Skip to main content

Deep Learning Image Steganalysis Method Fused with CBAM

  • Conference paper
  • First Online:
Proceedings of the 12th International Conference on Computer Engineering and Networks (CENet 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 961))

Included in the following conference series:

  • 1456 Accesses

Abstract

Steganography is a critical technical tool for preventing the disclosure of sensitive information. The detection performance of picture steganography algorithms based on deep learning has to be enhanced in tandem with the ongoing improvement of adaptive steganography algorithm performance. In this paper, a new model SRNet-CBAM based on SRNet fusion channel attention module and spatial attention module was presented to address the challenge of adaptive steganography analysis and the difficulty of model focused analysis for picture favorable regions. In three different embedding rates of WOW, S-UNIWARD, and HUGO algorithms, the experimental results reveal that the SRNet-CBAM model increases the accuracy of the SRNet model by 1.36% on average.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gupta, L.K., Singh, A., Kushwaha, A., et al.: Analysis of image steganography techniques for different image format. In: 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1–6. IEEE (2021)

    Google Scholar 

  2. Dhawan, S., Gupta, R.: Analysis of various data security techniques of steganography: a survey. Inf. Secur. J. Glob. Perspect. 9, 1–25 (2020)

    Google Scholar 

  3. Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and Information Processing Association Summit and Conference. IEEE (2014)

    Google Scholar 

  4. Qian, Y., Jing, D., Wei, W., et al.: Deep learning for steganalysis via convolutional neural networks. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 9409 (2015). 94090J-94090J-10

    Google Scholar 

  5. Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)

    Google Scholar 

  6. Jian, Y., Ni, J., Yang, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)

    Article  Google Scholar 

  7. Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181–1193 (2019)

    Article  Google Scholar 

  8. Zhang, R., Zhu, F., Liu, J., et al.: Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans. Inf. Forensics Secur. 15, 1138–1150 (2020)

    Article  Google Scholar 

  9. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. Eurasip J. Inf. Secur. 2014(1), 1 (2014)

    Google Scholar 

  10. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_13

    Chapter  Google Scholar 

  11. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security. IEEE (2012)

    Google Scholar 

  12. Zhu, X., Cheng, D., Zhang, Z., et al.: An empirical study of spatial attention mechanisms in deep networks. In: 2019 IEEE/CVF International Conference on Computer Vision (ICCV). IEEE (2020)

    Google Scholar 

  13. Zhang, H.T., Zhang, M.: SSD target detection algorithm with channel attention mechanism. Comput. Eng. 46(08), 264–270 (2020)

    Google Scholar 

  14. Zhu, Y.N., Ni, X., Yao, Y.: Face recognition combined with singular value face and attention deep learning. Small Microcomputer Syst. 41(08), 1763–1767 (2020)

    Google Scholar 

  15. Bas, P., Filler, T., Pevný, T.: ”Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5

    Chapter  Google Scholar 

  16. Lin, T.Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) Computer Vision – ECCV 2014. ECCV 2014. LNCS, vol. 8693. Springer, Cham. https://doi.org/10.1007/978-3-319-10602-1_48

  17. Kingma, D., Ba, J.: Adam: a method for stochastic optimization. Computer Science (2014)

    Google Scholar 

Download references

Acknowledgement

This work is supported by the Hunan Provincial Natural Science Foundation of China (2021JJ50074), the Scientific Research Fund of Hunan Provincial Education Department (19B082), the Science and Technology Plan Project of Hunan Province (2016TP1020), the Subject Group Construction Project of Hengyang Normal University (18XKQ02), the Application oriented Special Disciplines, Double First- Class University Project of Hunan Province (Xiangjiaotong [2018] 469), the Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development (2018CT5001), the First Class Undergraduate Major in Hunan Province Internet of Things Major (Xiangjiaotong [2020] 248, No. 288).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ge Jiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, H., Jiao, G. (2022). Deep Learning Image Steganalysis Method Fused with CBAM. In: Liu, Q., Liu, X., Cheng, J., Shen, T., Tian, Y. (eds) Proceedings of the 12th International Conference on Computer Engineering and Networks. CENet 2022. Lecture Notes in Electrical Engineering, vol 961. Springer, Singapore. https://doi.org/10.1007/978-981-19-6901-0_123

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-6901-0_123

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-6900-3

  • Online ISBN: 978-981-19-6901-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics