Abstract
Steganography is the technique that’s used to embed secret messages into digital media without changing their appearances. As a countermeasure to steganography, steganalysis detects the presence of hidden data in a digital content. For the last decade, the majority of image steganalysis approaches can be formed by two stages. The first stage is to extract effective features from the image content and the second is to train a classifier in machine learning by using the features from stage one. Ultimately the image steganalysis becomes a binary classification problem. Since Deep Learning related architecture unify these two stages and save researchers lots of time designing hand-crafted features, the design of a CNN-based steganalyzer has therefore received increasing attention over the past few years. In this paper, we will examine the development in image steganalysis, both in spatial domain and in JPEG domain, and discuss the future directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sedighi, V., et al.: Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forensics Secur. 11(2), 221–234 (2015)
Holub, V., et al.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1 (2014)
Li, B., et al.: A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP) (2014)
Holub, V., et al.: Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (2012)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, Philip W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_13
Guo, L., et al.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)
Schlegel, D.: Deep machine learning on GPU. University of Heidelber-Ziti, p. 12 (2015)
Pevny, T., et al.: Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. Inf. Forensics Secur. 5(2), 215–224 (2010)
Fridrich, J., et al.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)
Kodovsky, J., Holub, V., et al.: Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Secur. 7(2), 432–444 (2011)
Holub, V., et al.: Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XV, San Francisco, CA, vol. 8665 (2013)
Holub, V., et al.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)
Denemark, T., et al.: Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS) (2014)
Li, B., et al.: New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Trans. Inf. Forensics Secur. 13(5), 1242–1257 (2017)
Chen, C., et al.: JPEG image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International Symposium on Circuits and Systems. IEEE (2008)
Fridrich, J., Goljan, M., Hogea, D.: Steganalysis of JPEG images: breaking the F5 algorithm. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 310–323. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36415-3_20
Kodovský, J., et al.: Calibration revisited. In: Proceedings of the 11th ACM Workshop on Multimedia and Security. ACM (2009)
Liu, Q.: Steganalysis of DCT-embedding based adaptive steganography and YASS. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security. ACM (2011)
Kodovský, J., et al.: Steganalysis in high dimensions: fusing classifiers built on random subspaces. In: Media Watermarking, Security, and Forensics III, vol. 7880. International Society for Optics and Photonics (2011)
Kodovský, J., et al.: Steganalysis of JPEG images using rich models. In: Media Watermarking, Security, and Forensics 2012, vol. 8303. International Society for Optics and Photonics (2012)
Holub, V., et al.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2014)
Holub, V., et al.: Phase-aware projection model for steganalysis of JPEG images. In: Media Watermarking, Security, and Forensics 2015, vol. 9409. International Society for Optics and Photonics (2015)
Song, X., et al.: Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM (2015)
Denemark, T., et al.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736–1746 (2016)
Qian, Y., et al.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, vol. 9409. International Society for Optics and Photonics (2015)
Krizhevsky, A., et al.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (2012)
Pibre, L., et al.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. Electron. Imaging 4(8), 1–11 (2016)
Xu, G., et al.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708–712 (2016)
Xu, G., et al.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM (2016)
Qian, Y., et al.: Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing (ICIP) (2016)
Ye, J., et al.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)
Yedroudj, M., et al.: Yedroudj-Net: an efficient CNN for spatial steganalysis. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2018)
Li, B., et al.: ReST-Net: diverse activation modules and parallel subnets-based CNN for spatial image steganalysis. IEEE Sig. Process. Lett. 25(5), 650–654 (2018)
Zhang, R., et al.: Efficient feature learning and multi-size image steganalysis based on CNN. arXiv preprint arXiv:1807.11428 (2018)
Wu, S., et al.: Deep residual learning for image steganalysis. Multimed. Tools Appl. 77(9), 10437–10453 (2018)
Boroumand, M., et al.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181–1193 (2018)
Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017)
Chen, M., et al.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM (2017)
Yang, J., et al.: JPEG steganalysis based on densenet. arXiv preprint arXiv:1711.09335 (2017)
Zeng, J., et al.: Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans. Inf. Forensics Secur. 13(5), 1200–1214 (2017)
Xia, C., et al.: Improved PHARM for JPEG steganalysis: making PHARM more efficient and effective. IEEE Access 7, 50339–50346 (2019)
Feng, G., et al.: Diversity-based cascade filters for JPEG steganalysis. IEEE Trans. Circuits Syst. Video Technol. (2019)
Hu, D., et al.: Digital image steganalysis based on visual attention and deep reinforcement learning. IEEE Access 7, 25924–25935 (2019)
Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5
Bas, P., et al.: BOWS-2 (2007). http://bows2.ec-lille.fr
Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)
Acknowledgement
This work was partly supported by National Natural Science Foundation of China (61772144, 61672008), Innovation Team Project (Natural Science) of the Education Department of Guangdong Province (2017KCXTD021), Foundation for Youth Innovation Talents in Higher Education of Guangdong Province (2018KQNCX139), Innovation Research Project (Natural Science) of Education Department of Guangdong Province (2016KTSCX077), Project for Distinctive Innovation of Ordinary Universities of Guangdong Province (2018KTSCX120), and Foreign Science and Technology Cooperation Plan Project of Guangzhou Science Technology and Innovation Commission (201807010059).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Xie, G., Ren, J., Zhao, H., Zhao, S., Marshall, S. (2020). Evaluation of Deep Learning and Conventional Approaches for Image Steganalysis. In: Ren, J., et al. Advances in Brain Inspired Cognitive Systems. BICS 2019. Lecture Notes in Computer Science(), vol 11691. Springer, Cham. https://doi.org/10.1007/978-3-030-39431-8_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-39431-8_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39430-1
Online ISBN: 978-3-030-39431-8
eBook Packages: Computer ScienceComputer Science (R0)