Skip to main content
Erschienen in: Multimedia Systems 3/2021

26.03.2021 | Special Issue Paper

Steganalysis of convolutional neural network based on neural architecture search

verfasst von: Hongbo Wang, Xingyu Pan, Lingyan Fan, Shuofeng Zhao

Erschienen in: Multimedia Systems | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recent studies show that the performance of deep convolutional neural network (CNN) applied to steganalysis is better than that of traditional methods. However, the existing network structure is still caused by artificial design, which may not be the optimal training network. This paper describes a deep residual network based on a neural architecture search (NAS) algorithm, to minimize the artificial design of network elements to achieve better detection results. In this algorithm, we add a long-span residual structure to the traditional layer of the residual structure, which can better capture the complex statistical information of digital images and actively enhance the signals from secret messages, which is suitable for distinguishing cover and stego images. Two of the most advanced steganographic algorithms, WOW (wavelet obtained weights) and SUNIWARD (spatial universal wavelet relative distortion), are used to evaluate the effectiveness of this model in the spatial domain. Compared with a recently proposed method based on CNN, our model achieves excellent performance on all tested algorithms for various payloads

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bas, P., Filler, T., Pevnỳ, T.: “break our steganographic system”: The ins and outs of organizing boss. In: International workshop on information hiding, pp. 59–70. Springer (2011) Bas, P., Filler, T., Pevnỳ, T.: “break our steganographic system”: The ins and outs of organizing boss. In: International workshop on information hiding, pp. 59–70. Springer (2011)
2.
Zurück zum Zitat Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 14(5), 1181–1193 (2018)CrossRef Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 14(5), 1181–1193 (2018)CrossRef
3.
Zurück zum Zitat Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 48–53. IEEE (2014) Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 48–53. IEEE (2014)
4.
Zurück zum Zitat Fan, L., Sun, W., Feng, G.: Image steganalysis via random subspace fisher linear discriminant vector functional link network and feature mapping. Mobile Networks & Applications (2019) Fan, L., Sun, W., Feng, G.: Image steganalysis via random subspace fisher linear discriminant vector functional link network and feature mapping. Mobile Networks & Applications (2019)
5.
Zurück zum Zitat Feng, G., Zhang, X., Ren, Y., Qian, Z., Li, S.: Diversity-based cascade filters for jpeg steganalysis. IEEE Transactions on Circuits and Systems for Video Technology 30(2), 376–386 (2020)CrossRef Feng, G., Zhang, X., Ren, Y., Qian, Z., Li, S.: Diversity-based cascade filters for jpeg steganalysis. IEEE Transactions on Circuits and Systems for Video Technology 30(2), 376–386 (2020)CrossRef
6.
Zurück zum Zitat Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of jpeg images: Breaking the f5 algorithm. In: International Workshop on Information Hiding, pp. 310–323. Springer (2002) Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of jpeg images: Breaking the f5 algorithm. In: International Workshop on Information Hiding, pp. 310–323. Springer (2002)
7.
Zurück zum Zitat Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3), 868–882 (2012)CrossRef Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3), 868–882 (2012)CrossRef
8.
Zurück zum Zitat Fridrich, J., Pevnỳ, T., Kodovskỳ, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on Multimedia & security, pp. 3–14 (2007) Fridrich, J., Pevnỳ, T., Kodovskỳ, J.: Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on Multimedia & security, pp. 3–14 (2007)
9.
Zurück zum Zitat Goodfellow, I., Bengio, Y., Courville, A.: Deep learning. MIT press (2016) Goodfellow, I., Bengio, Y., Courville, A.: Deep learning. MIT press (2016)
10.
Zurück zum Zitat Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient jpeg steganography. IEEE transactions on Information Forensics and Security 9(5), 814–825 (2014)CrossRef Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient jpeg steganography. IEEE transactions on Information Forensics and Security 9(5), 814–825 (2014)CrossRef
11.
Zurück zum Zitat Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.Q.: Using statistical image model for jpeg steganography: uniform embedding revisited. IEEE Transactions on Information Forensics and Security 10(12), 2669–2680 (2015)CrossRef Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.Q.: Using statistical image model for jpeg steganography: uniform embedding revisited. IEEE Transactions on Information Forensics and Security 10(12), 2669–2680 (2015)CrossRef
12.
Zurück zum Zitat He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778 (2016) He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778 (2016)
13.
Zurück zum Zitat He, K., Zhang, X., Ren, S., Sun, J.: Identity mappings in deep residual networks. In: European conference on computer vision, pp. 630–645. Springer (2016) He, K., Zhang, X., Ren, S., Sun, J.: Identity mappings in deep residual networks. In: European conference on computer vision, pp. 630–645. Springer (2016)
14.
Zurück zum Zitat Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS), pp. 234–239. IEEE (2012) Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS), pp. 234–239. IEEE (2012)
15.
Zurück zum Zitat Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Transactions on information forensics and security 8(12), 1996–2006 (2013)CrossRef Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Transactions on information forensics and security 8(12), 1996–2006 (2013)CrossRef
16.
Zurück zum Zitat Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014(1), 1 (2014)CrossRef Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014(1), 1 (2014)CrossRef
17.
Zurück zum Zitat Jin, Z., Feng, G., Ren, Y., Zhang, X.: Feature extraction optimization of jpeg steganalysis based on residual images. Signal Processing 170(5), 107455 (2020)CrossRef Jin, Z., Feng, G., Ren, Y., Zhang, X.: Feature extraction optimization of jpeg steganalysis based on residual images. Signal Processing 170(5), 107455 (2020)CrossRef
18.
Zurück zum Zitat Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p. 681905. International Society for Optics and Photonics (2008) Ker, A.D., Böhme, R.: Revisiting weighted stego-image steganalysis. In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p. 681905. International Society for Optics and Photonics (2008)
19.
Zurück zum Zitat Kodovskỳ, J., Fridrich, J.: Quantitative steganalysis of lsb embedding in jpeg domain. In: Proceedings of the 12th ACM workshop on Multimedia and security, pp. 187–198 (2010) Kodovskỳ, J., Fridrich, J.: Quantitative steganalysis of lsb embedding in jpeg domain. In: Proceedings of the 12th ACM workshop on Multimedia and security, pp. 187–198 (2010)
20.
Zurück zum Zitat Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2), 432–444 (2011)CrossRef Kodovsky, J., Fridrich, J., Holub, V.: Ensemble classifiers for steganalysis of digital media. IEEE Transactions on Information Forensics and Security 7(2), 432–444 (2011)CrossRef
21.
Zurück zum Zitat Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206–4210. IEEE (2014) Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 4206–4210. IEEE (2014)
23.
Zurück zum Zitat Ni, D., Feng, G., Shen, L., Zhang, X.: Selective ensemble classification of image steganalysis via deep q network. IEEE Signal Processing Letters 26(7), 1065–1069 (2019)CrossRef Ni, D., Feng, G., Shen, L., Zhang, X.: Selective ensemble classification of image steganalysis via deep q network. IEEE Signal Processing Letters 26(7), 1065–1069 (2019)CrossRef
24.
Zurück zum Zitat Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on information Forensics and Security 5(2), 215–224 (2010)CrossRef Pevny, T., Bas, P., Fridrich, J.: Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on information Forensics and Security 5(2), 215–224 (2010)CrossRef
25.
Zurück zum Zitat Pevnỳ, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on Information Hiding, pp. 161–177. Springer (2010) Pevnỳ, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: International Workshop on Information Hiding, pp. 161–177. Springer (2010)
26.
Zurück zum Zitat Provos, N.: Defending against statistical steganalysis. Usenix security symposium 10, 323–336 (2001) Provos, N.: Defending against statistical steganalysis. Usenix security symposium 10, 323–336 (2001)
27.
Zurück zum Zitat Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, vol. 9409, p. 94090J. International Society for Optics and Photonics (2015) Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, vol. 9409, p. 94090J. International Society for Optics and Photonics (2015)
28.
Zurück zum Zitat Real, E., Aggarwal, A., Huang, Y., Le, Q.V.: Regularized evolution for image classifier architecture search. Proceedings of the aaai conference on artificial intelligence 33, 4780–4789 (2019)CrossRef Real, E., Aggarwal, A., Huang, Y., Le, Q.V.: Regularized evolution for image classifier architecture search. Proceedings of the aaai conference on artificial intelligence 33, 4780–4789 (2019)CrossRef
29.
Zurück zum Zitat Sallee, P.: Model-based steganography. In: International workshop on digital watermarking, pp. 154–167. Springer (2003) Sallee, P.: Model-based steganography. In: International workshop on digital watermarking, pp. 154–167. Springer (2003)
30.
Zurück zum Zitat Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security 11(2), 221–234 (2015)CrossRef Sedighi, V., Cogranne, R., Fridrich, J.: Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security 11(2), 221–234 (2015)CrossRef
31.
Zurück zum Zitat Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pp. 1–4. IEEE (2014) Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pp. 1–4. IEEE (2014)
32.
Zurück zum Zitat Steganographic algorithm jsteg: Software available at https://zooid. org/~paul/crypto/jsteg (1993) Steganographic algorithm jsteg: Software available at https://​zooid.​ org/~paul/crypto/jsteg (1993)
33.
Zurück zum Zitat Westfeld, A.: F5-a steganographic algorithm. In: International workshop on information hiding, pp. 289–302. Springer, New York (2001) Westfeld, A.: F5-a steganographic algorithm. In: International workshop on information hiding, pp. 289–302. Springer, New York (2001)
34.
Zurück zum Zitat Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters 23(5), 708–712 (2016)CrossRef Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters 23(5), 708–712 (2016)CrossRef
35.
Zurück zum Zitat Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security 12(11), 2545–2557 (2017)CrossRef Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security 12(11), 2545–2557 (2017)CrossRef
36.
Zurück zum Zitat Zhong, K., Feng, G., Shen, L., Luo, J.: Deep learning for steganalysis based on filter diversity selection. Science China Information Sciences 61(12), 129105 (2018)CrossRef Zhong, K., Feng, G., Shen, L., Luo, J.: Deep learning for steganalysis based on filter diversity selection. Science China Information Sciences 61(12), 129105 (2018)CrossRef
37.
Zurück zum Zitat Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning transferable architectures for scalable image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 8697–8710 (2018) Zoph, B., Vasudevan, V., Shlens, J., Le, Q.V.: Learning transferable architectures for scalable image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 8697–8710 (2018)
Metadaten
Titel
Steganalysis of convolutional neural network based on neural architecture search
verfasst von
Hongbo Wang
Xingyu Pan
Lingyan Fan
Shuofeng Zhao
Publikationsdatum
26.03.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Multimedia Systems / Ausgabe 3/2021
Print ISSN: 0942-4962
Elektronische ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-021-00779-5

Weitere Artikel der Ausgabe 3/2021

Multimedia Systems 3/2021 Zur Ausgabe