Abstract
This paper proposes an effective steganalytic scheme based on CNN in order to detect steganography on larger JPEG images. Most of the CNN schemes were designed very deep to achieve high accuracy, resulting in inability to train large size images due to the limitation of GPUs’ memory. Most existing network architectures use small images of 256 \(\times \) 256 or 512 \(\times \) 512 pixels as their detection objects which are far from meeting the needs of practical applications. Meanwhile, the resizing operation on stegos will make the slight noise signal caused by steganography become difficult to detect. In our proposed network architecture, we try to solve the problem by compressing the depth of network structure. And in order to reduce the data dimension, we apply a histogram layer to transform the feature maps to feature vectors before the fully connected layer. We test our network on images of size 512 \(\times \) 512, 1024 \(\times \) 1024 and 2048 \(\times \) 2048. For different application scenes, we take two methods to generate large samples. The result demonstrates that the proposed scheme can make directly training the steganalysis detectors on large images feasible.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the Ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5
Chen, M., Sedighi, V., Boroumand, M., Fridrich, J.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 75–84. ACM (2017)
Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)
Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)
Holub, V., Fridrich, J.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)
Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1 (2014)
Jia, Y., et al.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the ACM International Conference on Multimedia, MM 2014, Orlando, FL, USA, 03–07 November 2014, pp. 675–678. ACM (2014)
Kodovský, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Media Watermarking, Security, and Forensics 2012, Burlingame, CA, USA, 22 January 2012, Proceedings, vol. 8303, p. 83030A. SPIE (2012)
Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, 9–11 February 2015, Proceedings, vol. 9409, p. 94090J. International Society for Optics and Photonics (2015)
Qian, Y., Dong, J., Wang, W., Tan, T.: Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing, ICIP 2016, Phoenix, AZ, USA, 25–28 September 2016, pp. 2752–2756. IEEE (2016)
Sedighi, V., Fridrich, J.: Histogram layer, moving convolutional neural networks towards feature-based steganalysis. In: Proceedings of IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, USA, pp. 50–55 (2017)
Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, 17–19 June 2015, pp. 15–23. ACM (2015)
Tsang, C.F., Fridrich, J.: Steganalyzing images of arbitrary size with CNNs. In: Proceedings of IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, USA, pp. 1–8 (2018)
Westfeld, A.: F5—a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_21
Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 67–73. ACM (2017)
Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)
Acknowledgments
This work was supported by National Key Technology R&D Program under 2016YFB0801003, NSFC under U1636102 and U1736214, Fundamental Theory and Cutting Edge Technology Research Program of IIE, CAS, under Y7Z0371102, and National Key Technology R&D Program under 2016QY15Z2500.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, Q., Zhao, X., Liu, C. (2019). Convolutional Neural Network for Larger JPEG Images Steganalysis. In: Yoo, C., Shi, YQ., Kim, H., Piva, A., Kim, G. (eds) Digital Forensics and Watermarking. IWDW 2018. Lecture Notes in Computer Science(), vol 11378. Springer, Cham. https://doi.org/10.1007/978-3-030-11389-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-11389-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11388-9
Online ISBN: 978-3-030-11389-6
eBook Packages: Computer ScienceComputer Science (R0)