is to extract effective features from the image content and the second is to train a classifier in machine learning by using the features from stage one. Ultimately the image steganalysis becomes a binary classification problem. Since Deep Learning related architecture unify these two stages and save researchers lots of time designing hand-crafted features, the design of a CNN-based steganalyzer has therefore received increasing attention over the past few years. In this paper, we will examine the development in image steganalysis, both in spatial domain and in JPEG domain, and discuss the future directions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sedighi, V., et al.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2015)CrossRef Sedighi, V., et al.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2015)CrossRef
2.
Zurück zum Zitat Holub, V., et al.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1 (2014)CrossRef Holub, V., et al.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1 (2014)CrossRef
3.
Zurück zum Zitat Li, B., et al.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP) (2014) Li, B., et al.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP) (2014)
4.
Zurück zum Zitat Holub, V., et al.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (2012) Holub, V., et al.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (2012)
6.
Zurück zum Zitat Guo, L., et al.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)CrossRef Guo, L., et al.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)CrossRef
7.
Zurück zum Zitat Schlegel, D.: Deep machine learning on GPU. University of Heidelber-Ziti, p. 12 (2015) Schlegel, D.: Deep machine learning on GPU. University of Heidelber-Ziti, p. 12 (2015)
8.
Zurück zum Zitat Pevny, T., et al.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)CrossRef Pevny, T., et al.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)CrossRef
9.
Zurück zum Zitat Fridrich, J., et al.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)CrossRef Fridrich, J., et al.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)CrossRef
10.
Zurück zum Zitat Kodovsky, J., Holub, V., et al.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2011)CrossRef Kodovsky, J., Holub, V., et al.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2011)CrossRef
11.
Zurück zum Zitat Holub, V., et al.: Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, San Francisco, CA, vol. 8665 (2013) Holub, V., et al.: Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, San Francisco, CA, vol. 8665 (2013)
12.
Zurück zum Zitat Holub, V., et al.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)CrossRef Holub, V., et al.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)CrossRef
13.
Zurück zum Zitat Denemark, T., et al.: Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS) (2014) Denemark, T., et al.: Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS) (2014)
14.
Zurück zum Zitat Li, B., et al.: New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Trans. Inf. Forensics Secur. 13(5), 1242–1257 (2017)CrossRef Li, B., et al.: New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Trans. Inf. Forensics Secur. 13(5), 1242–1257 (2017)CrossRef
15.
Zurück zum Zitat Chen, C., et al.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International Symposium on Circuits and Systems. IEEE (2008) Chen, C., et al.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International Symposium on Circuits and Systems. IEEE (2008)
17.
Zurück zum Zitat Kodovský, J., et al.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security. ACM (2009) Kodovský, J., et al.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security. ACM (2009)
18.
Zurück zum Zitat Liu, Q.: Steganalysis of DCT-embedding based adaptive steganography and YASS. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security. ACM (2011) Liu, Q.: Steganalysis of DCT-embedding based adaptive steganography and YASS. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security. ACM (2011)
19.
Zurück zum Zitat Kodovský, J., et al.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Media Watermarking, Security, and Forensics III, vol. 7880. International Society for Optics and Photonics (2011) Kodovský, J., et al.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Media Watermarking, Security, and Forensics III, vol. 7880. International Society for Optics and Photonics (2011)
20.
Zurück zum Zitat Kodovský, J., et al.: Steganalysis of JPEG images using rich models. In: Media Watermarking, Security, and Forensics 2012, vol. 8303. International Society for Optics and Photonics (2012) Kodovský, J., et al.: Steganalysis of JPEG images using rich models. In: Media Watermarking, Security, and Forensics 2012, vol. 8303. International Society for Optics and Photonics (2012)
21.
Zurück zum Zitat Holub, V., et al.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2014)CrossRef Holub, V., et al.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2014)CrossRef
22.
Zurück zum Zitat Holub, V., et al.: Phase-aware projection model for steganalysis of JPEG images. In: Media Watermarking, Security, and Forensics 2015, vol. 9409. International Society for Optics and Photonics (2015) Holub, V., et al.: Phase-aware projection model for steganalysis of JPEG images. In: Media Watermarking, Security, and Forensics 2015, vol. 9409. International Society for Optics and Photonics (2015)
23.
Zurück zum Zitat Song, X., et al.: Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM (2015) Song, X., et al.: Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM (2015)
24.
Zurück zum Zitat Denemark, T., et al.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736–1746 (2016)CrossRef Denemark, T., et al.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736–1746 (2016)CrossRef
25.
Zurück zum Zitat Qian, Y., et al.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, vol. 9409. International Society for Optics and Photonics (2015) Qian, Y., et al.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, vol. 9409. International Society for Optics and Photonics (2015)
26.
Zurück zum Zitat Krizhevsky, A., et al.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (2012) Krizhevsky, A., et al.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (2012)
27.
Zurück zum Zitat Pibre, L., et al.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron. Imaging 4(8), 1–11 (2016)CrossRef Pibre, L., et al.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron. Imaging 4(8), 1–11 (2016)CrossRef
28.
Zurück zum Zitat Xu, G., et al.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708–712 (2016)CrossRef Xu, G., et al.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708–712 (2016)CrossRef
29.
Zurück zum Zitat Xu, G., et al.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM (2016) Xu, G., et al.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM (2016)
30.
Zurück zum Zitat Qian, Y., et al.: Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing (ICIP) (2016) Qian, Y., et al.: Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing (ICIP) (2016)
31.
Zurück zum Zitat Ye, J., et al.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)CrossRef Ye, J., et al.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)CrossRef
32.
Zurück zum Zitat Yedroudj, M., et al.: Yedroudj-Net: an efficient CNN for spatial steganalysis. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2018) Yedroudj, M., et al.: Yedroudj-Net: an efficient CNN for spatial steganalysis. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2018)
33.
Zurück zum Zitat Li, B., et al.: ReST-Net: diverse activation modules and parallel subnets-based CNN for spatial image steganalysis. IEEE Sig. Process. Lett. 25(5), 650–654 (2018)CrossRef Li, B., et al.: ReST-Net: diverse activation modules and parallel subnets-based CNN for spatial image steganalysis. IEEE Sig. Process. Lett. 25(5), 650–654 (2018)CrossRef
34.
Zurück zum Zitat Zhang, R., et al.: Efficient feature learning and multi-size image steganalysis based on CNN. arXiv preprint arXiv:1807.11428 (2018) Zhang, R., et al.: Efficient feature learning and multi-size image steganalysis based on CNN. arXiv preprint arXiv:​1807.​11428 (2018)
35.
Zurück zum Zitat Wu, S., et al.: Deep residual learning for image steganalysis. Multimed. Tools Appl. 77(9), 10437–10453 (2018)CrossRef Wu, S., et al.: Deep residual learning for image steganalysis. Multimed. Tools Appl. 77(9), 10437–10453 (2018)CrossRef
36.
Zurück zum Zitat Boroumand, M., et al.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181–1193 (2018)CrossRef Boroumand, M., et al.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181–1193 (2018)CrossRef
37.
Zurück zum Zitat Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017) Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017)
38.
Zurück zum Zitat Chen, M., et al.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017) Chen, M., et al.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017)
40.
Zurück zum Zitat Zeng, J., et al.: Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans. Inf. Forensics Secur. 13(5), 1200–1214 (2017)CrossRef Zeng, J., et al.: Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans. Inf. Forensics Secur. 13(5), 1200–1214 (2017)CrossRef
41.
Zurück zum Zitat Xia, C., et al.: Improved PHARM for JPEG steganalysis: making PHARM more efficient and effective. IEEE Access 7, 50339–50346 (2019)CrossRef Xia, C., et al.: Improved PHARM for JPEG steganalysis: making PHARM more efficient and effective. IEEE Access 7, 50339–50346 (2019)CrossRef
42.
Zurück zum Zitat Feng, G., et al.: Diversity-based cascade filters for JPEG steganalysis. IEEE Trans. Circuits Syst. Video Technol. (2019) Feng, G., et al.: Diversity-based cascade filters for JPEG steganalysis. IEEE Trans. Circuits Syst. Video Technol. (2019)
43.
Zurück zum Zitat Hu, D., et al.: Digital image steganalysis based on visual attention and deep reinforcement learning. IEEE Access 7, 25924–25935 (2019)CrossRef Hu, D., et al.: Digital image steganalysis based on visual attention and deep reinforcement learning. IEEE Access 7, 25924–25935 (2019)CrossRef
46.
Zurück zum Zitat Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)MathSciNetCrossRef Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)MathSciNetCrossRef
Metadaten
Titel
Evaluation of Deep Learning and Conventional Approaches for Image Steganalysis
verfasst von
Guoliang Xie
Jinchang Ren
Huimin Zhao
Sophia Zhao
Stephen Marshall
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39431-8_33