Skip to main content
Erschienen in: Telecommunication Systems 2/2022

27.04.2022

Dataset mismatched steganalysis using subdomain adaptation with guiding feature

verfasst von: Lei Zhang, Sani M. Abdullahi, Peisong He, Hongxia Wang

Erschienen in: Telecommunication Systems | Ausgabe 2/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The generalization problem in deep learning has always been an important problem to be solved. In the field of steganalysis, generalization is also an important factor that makes steganalysis models difficult to deploy in real-world scenarios. For a group of suspicious images that never appeared in the training set, the pre-trained deep learning-based steganalysis models tend to suffer from distinct performance degradation. To address this limitation, in this paper, a feature-guided subdomain adaptation steganalysis framework is proposed to improve the performance of the pre-trained models when detecting new data. Initially, the source domain and target domain will be divided into subdomains according to class, and the distributions of the relevant subdomains are aligned by subdomain adaptation. Afterward, the guiding feature is generated to make the division of subdomains more stable and precise. When it is used to detect three spatial steganographic algorithms with a wide variety of datasets and payloads, the experimental results show that the proposed steganalysis framework can significantly improve the average accuracy of SRNet model by 5.4% at 0.4bpp, 8.5% at 0.2bpp, and 8.0% at 0.1bpp in the case of dataset mismatch.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Pevný, T., Filler, T., & Bas, P. (2010). Using high-dimensional image models to perform highly undetectable steganography. In International workshop on information hiding (pp. 161–177). Pevný, T., Filler, T., & Bas, P. (2010). Using high-dimensional image models to perform highly undetectable steganography. In International workshop on information hiding (pp. 161–177).
10.
Zurück zum Zitat Holub, V., Fridrich, J., & Denemark, T. (2013). Random projections of residuals as an alternative to co-occurrences in steganalysis. In Media watermarking, security, and forensics 2013 (Vol. 8665, p. 86650L). International Society for Optics and Photonics. Holub, V., Fridrich, J., & Denemark, T. (2013). Random projections of residuals as an alternative to co-occurrences in steganalysis. In Media watermarking, security, and forensics 2013 (Vol. 8665, p. 86650L). International Society for Optics and Photonics.
12.
Zurück zum Zitat Wang, Y., Liu, J., & Zhang, W. (2009). Blind JPEG steganalysis based on correlations of DCT coefficients in multi-directions and calibrations. In 2009 international conference on multimedia information networking and security (Vol. 1, pp. 495–499). https://doi.org/10.1109/MINES.2009.135. Wang, Y., Liu, J., & Zhang, W. (2009). Blind JPEG steganalysis based on correlations of DCT coefficients in multi-directions and calibrations. In 2009 international conference on multimedia information networking and security (Vol. 1, pp. 495–499). https://​doi.​org/​10.​1109/​MINES.​2009.​135.
14.
Zurück zum Zitat Kodovský, J., Sedighi, V., & Fridrich, J. (2014). Study of cover source mismatch in steganalysis and ways to mitigate its impact. In Media watermarking, security, and forensics 2014 (Vol. 9028, p. 90280J). International Society for Optics and Photonics. https://doi.org/10.1117/12.2039693. Kodovský, J., Sedighi, V., & Fridrich, J. (2014). Study of cover source mismatch in steganalysis and ways to mitigate its impact. In Media watermarking, security, and forensics 2014 (Vol. 9028, p. 90280J). International Society for Optics and Photonics. https://​doi.​org/​10.​1117/​12.​2039693.
25.
Zurück zum Zitat Yedroudj, M., Chaumont, M., Comby, F., Oulad Amara, A., & Bas, P. (2020). Pixels-off: Data-augmentation complementary solution for deep-learning steganalysis. In Proceedings of the 2020 ACM workshop on information hiding and multimedia security (pp. 39–48). https://doi.org/10.1145/3369412.3395061. Yedroudj, M., Chaumont, M., Comby, F., Oulad Amara, A., & Bas, P. (2020). Pixels-off: Data-augmentation complementary solution for deep-learning steganalysis. In Proceedings of the 2020 ACM workshop on information hiding and multimedia security (pp. 39–48). https://​doi.​org/​10.​1145/​3369412.​3395061.
27.
Zurück zum Zitat Pevny, T., & Fridrich, J. (2007). Merging Markov and DCT features for multi-class JPEG steganalysis. In Security, steganography, and watermarking of multimedia contents IX (Vol. 6505, p. 650503). International Society for Optics and Photonics. https://doi.org/10.1117/12.696774. Pevny, T., & Fridrich, J. (2007). Merging Markov and DCT features for multi-class JPEG steganalysis. In Security, steganography, and watermarking of multimedia contents IX (Vol. 6505, p. 650503). International Society for Optics and Photonics. https://​doi.​org/​10.​1117/​12.​696774.
31.
Zurück zum Zitat Lin, Y., Wang, R., Dong, L., Yan, D., & Wang, J. (2021). Tackling the cover source mismatch problem in audio steganalysis with unsupervised domain adaptation. IEEE Signal Processing Letters, 28, 1475–1479.CrossRef Lin, Y., Wang, R., Dong, L., Yan, D., & Wang, J. (2021). Tackling the cover source mismatch problem in audio steganalysis with unsupervised domain adaptation. IEEE Signal Processing Letters, 28, 1475–1479.CrossRef
34.
Zurück zum Zitat Tzeng, E., Hoffman, J., Zhang, N., Saenko, K., & Darrell, T. (2014). Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:1412.3474. Tzeng, E., Hoffman, J., Zhang, N., Saenko, K., & Darrell, T. (2014). Deep domain confusion: Maximizing for domain invariance. arXiv preprint arXiv:​1412.​3474.
35.
Zurück zum Zitat Long, M., Cao, Y., Wang, J., & Jordan, M. (2015). Learning transferable features with deep adaptation networks. In International conference on machine learning (pp. 97–105). Long, M., Cao, Y., Wang, J., & Jordan, M. (2015). Learning transferable features with deep adaptation networks. In International conference on machine learning (pp. 97–105).
36.
Zurück zum Zitat Long, M., Zhu, H., Wang, J., & Jordan, M. I. (2017). Deep transfer learning with joint adaptation networks. In International conference on machine learning (pp. 2208–2217). Long, M., Zhu, H., Wang, J., & Jordan, M. I. (2017). Deep transfer learning with joint adaptation networks. In International conference on machine learning (pp. 2208–2217).
37.
38.
Zurück zum Zitat Pei, Z., Cao, Z., Long, M., & Wang, J. (2018). Multi-adversarial domain adaptation. In Thirty-second AAAI conference on artificial intelligence. (pp. 3934–3941). Pei, Z., Cao, Z., Long, M., & Wang, J. (2018). Multi-adversarial domain adaptation. In Thirty-second AAAI conference on artificial intelligence. (pp. 3934–3941).
41.
Zurück zum Zitat Denemark, T., Sedighi, V., Holub, V., Cogranne, R., & Fridrich, J. (2014). Selection-channel-aware rich model for steganalysis of digital images. In 2014 IEEE International workshop on information forensics and security (WIFS) (pp. 48–53). https://doi.org/10.1109/WIFS.2014.7084302. Denemark, T., Sedighi, V., Holub, V., Cogranne, R., & Fridrich, J. (2014). Selection-channel-aware rich model for steganalysis of digital images. In 2014 IEEE International workshop on information forensics and security (WIFS) (pp. 48–53). https://​doi.​org/​10.​1109/​WIFS.​2014.​7084302.
42.
Zurück zum Zitat Pasquet, J., Bringay, S., & Chaumont, M. (2014). Steganalysis with cover-source mismatch and a small learning database. In 2014 22nd European signal processing conference (EUSIPCO) (pp. 2425–2429). Pasquet, J., Bringay, S., & Chaumont, M. (2014). Steganalysis with cover-source mismatch and a small learning database. In 2014 22nd European signal processing conference (EUSIPCO) (pp. 2425–2429).
44.
Zurück zum Zitat Schaefer, G., & Stich, M. (2004). UCID: An uncompressed color image database. In Storage and retrieval methods and applications for multimedia 2004 (Vol. 5307, pp. 472–480). Schaefer, G., & Stich, M. (2004). UCID: An uncompressed color image database. In Storage and retrieval methods and applications for multimedia 2004 (Vol. 5307, pp. 472–480).
45.
Zurück zum Zitat Agustsson, E., & Timofte, R. (2017). Ntire 2017 challenge on single image super-resolution: Dataset and study. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops (pp. 126–135). Agustsson, E., & Timofte, R. (2017). Ntire 2017 challenge on single image super-resolution: Dataset and study. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops (pp. 126–135).
Metadaten
Titel
Dataset mismatched steganalysis using subdomain adaptation with guiding feature
verfasst von
Lei Zhang
Sani M. Abdullahi
Peisong He
Hongxia Wang
Publikationsdatum
27.04.2022
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 2/2022
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-022-00901-6

Weitere Artikel der Ausgabe 2/2022

Telecommunication Systems 2/2022 Zur Ausgabe