Abstract
Steganography is a critical technical tool for preventing the disclosure of sensitive information. The detection performance of picture steganography algorithms based on deep learning has to be enhanced in tandem with the ongoing improvement of adaptive steganography algorithm performance. In this paper, a new model SRNet-CBAM based on SRNet fusion channel attention module and spatial attention module was presented to address the challenge of adaptive steganography analysis and the difficulty of model focused analysis for picture favorable regions. In three different embedding rates of WOW, S-UNIWARD, and HUGO algorithms, the experimental results reveal that the SRNet-CBAM model increases the accuracy of the SRNet model by 1.36% on average.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gupta, L.K., Singh, A., Kushwaha, A., et al.: Analysis of image steganography techniques for different image format. In: 2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), pp. 1–6. IEEE (2021)
Dhawan, S., Gupta, R.: Analysis of various data security techniques of steganography: a survey. Inf. Secur. J. Glob. Perspect. 9, 1–25 (2020)
Tan, S., Li, B.: Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and Information Processing Association Summit and Conference. IEEE (2014)
Qian, Y., Jing, D., Wei, W., et al.: Deep learning for steganalysis via convolutional neural networks. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 9409 (2015). 94090J-94090J-10
Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)
Jian, Y., Ni, J., Yang, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)
Boroumand, M., Chen, M., Fridrich, J.: Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 14(5), 1181–1193 (2019)
Zhang, R., Zhu, F., Liu, J., et al.: Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans. Inf. Forensics Secur. 15, 1138–1150 (2020)
Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. Eurasip J. Inf. Secur. 2014(1), 1 (2014)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_13
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security. IEEE (2012)
Zhu, X., Cheng, D., Zhang, Z., et al.: An empirical study of spatial attention mechanisms in deep networks. In: 2019 IEEE/CVF International Conference on Computer Vision (ICCV). IEEE (2020)
Zhang, H.T., Zhang, M.: SSD target detection algorithm with channel attention mechanism. Comput. Eng. 46(08), 264–270 (2020)
Zhu, Y.N., Ni, X., Yao, Y.: Face recognition combined with singular value face and attention deep learning. Small Microcomputer Syst. 41(08), 1763–1767 (2020)
Bas, P., Filler, T., Pevný, T.: ”Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5
Lin, T.Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) Computer Vision – ECCV 2014. ECCV 2014. LNCS, vol. 8693. Springer, Cham. https://doi.org/10.1007/978-3-319-10602-1_48
Kingma, D., Ba, J.: Adam: a method for stochastic optimization. Computer Science (2014)
Acknowledgement
This work is supported by the Hunan Provincial Natural Science Foundation of China (2021JJ50074), the Scientific Research Fund of Hunan Provincial Education Department (19B082), the Science and Technology Plan Project of Hunan Province (2016TP1020), the Subject Group Construction Project of Hengyang Normal University (18XKQ02), the Application oriented Special Disciplines, Double First- Class University Project of Hunan Province (Xiangjiaotong [2018] 469), the Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development (2018CT5001), the First Class Undergraduate Major in Hunan Province Internet of Things Major (Xiangjiaotong [2020] 248, No. 288).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chen, H., Jiao, G. (2022). Deep Learning Image Steganalysis Method Fused with CBAM. In: Liu, Q., Liu, X., Cheng, J., Shen, T., Tian, Y. (eds) Proceedings of the 12th International Conference on Computer Engineering and Networks. CENet 2022. Lecture Notes in Electrical Engineering, vol 961. Springer, Singapore. https://doi.org/10.1007/978-981-19-6901-0_123
Download citation
DOI: https://doi.org/10.1007/978-981-19-6901-0_123
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-6900-3
Online ISBN: 978-981-19-6901-0
eBook Packages: Computer ScienceComputer Science (R0)