Abstract
With the rapid proliferation of urbanization, massive data in social networks are collected and aggregated in real time, making it possible for criminals to use images as a cover to spread secret information on the Internet. How to determine whether these images contain secret information is a huge challenge for multimedia computing security. The steganalysis method based on deep learning can effectively judge whether the pictures transmitted on the Internet in urban scenes contain secret information, which is of great significance to safeguarding national and social security. Image steganalysis based on deep learning has powerful learning ability and classification ability, and its detection accuracy of steganography images has surpassed that of traditional steganalysis based on manual feature extraction. In recent years, it has become a hot topic of the information hiding technology. However, the detection accuracy of existing deep learning based steganalysis methods still needs to be improved, especially when detecting arbitrary-size and multi-source images, their detection efficientness is easily affected by cover mismatch. In this manuscript, we propose a steganalysis method based on Inverse Residuals structured Siamese network (abbreviated as SiaIRNet method,
- [1] . 2017. Structured pruning of deep convolutional neural networks. ACM Journal on Emerging Technologies in Computing Systems (JETC) 13, 3 (2017), 1–18.Google ScholarDigital Library
- [2] . 2011. Break our steganographic system: The ins and outs of organizing BOSS. In International Workshop on Information Hiding. Springer, 59–70.Google Scholar
- [3] . 2022. BOWS-2. Retrieved February 17, 2022 from http://bows2.ec-lille.fr/.Google Scholar
- [4] . 2018. Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 14, 5 (2018), 1181–1193.Google ScholarDigital Library
- [5] . 2021. Steganalysis based on deep learning:A review. J. Softw. 32, 2 (2021), 551–745.Google Scholar
- [6] . 2021. Introduction to the special issue on explainable AI on multimedia computing. ACM Trans. Multimedia Comput. Commun. Appl. 17, 3s (2021).Google ScholarDigital Library
- [7] . 2017. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1251–1258.Google ScholarCross Ref
- [8] . 2019. The ALASKA steganalysis challenge: A first step towards steganalysis. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 125–137.Google ScholarDigital Library
- [9] . 2022. Documentation of AlaskaV2 Dataset Scripts: A Hint Moving Towards Steganography and Steganalysis into the Wild. Retrieved February 17, 2022 from https://alaska.utt.fr.Google Scholar
- [10] . 2011. A cover image model for reliable steganalysis. In International Workshop on Information Hiding. Springer, 178–192.Google Scholar
- [11] . 2002. Detection of LSB steganography via sample pair analysis. In International Workshop on Information Hiding. Springer, 355–372.Google Scholar
- [12] . 2009. The square root law of steganographic capacity for Markov covers. Proceedings of SPIE the International Society for Optical Engineering 7254, 107–116.Google Scholar
- [13] . 2001. Reliable detection of LSB steganography in color and grayscale images. In Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges. 27–30.Google ScholarDigital Library
- [14] . 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 7, 3 (2012), 868–882.Google ScholarDigital Library
- [15] . 2021. Trustworthy AI’21: 1st International Workshop on Trustworthy AI for Multimedia Computing. Association for Computing Machinery, New York, NY, USA, 5708C5709.Google Scholar
- [16] . 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770–778.Google ScholarCross Ref
- [17] . 2012. Designing steganographic distortion using directional filters. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 234–239.Google ScholarCross Ref
- [18] . 2013. Digital image steganography using universal distortion. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. 59–68.Google ScholarDigital Library
- [19] . 2013. Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Security 8, 12 (2013), 1996–2006.Google ScholarDigital Library
- [20] . 2007. A capacity result for batch steganography. IEEE Signal Process. Lett. 14, 8 (2007), 525–528.Google ScholarCross Ref
- [21] . 2008. The square root law of steganographic capacity. In Proceedings of the 10th ACM Workshop on Multimedia and Security. 107–116.Google ScholarDigital Library
- [22] . 2011. Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Security 7, 2 (2011), 432–444.Google ScholarDigital Library
- [23] . 2014. A new cost function for spatial image steganography. In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 4206–4210.Google ScholarCross Ref
- [24] . 2016. Pruning filters for efficient ConvNets. arXiv preprint arXiv:1608.08710 (2016).Google Scholar
- [25] . 2017. Information hiding: Challenges for forensic experts. Commun. ACM 61, 1 (2017), 86C94.Google ScholarDigital Library
- [26] . 2015. Towards dependable steganalysis. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. 94090I.Google Scholar
- [27] . 2016. Learning and transferring representations for image steganalysis using convolutional neural network. In 2016 IEEE International Conference on Image Processing (ICIP). IEEE, 2752–2756.Google ScholarCross Ref
- [28] . 2018. MobileNetV2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 4510–4520.Google ScholarCross Ref
- [29] . 2015. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1–9.Google ScholarCross Ref
- [30] . 2019. EfficientNet: Rethinking model scaling for convolutional neural networks. In International Conference on Machine Learning. PMLR, 6105–6114.Google Scholar
- [31] . 2020. EfficientDet: Scalable and efficient object detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 10781–10790.Google ScholarCross Ref
- [32] . 2020. CALPA-NET: Channel-pruning-assisted deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 16 (2020), 131–146.Google ScholarCross Ref
- [33] . 2015. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans. Inf. Forensics Security 11, 4 (2015), 734–745.Google ScholarDigital Library
- [34] . 2021. An image privacy protection algorithm based on adversarial perturbation generative networks. ACM Trans. Multimedia Comput. Commun. Appl. 17, 2 (2021).Google ScholarDigital Library
- [35] . 2018. Steganalyzing images of arbitrary size with CNNs. Electron. Imag. 2018, 7 (2018), 121–1.Google Scholar
- [36] . 2016. Ensemble of CNNs for steganalysis: An empirical study. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. 103–107.Google ScholarDigital Library
- [37] . 2016. Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23, 5 (2016), 708–712.Google ScholarCross Ref
- [38] . 2017. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Security 12, 11 (2017), 2545–2557.Google ScholarDigital Library
- [39] . 2018. Yedroudj-Net: An efficient CNN for spatial steganalysis. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2092–2096.Google ScholarDigital Library
- [40] . 2020. A Siamese CNN for image steganalysis. IEEE Trans. Inf. Forensics Security 16 (2020), 291–306.Google ScholarCross Ref
- [41] . 2021. Improving EfficientNet for JPEG steganalysis. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security. 149–157.Google ScholarDigital Library
- [42] . 2019. Breaking ALASKA: Color separation for steganalysis in JPEG domain. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 138–149.Google ScholarDigital Library
- [43] . 2019. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans. Inf. Forensics Security 15 (2019), 1138–1150.Google ScholarCross Ref
- [44] . 2021. Image robust adaptive steganography adapted to lossy channels in open social networks. Inf. Sci. 564 (2021), 306–326.Google ScholarCross Ref
Index Terms
- A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning
Recommendations
Block dependency feature based classification scheme for uncalibrated image steganalysis
ICDEM'10: Proceedings of the Second international conference on Data Engineering and ManagementSteganalysis is a technique of detecting hidden information sent over a communication medium. In this paper, we present a powerful new blind steganalytic scheme that can reliably detect hidden data in JPEG images. This would increase the success rate of ...
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
Steganalysis of YASS
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityIn this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in ...
Comments