Skip to main content
Log in

CNN-based image steganalysis using additional data embedding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image steganalysis identifies whether a secret message is hidden in an image. Conventional steganalytic methods require processes to extract discriminative statistical features from images and classify them. Convolutional neural networks (CNN) are particularly effective at conducting those processes. However, since the hidden message was too weak to be detected, existing CNN-based steganalytic methods needed to adopt preprocessing filters to increase the strength of the hidden message. Then, development focused on improved network structures and preprocessing filters. In this paper, we propose a different approach to CNN-based image steganalysis. We embed additional data in an input image and use two images (i.e., the original input image and its stego image with additional embedded data) as input. This is based on an assumption that pixel variations due to the additional embedded data would be sufficient to identify images with and without a secret message. We also propose two variants of conventional CNNs for image steganalysis, named dual channel CNN and dual network CNN, to input two images. We conducted various experiments using the proposed CNNs. The experimental results prove that the assumption holds, and the additional input could provide useful information to improve the performance of conventional CNN-based steganalytic methods. Depending on the strength of the hidden message, the proposed approach could improve the identification rate by up to 6% for S-UNIWARD, an adaptive steganographic method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. Xu and Wu’s CNN [32] is the most basic, and most conventional CNNs are modifications of this network. Therefore, in this experiment, it was used as the base CNN.

References

  1. Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl:2223–2245

    Article  Google Scholar 

  2. Bas P, Filler T, Pevny T (2011) Break our steganographic system – the ins and outs of organizing BOSS. International Workshop on Information Hiding 6958:59–70

    Article  Google Scholar 

  3. Bhattacharya T, Dey N, Chaudhuri SRB (2012) A session based multiple image hiding technique using DWT and DCT. Int J Comput Appl 38(5):398–409

    Google Scholar 

  4. Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 14(5):1181–1193

    Article  Google Scholar 

  5. Cancelli G, Doerr G, Cox IJ, Barni M (2008) Detection of ±1 LSB steganography based on the amplitude of histogram local extrema. ICIP:1288–1291

  6. Chan C-K, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  Google Scholar 

  7. Chang K, Chang C, Huang PS, Tu T (2008) A novel image steganographic method using tri-way pixel-value differencing. J Multimed 3(2):37–44

    Google Scholar 

  8. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analyses of current methods. Signal Process 90(3):727–752

    Article  Google Scholar 

  9. Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20:273–297

    MATH  Google Scholar 

  10. Dabeer O, Sullivan K, Madhow U, Chandrasekaran S, Manjunath BS (2004) Detection of hiding in the least significant bit. IEEE Trans Signal Process 52(10):3046–3058

    Article  MathSciNet  Google Scholar 

  11. Dorgham O, Al-Rahamneh B, Almomani A, Al-Hadidi M, Khatatneh KF (2018) Enhancing the security of exchanging and storing DICOM medical images on the cloud. International Journal of Cloud Applications and Computing 8(1):154–172

    Article  Google Scholar 

  12. Fridrich J, Du R, Long M (2000) Steganalysis of LSB encoding in color images. ICME:1279–1282

  13. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7(3):868–882

    Article  Google Scholar 

  14. Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganography (HUGO). International Workshop on Information Hiding:71–84

  15. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. CVPR

  16. Ho TK (1995) Random decision forests. Proceedings of 3rd International Conference on Document Analysis and Recognition, Montreal, vol. 1, pp. 275–282

  17. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. International Workshop on Information Forensics and Security

  18. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for stegangography in an arbitrary domain. EURASIP Journal of Information Security

  19. Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. Journal of Information Security and Applications 40:217–235

    Article  Google Scholar 

  20. Ker AD (2005) A general framework for structural analysis of LSB replacement. International Workshop on Information Hiding 3727:296–311

    Article  Google Scholar 

  21. Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. NIPS:1097–1105

  22. Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. International Journal of Cloud Applications and Computing 9(3):22–36

    Article  Google Scholar 

  23. Li B, Wei W, Ferreira A, Tan S (2018) ReST-Net: diverse activation modules and parallel subnets-based CNN for spatial image steganalysis. IEEE Signal Processing Letters 25(5):650–654

    Article  Google Scholar 

  24. Neeta D, Snehal K, Jacobs D (2007) Implementation of LSB steganography and its evaluation for various bits. International Conference on Digital Information Management:173–178

  25. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security 5(2):215–224

    Article  Google Scholar 

  26. Qian N (1999) On the momentum term in gradient descent learning algorithms. Neural Netw 12:145–151

    Article  Google Scholar 

  27. Steganographic algorithms. http://dde.binghamton.edu/download/stego_algorithms/. Accessed on 19 Jan 2019

  28. Tang W, Li B, Tan S, Barni M, Juang J (2019) CNN-based adversarial embedding for image steganography. IEEE Transactions on Information Forensics and Security 14(8):2074–2087

    Article  Google Scholar 

  29. TensorFlow. https://www.tensorflow.org/. Accessed on 19 Jan 2019

  30. Wu D, Tsai W (2003) A steganographic method for images by pixel-value differencing. Pattern Recognition Letters 24:1613–1326

    Article  Google Scholar 

  31. Wu S, Zhong S, Liu Y (2018) Deep residual learning for image steganalysis. Multimed Tools Appl 77(9):10437–10453

    Article  Google Scholar 

  32. Xu G, Wu H (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters 23(5):708–712

    Article  Google Scholar 

  33. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security 12(11):2545–2557

    Article  Google Scholar 

  34. Yedroudj M, Comby F, Chaumont M (2018) Yedroudj-Net: an efficient CNN for spatial steganalysis. ICASSP:15–20

  35. Yu X, Tan H, Liang H, Li CT, Liao G (2018) A multi-task learning CNN for image steganalysis. 10th IEEE International Workshop on Information Forensics and Security

  36. Yuan Y, Lu W, Feng B, Weng J (2017) Steganalysis with CNN using multi-channels filtered residuals. ICCCS:110–120

  37. Zeiler MD (2012) ADADELTA: An adaptive learning rate method. arXiv:1212.5701

  38. Zhang T, Zhang H, Wang R, Wu Y (2019) A new JPEG image steganalysis technique combining rich model features and convolutional neural networks. Mathematical Biosciences and Engineering 16(5):4069–4081

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the research fund of Signal Intelligence Research Center supervised by Defense Acquisition Program Administration and Agency for Defense Development of Korea.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanhoon Park.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, J., Park, H. & Park, JI. CNN-based image steganalysis using additional data embedding. Multimed Tools Appl 79, 1355–1372 (2020). https://doi.org/10.1007/s11042-019-08251-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08251-3

Keywords

Navigation