Skip to main content

Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis

  • Conference paper
  • First Online:
  • 1311 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11378))

Abstract

An effective feature selection method to capture the weak stego noise is essential to image steganalysis. In the conventional JPEG steganalysis, Gabor filter and DCT filter are both used for residual extraction. However, there are few comparisons in existing convolutional neural networks (CNNs) based JPEG steganalysis using Gabor filter or DCT filter in the pre-processing stage to extract residuals. In this paper, we compare the performance of DCT filter with Gabor filter in the pre-processing phase of the steganalysis CNN. Firstly, we choose the parameters empirically and theoretically for Gabor filters which are used in CNN. Secondly, we improve the performance by removing the ABS layer in the original XuNet. Finally, the experimental results show that using Gabor filters or DCT filter can achieve comparable performance whenever the parameters of pre-processing filters are fixed or learnable. It’s different from the conventional steganalysis method where Gabor filters have advantages over DCT filters. When the parameters of the pre-processing filters are learnable, both Gabor filter and DCT filter can achieve better performance compared with the condition where the parameters are fixed.

This work was supported by NSFC (Grant Nos. U1536204, NSFC 61772571) and the special funding for basic scientific research of Sun Yat-sen University (Grant No. 6177060230).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bas, P., Filler, T., Pevný, T.: “break our steganographic system”: the ins and outs of organizing BOSS. In: Proceedings of Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, 18–20 May 2011, Revised Selected Papers, pp. 59–70 (2011)

    Chapter  Google Scholar 

  2. Chen, M., Sedighi, V., Boroumand, M., Fridrich, J.J.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 75–84 (2017)

    Google Scholar 

  3. Chen, Y., Lyu, Z., Kang, X., Wang, Z.J.: A rotation-invariant convolutional neural network for image enhancement forensics. In: Proceedings of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, pp. 2111–2115 (2018)

    Google Scholar 

  4. Daugman, J.G.: Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. J. Opt. Soc. Am. Opt. Image Sci. 2(7), 1160 (1985)

    Article  Google Scholar 

  5. Denemark, T., Boroumand, M., Fridrich, J.J.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736–1746 (2016)

    Article  Google Scholar 

  6. Fridrich, J.J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)

    Article  Google Scholar 

  7. Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the 13th International Conference on Artificial Intelligence and Statistics, AISTATS 2010, Chia Laguna Resort, Sardinia, Italy, 13–15 May 2010, pp. 249–256 (2010)

    Google Scholar 

  8. Guo, L., Ni, J., Shi, Y.: An efficient JPEG steganographic scheme using uniform embedding. In: Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Tenerife, Spain, 2–5 December 2012, pp. 169–174 (2012)

    Google Scholar 

  9. Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.: Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669–2680 (2015)

    Article  Google Scholar 

  10. Holub, V., Fridrich, J.J.: Digital image steganography using universal distortion. In: Proceedings of ACM Information Hiding and Multimedia Security Workshop, IH&MMSec 2013, Montpellier, France, 17–19 June 2013, pp. 59–68 (2013)

    Google Scholar 

  11. Holub, V., Fridrich, J.J.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)

    Article  Google Scholar 

  12. Holub, V., Fridrich, J.J.: Phase-aware projection model for steganalysis of JPEG images. In: Proceedings of Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, 9–11 February 2015, Proceedings, p. 94090T (2015)

    Google Scholar 

  13. Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, Lille, France, 6–11 July 2015, pp. 448–456 (2015)

    Google Scholar 

  14. Jia, Y., et al.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the ACM International Conference on Multimedia, MM 2014, Orlando, FL, USA, 03–07 November 2014, pp. 675–678 (2014)

    Google Scholar 

  15. Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), 21–24 June 2010, Haifa, Israel, pp. 807–814 (2010)

    Google Scholar 

  16. Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Proceedings of Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, 9–11 February 2015, Proceedings, p. 94090J (2015)

    Google Scholar 

  17. Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)

    Article  MathSciNet  Google Scholar 

  18. Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, 17–19 June 2015, pp. 15–23 (2015)

    Google Scholar 

  19. Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 67–73 (2017)

    Google Scholar 

  20. Xu, G., Wu, H., Shi, Y.Q.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, 20–22 June 2016, pp. 103–107 (2016)

    Google Scholar 

  21. Xu, G., Wu, H., Shi, Y.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)

    Article  Google Scholar 

  22. Yang, J., Shi, Y., Wong, E.K., Kang, X.: JPEG steganalysis based on DenseNet. Computing Research Repository abs/1711.09335 (2017)

    Google Scholar 

  23. Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)

    Article  Google Scholar 

  24. Zeng, J., Tan, S., Li, B., Huang, J.: Large-scale JPEG steganalysis using hybrid deep-learning framework. Computing Research Repository abs/1611.03233 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangui Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, H., Li, X., Ruan, D., Kang, X., Shi, YQ. (2019). Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis. In: Yoo, C., Shi, YQ., Kim, H., Piva, A., Kim, G. (eds) Digital Forensics and Watermarking. IWDW 2018. Lecture Notes in Computer Science(), vol 11378. Springer, Cham. https://doi.org/10.1007/978-3-030-11389-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-11389-6_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-11388-9

  • Online ISBN: 978-3-030-11389-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics