Skip to main content
Log in

Anti-steganalysis for image on convolutional neural networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, convolutional neural network (CNN) based steganalysis methods achieved great performance. While those methods are also facing security problems. In this paper, we proposed an attack scheme aiming at CNN based steganalyzer including two different attack methods 1) the LSB-Jstego Gradient Based Attack; 2) LSB-Jstego Evolutionary Algorithms Based Attack. The experiment results show that the attack strategies could achieve 96.02% and 90.25% success ratio separately on the target CNN. The proposed attack scheme is an effective way to fool the CNN based steganalyzer and in addition demonstrates the vulnerability of the neural networks in steganalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Bas P, Filler T, Pevnỳ T (2011) Break our steganographic system: the ins and outs of organizing boss. In: International workshop on information hiding, Springer, pp 59–70

  2. Das S, Suganthan PN (2011) Differential evolution: a survey of the state-of-the-art. IEEE Trans Evol Comput 15(1):4–31

    Article  Google Scholar 

  3. Floreano D, Mattiussi C (2008) Bio-inspired artificial intelligence: theories, methods, and technologies. MIT Press, Cambridge

    Google Scholar 

  4. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882

    Article  Google Scholar 

  5. Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:14126572

  6. Krizhevsky A, Hinton G (2009) Learning multiple layers of features from tiny images. Tech. rep., Citeseer

  7. Kurak C, McHugh J (1992) A cautionary note on image downgrading. In: Proceedings 8th annual computer security applications conference, 1992. IEEE, pp 153–159

  8. Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world. arXiv:160702533

  9. LeCun Y (1998) The mnist database of handwritten digits. http://yannlecuncom/exdb/mnist/

  10. Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557–13583

    Article  Google Scholar 

  11. Ma Y, Luo X, Li X, Bao Z, Zhang Y (2018) Selection of rich model steganalysis features based on decision rough set α-positive region reduction. IEEE Trans Circuits Syst Video Technol https://doi.org/10.1109/TCSVT.2018.2799243

  12. Moosavi-Dezfooli SM, Fawzi A, Frossard P (2016) Deepfool: a simple and accurate method to fool deep neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2574–2582

  13. Moosavi-Dezfooli SM, Fawzi A, Fawzi O, Frossard P (2017) Universal adversarial perturbations. arXiv preprint

  14. Nguyen A, Yosinski J, Clune J (2015) Deep neural networks are easily fooled: high confidence predictions for unrecognizable images. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 427–436

  15. Pevny T (2011) Detecting messages of unknown length. In: Media watermarking, security, and forensics III, international society for optics and photonics, vol 7880, p 78800T

  16. Pibre L, Pasquet J, Ienco D, Chaumont M (2016) Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron Imaging 2016(8):1–11

    Article  Google Scholar 

  17. Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Media watermarking, security, and forensics 2015, international society for optics and photonics, vol 9409, p 94090J

  18. Storn R, Price K (1997) Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces. J Glob Optim 11(4):341–359

    Article  MathSciNet  Google Scholar 

  19. Su J, Vargas DV, Kouichi S (2017) One pixel attack for fooling deep neural networks. arXiv:171008864

  20. Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. arXiv:13126199

  21. Upham D (1997) Jsteg. Software available at ftp funet fi

  22. Wang J, Li T, Shi YQ, Lian S, Ye J (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):23721–23737

    Article  Google Scholar 

  23. Winkler S, Mohandas P (2008) The evolution of video quality measurement: from psnr to hybrid metrics. IEEE Trans Broadcast 54(3):660–668

    Article  Google Scholar 

  24. Wu S, Zhong SH, Liu Y (2017) A novel convolutional neural network for image steganalysis with shared normalization. arXiv:171107306

  25. Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712

    Article  Google Scholar 

  26. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12(11):2545–2557

    Article  Google Scholar 

  27. Zhang Y, Qin C, Zhang W, Liu f, Luo X (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99–111

    Article  Google Scholar 

Download references

Acknowledgements

An earlier version of this paper was presented at the 4th International Conference on Cloud Computing and Security, 8-10, June 2018, Haikou, China. This work was partially supported by the National Key Research Development Program of China (2016QY01W0200), the National Natural Science Foundation of China NSFC (U1636101,U1636219, U1736211).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dengpan Ye.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, S., Ye, D., Jiang, S. et al. Anti-steganalysis for image on convolutional neural networks. Multimed Tools Appl 79, 4315–4331 (2020). https://doi.org/10.1007/s11042-018-7046-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-7046-6

Keywords

Navigation