Skip to main content
Log in

Deep neural networks for efficient steganographic payload location

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

The prevailing method for steganographic payload location aimed at LSB matching is the MAP method, which requires a few hundreds of stego images with load-carrying pixels at same locations and relatively high embedding rates. However, in practice, especially communication security, it is unwise for steganographers to generate stego images with high payloads or heavily utilize a same embedding key. Thus, the requirement of MAP is actually to some degree out of reach which leads to a performance degradation when faced with insufficient stego images with low embedding rates. To this end, we propose a tailored deep neural network (DNN) equipped with the improved feature named the “mean square of adjacency pixel difference”, which remarkably outperforms the previous state-of-the-art methods not only in terms of accuracy but also efficiency. Our approach can considerably reduce computational costs because no cover estimate, as represented by the key in MAP, is involved. This merit stems from the methodology we adopted that takes payload location as a binary classification problem for each pixel. Additionally, our DNN is consistently superior than MAP irrespective of embedding rates. The significance of our main design points in DNN and the improved features are verified, by experiment results. Besides, the time required in our method to handle 256 × 256 pixel images is 82.54 ms on the average, which is nearly 14 times faster than that of MAP. On the basis of relevant knowledge, the incorporation of feature extraction into DNN architecture is likely to enable future researchers to specify real-time payload locations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Provos, N., Honeyman, P.: Hide and seek: An introduction to steganography. IEEE Secur. Priv. 1, 32–44 (2003)

    Article  Google Scholar 

  2. Wang, H., Wang, S.: Cyber warfare: steganography vs. steganalysis. Commun. ACM 47, 76–82 (2004)

    Article  Google Scholar 

  3. Quach, T.T.: Optimal cover estimation methods and steganographic payload location. IEEE Trans. Inf. Forensics Secur. 6, 1214–1222 (2011)

    Article  Google Scholar 

  4. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: Proc. IEEE Int. Workshop Inf. Forensics Secur. (WIFS), pp. 234–239 (2012)

  5. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1–13 (2014)

    Article  Google Scholar 

  6. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proc. Int. Workshop Inf. Hiding, pp. 161–177 (2010)

  7. Qin, C., Chang, C., Chiu, Y.: A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting. IEEE Trans. Image Process. 23(3), 969–978 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  8. Chuan Qin, W.Z., Cao, F., Zhang, X., Chin-Chen, C.: Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection. Signal Process. 153, 109–122 (2018)

    Article  Google Scholar 

  9. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey, In: Proceedings of the IEEE, vol. 87, pp. 1062–1078 (1999)

  10. Sharp, T.: (2001) An Implementation of Key-Based Digital Signal Steganography, International Workshop on Information Hiding, pp. 13–26 (2001)

  11. Ker, A.D.: Locating steganographic payload via WS residuals. In: Proc. 10th Multimedia and Security Workshop, pp. 27–31. ACM (2008)

  12. Ker, A.D., Lubenko, I.: Feature reduction and payload location with WAM steganalysis Proceedings of SPIE—The International Society for Optical Engineering, p. 7254 (2009)

  13. Yan, X., Tao, Z., Ling, X., Ping, X.: New method for payload location aimed at LSB matching. J. Data Acquis. Process. 31(1), 145–151 (2016) (in Chinese)

    Google Scholar 

  14. Pibre, L., Pasquet, J., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron. Imaging 4, 1–11 (2016)

    Article  Google Scholar 

  15. Qian, Y., Dong, J., Wang, W., Tan, T.: (2015) Deep learning for steganalysis via convolutional neural networks, Proc. SPIE, vol. 9409, p. 94090J (2015)

  16. Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23, 708–712 (2016)

    Article  Google Scholar 

  17. Chen, M., Fridrich, J., Boroumand, M.: (2018) Deep learning regressors for quantitative steganalysis. Electronic imaging, media watermarking, security, and forensics, pp. 160-1-160-7(7) (2018)

  18. Xie, S., Girshick, R., Dollar, P., et al. Aggregated residual transformations for deep neural networks. In: IEEE Conference on Computer Vision & Pattern Recognition. IEEE Computer Society (2017)

  19. Huang, G., Liu, Z., Laurens, V.D.M., Weinberger, K.Q.: Densely connected convolutional networks, pp. 2261–2269 (2016)

  20. Zhao, B., Feng, J., Wu, X., Yan, S.: A survey on deep learning-based fine-grained object classification and semantic segmentation International. J. Autom. Comput. 14, 119–135 (2017)

    Article  Google Scholar 

  21. He, K., Zhang, X., Ren, S., Sun, J.: Deep Residual learning for image recognition, pp 770–778 (2015)

  22. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems (2012)

  23. Khan, S.H., Hayat, M., Bennamoun, M., Sohel, F.A., Togneri, R.: Cost-sensitive learning of deep feature representations from imbalanced data. IEEE Trans. Neural Netw. Learn. Syst. 29, 3573–3587 (2015)

    Google Scholar 

  24. He, H., Garcia, E.A.: Learning from imbalanced data. IEEE Trans. Knowl. Data Eng. 21, 1263–1284 (2009)

    Article  Google Scholar 

  25. Bas, P., Filler, T., Pevný, T.: Break our steganographic system: The Ins and outs of organizing BOSS. In Proc. Int. Workshop Inf. Hiding. Springer, Berlin, Heidelberg, pp. 59–70 (2011)

  26. Bas, P., Furon, T.: Bows-2. http://bows2.gipsa-lab.inpg.fr (2007)

  27. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T.: Caffe: Convolutional architecture for fast feature embedding, 675–678 (2014)

  28. Zeiler, M.D.: (2012) ADADELTA: An adaptive learning rate method computer science

  29. Simonyan, K., Zisserman, A.: (2014) Very deep convolutional networks for large-scale image recognition computer science

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu Sun.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, Y., Zhang, H., Zhang, T. et al. Deep neural networks for efficient steganographic payload location. J Real-Time Image Proc 16, 635–647 (2019). https://doi.org/10.1007/s11554-019-00849-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-019-00849-y

Keywords

Navigation