skip to main content
research-article

A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning

Published:12 July 2023Publication History
Skip Abstract Section

Abstract

With the rapid proliferation of urbanization, massive data in social networks are collected and aggregated in real time, making it possible for criminals to use images as a cover to spread secret information on the Internet. How to determine whether these images contain secret information is a huge challenge for multimedia computing security. The steganalysis method based on deep learning can effectively judge whether the pictures transmitted on the Internet in urban scenes contain secret information, which is of great significance to safeguarding national and social security. Image steganalysis based on deep learning has powerful learning ability and classification ability, and its detection accuracy of steganography images has surpassed that of traditional steganalysis based on manual feature extraction. In recent years, it has become a hot topic of the information hiding technology. However, the detection accuracy of existing deep learning based steganalysis methods still needs to be improved, especially when detecting arbitrary-size and multi-source images, their detection efficientness is easily affected by cover mismatch. In this manuscript, we propose a steganalysis method based on Inverse Residuals structured Siamese network (abbreviated as SiaIRNet method, Siamese-Inverted-Residuals-Network Based method). The SiaIRNet method uses a siamese convolutional neural network (CNN) to obtain the residual features of subgraphs, including three stages of preprocessing, feature extraction, and classification. Firstly, a preprocessing layer with high-pass filters combined with depth-wise separable convolution is designed to more accurately capture the correlation of residuals between feature channels, which can help capture rich and effective residual features. Then, a feature extraction layer based on the Inverse Residuals structure is proposed, which improves the ability of the model to obtain residual features by expanding channels and reusing features. Finally, a fully connected layer is used to classify the cover image and the stego image features. Utilizing three general datasets, BossBase-1.01, BOWS2, and ALASKA#2, as cover images, a large number of experiments are conducted comparing with the state-of-the-art steganalysis methods. The experimental results show that compared with the classical SID method and the latest SiaStegNet method, the detection accuracy of the proposed method for 15 arbitrary-size images is improved by 15.96% and 5.86% on average, respectively, which verifies the higher detection accuracy and better adaptability of the proposed method to multi-source and arbitrary-size images in urban scenes.

REFERENCES

  1. [1] Anwar Sajid, Hwang Kyuyeon, and Sung Wonyong. 2017. Structured pruning of deep convolutional neural networks. ACM Journal on Emerging Technologies in Computing Systems (JETC) 13, 3 (2017), 118.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Bas Patrick, Filler Tomáš, and Pevnỳ Tomáš. 2011. Break our steganographic system: The ins and outs of organizing BOSS. In International Workshop on Information Hiding. Springer, 5970.Google ScholarGoogle Scholar
  3. [3] Bas Patrick and Furon Teddy. 2022. BOWS-2. Retrieved February 17, 2022 from http://bows2.ec-lille.fr/.Google ScholarGoogle Scholar
  4. [4] Boroumand Mehdi, Chen Mo, and Fridrich Jessica. 2018. Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 14, 5 (2018), 11811193.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Chen Junfu, Fu Zhangjie, Zhang Weiming, Cheng Xu, and Sun Xingming. 2021. Steganalysis based on deep learning:A review. J. Softw. 32, 2 (2021), 551745.Google ScholarGoogle Scholar
  6. [6] Cheng Wenhuang, Liu Jiaying, Sebe Nicu, Yuan Junsong, and Shuai Honghan. 2021. Introduction to the special issue on explainable AI on multimedia computing. ACM Trans. Multimedia Comput. Commun. Appl. 17, 3s (2021).Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Chollet François. 2017. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 12511258.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Cogranne Rémi, Giboulot Quentin, and Bas Patrick. 2019. The ALASKA steganalysis challenge: A first step towards steganalysis. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 125137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Cogranne Rémi, Giboulot Quentin, and Bas Patrick. 2022. Documentation of AlaskaV2 Dataset Scripts: A Hint Moving Towards Steganography and Steganalysis into the Wild. Retrieved February 17, 2022 from https://alaska.utt.fr.Google ScholarGoogle Scholar
  10. [10] Cogranne Rémi, Zitzmann Cathel, Fillatre Lionel, Retraint Florent, Nikiforov Igor, and Cornu Philippe. 2011. A cover image model for reliable steganalysis. In International Workshop on Information Hiding. Springer, 178192.Google ScholarGoogle Scholar
  11. [11] Dumitrescu Sorina, Wu Xiaolin, and Wang Zhe. 2002. Detection of LSB steganography via sample pair analysis. In International Workshop on Information Hiding. Springer, 355372.Google ScholarGoogle Scholar
  12. [12] Filler Tomáš, Ker Andrew D., and Fridrich Jessica. 2009. The square root law of steganographic capacity for Markov covers. Proceedings of SPIE the International Society for Optical Engineering 7254, 107116.Google ScholarGoogle Scholar
  13. [13] Fridrich Jessica, Goljan Miroslav, and Du Rui. 2001. Reliable detection of LSB steganography in color and grayscale images. In Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges. 2730.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Fridrich Jessica and Kodovskỳ Jan. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 7, 3 (2012), 868882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Furon Teddy, Liu Jingen, Rawat Yogesh, Zhang Wei, and Zhao Qi. 2021. Trustworthy AI’21: 1st International Workshop on Trustworthy AI for Multimedia Computing. Association for Computing Machinery, New York, NY, USA, 5708C5709.Google ScholarGoogle Scholar
  16. [16] He Kaiming, Zhang Xiangyu, Ren Shaoqing, and Sun Jian. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770778.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Holub Vojtěch and Fridrich Jessica. 2012. Designing steganographic distortion using directional filters. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 234239.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Holub Vojtěch and Fridrich Jessica. 2013. Digital image steganography using universal distortion. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. 5968.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Holub Vojtech and Fridrich Jessica. 2013. Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Security 8, 12 (2013), 19962006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Ker Andrew D.. 2007. A capacity result for batch steganography. IEEE Signal Process. Lett. 14, 8 (2007), 525528.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Ker Andrew D., Pevnỳ Tomáš, Kodovskỳ Jan, and Fridrich Jessica. 2008. The square root law of steganographic capacity. In Proceedings of the 10th ACM Workshop on Multimedia and Security. 107116.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Kodovsky Jan, Fridrich Jessica, and Holub Vojtěch. 2011. Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Security 7, 2 (2011), 432444.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Li Bin, Wang Ming, Huang Jiwu, and Li Xiaolong. 2014. A new cost function for spatial image steganography. In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 42064210.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Li Hao, Kadav Asim, Durdanovic Igor, Samet Hanan, and Graf Hans Peter. 2016. Pruning filters for efficient ConvNets. arXiv preprint arXiv:1608.08710 (2016).Google ScholarGoogle Scholar
  25. [25] Mazurczyk Wojciech and Wendzel Steffen. 2017. Information hiding: Challenges for forensic experts. Commun. ACM 61, 1 (2017), 86C94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Pevnỳ Tomáš and Ker Andrew D.. 2015. Towards dependable steganalysis. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. 94090I.Google ScholarGoogle Scholar
  27. [27] Qian Yinlong, Dong Jing, Wang Wei, and Tan Tieniu. 2016. Learning and transferring representations for image steganalysis using convolutional neural network. In 2016 IEEE International Conference on Image Processing (ICIP). IEEE, 27522756.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Sandler Mark, Howard Andrew, Zhu Menglong, Zhmoginov Andrey, and Chen Liang-Chieh. 2018. MobileNetV2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 45104520.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Szegedy Christian, Liu Wei, Jia Yangqing, Sermanet Pierre, Reed Scott, Anguelov Dragomir, Erhan Dumitru, Vanhoucke Vincent, and Rabinovich Andrew. 2015. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 19.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Tan Mingxing and Le Quoc. 2019. EfficientNet: Rethinking model scaling for convolutional neural networks. In International Conference on Machine Learning. PMLR, 61056114.Google ScholarGoogle Scholar
  31. [31] Tan Mingxing, Pang Ruoming, and Le Quoc V. 2020. EfficientDet: Scalable and efficient object detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 1078110790.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Tan Shunquan, Wu Weilong, Shao Zilong, Li Qiushi, Li Bin, and Huang Jiwu. 2020. CALPA-NET: Channel-pruning-assisted deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 16 (2020), 131146.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Tang Weixuan, Li Haodong, Luo Weiqi, and Huang Jiwu. 2015. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans. Inf. Forensics Security 11, 4 (2015), 734745.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Tong Chao, Zhang Mengze, Lang Chao, and Zheng Zhigao. 2021. An image privacy protection algorithm based on adversarial perturbation generative networks. ACM Trans. Multimedia Comput. Commun. Appl. 17, 2 (2021).Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Tsang Clement Fuji and Fridrich Jessica. 2018. Steganalyzing images of arbitrary size with CNNs. Electron. Imag. 2018, 7 (2018), 121–1.Google ScholarGoogle Scholar
  36. [36] Xu Guanshuo, Wu Hanzhou, and Shi Yunqing. 2016. Ensemble of CNNs for steganalysis: An empirical study. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. 103107.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Xu Guanshuo, Wu Hanzhou, and Shi Yunqing. 2016. Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23, 5 (2016), 708712.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Ye Jian, Ni Jiangqun, and Yi Yang. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Security 12, 11 (2017), 25452557.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Yedroudj Mehdi, Comby Frédéric, and Chaumont Marc. 2018. Yedroudj-Net: An efficient CNN for spatial steganalysis. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 20922096.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] You Weike, Zhang Hong, and Zhao Xianfeng. 2020. A Siamese CNN for image steganalysis. IEEE Trans. Inf. Forensics Security 16 (2020), 291306.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Yousfi Yassine, Butora Jan, Fridrich Jessica, and Tsang Clément Fuji. 2021. Improving EfficientNet for JPEG steganalysis. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security. 149157.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Yousfi Yassine, Butora Jan, Fridrich Jessica, and Giboulot Quentin. 2019. Breaking ALASKA: Color separation for steganalysis in JPEG domain. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 138149.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Zhang Ru, Zhu Feng, Liu Jianyi, and Liu Gongshen. 2019. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans. Inf. Forensics Security 15 (2019), 11381150.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Zhang Yi, Luo Xiangyang, Wang Jinwei, Guo Yanqing, and Liu Fenlin. 2021. Image robust adaptive steganography adapted to lossy channels in open social networks. Inf. Sci. 564 (2021), 306326.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 6
      November 2023
      858 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3599695
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 July 2023
      • Online AM: 11 January 2023
      • Accepted: 23 December 2022
      • Revised: 20 September 2022
      • Received: 28 February 2022
      Published in tomm Volume 19, Issue 6

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text