Skip to main content
Log in

A generalized image steganalysis approach via decision level fusion of deep models

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recent advancements in digital technologies has greatly facilitated the huge growth of complex images over the internet channels leading to security threats causing unauthorised information access. Such complex images are perceived as a reliable means for secret communication. Hence an active research is carried out for steganalysis – a method to determine the presence of hidden information in the multimedia files. The primary challenge faced by the existing steganalysis approaches is, to be able to extract and learn high level feature representations from images of high texture complexity which is somewhat difficult to be achieved by a single deep learning(DL)-based steganalyzer. In this work, we expound an ensemble of deep models with decision level fusion strategy in predicting an image as cover or stego. The ensemble of validated reference models aims to achieve better performance than using a single CNN architecture. The proposed model comprises of three potent pre-trained deep fine-tuned models- VGG19, ResNet50 and Inceptionv3 followed by a majority voting scheme for spatial image steganalysis task. In comparison to convolution neural networks (CNN) specifically created for steganalysis, such as Qian-Net[22],XU-Net[25],Ye-Net[30],Yedroudj-Net[31], Zhu-Net[29], SR-Net[52], GBRASNet[34], trained from scratch, the suggested model performs significantly better. The proposed framework is compared against eight existing competitive state-of-the-art (SOTA) models over a two class dataset. Experiments are conducted on benchmark image dataset BOSSBase1.01 and BOWS2. This claim is substantiated experimentally on two well known content-adaptive steganographic algorithms WOW and S-UNIWARD with payloads 0.2bpp and 0.4bpp respectively. Extensive experiments and evaluations reveal that our proposed approach yields an accuracy of 99.16% on WOW (0.2bpp), 99.21% on WOW (0.4bpp), 99.07% on S-UNIWARD (0.2bpp), and 99.69% on S-UNIWARD (0.4bpp) steganography algorithms. Moreover, our approach results in better generalization performance, reduced training time and increases accuracy (ACC) over the existing state-of-the-art (SOTA) steganalytic architectures.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Algorithm 2
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

Data will be made available on reasonable request.

References

  1. Conway M (2003) Code wars: Steganography, signals intelligence, and terrorism. Know Techn Pol 16:45–62. https://doi.org/10.1007/s12130-003-1026-4

    Article  Google Scholar 

  2. Kolade O, Olayinka AA, Sunday F, Adesoji O, Olubusola IF (2015) Detection of stego-images in communication among the terrorist Boko-Haram sect in Nigeria. J Data Anal Inf Process 3(04):168

    Google Scholar 

  3. https://arstechnica.com/information-technology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video/

  4. Pevný T, Bas P, Fridrich J (2009) Steganalysis by subtractive pixel adjacency matrix. In Proceedings of the 11th ACM workshop on Multimedia and security (pp. 75–84)

  5. Kodovsky J, Binghamton S, Fridrich J (2009) Calibration revisited. Proceedings of the 11th ACM Multimedia & Security Workshop. https://doi.org/10.1145/1597817.1597830

  6. Yedroudj M, Chaumont M, Comby F, Oulad Amara A, Bas P (2020) Pixels-off: Data-augmentation complementary solution for deep-learning steganalysis. https://doi.org/10.1145/3369412.3395061

  7. Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters, pp 1–1. https://doi.org/10.1109/LSP.2017.2745572.

  8. Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In 2016 IEEE international conference on image processing (ICIP) (pp. 2752–2756). Ieee

  9. Ozcan S, Mustaçoglu AF (2018) Transfer learning effects on image steganalysis with pre-trained deep residual neural network model. 2018 IEEE International Conference on Big Data (Big Data), 2280–2287

  10. Yang H, He H, Zhang W, Cao X (2021) FedSteg: a federated transfer learning framework for secure image steganalysis. In: IEEE Transactions on Network Science and Engineering 8(2):1084–1094. https://doi.org/10.1109/TNSE.2020.2996612

  11. Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229

    Article  MathSciNet  Google Scholar 

  12. Fridrich, J. (2004). Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In International Workshop on Information Hiding (pp. 67–81). Berlin: Springer Berlin Heidelberg

  13. Shi YQ, Chen C, Chen W (2006) A Markov process based approach to effective attacking JPEG steganography. Information Hiding

  14. Zhou Z, Hui M (2009) Steganalysis for Markov feature of difference array in DCT domain. 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery 7:581–584

  15. Holotyak T, Fridrich J, Voloshynovskiy S (2005) Blind statistical steganalysis of additive steganography using wavelet higher order statistics, pp 273–274. https://doi.org/10.1007/11552055_31

  16. Villa Estrada HF, Jaramillo Pérez JC (2015) Aplicaciones de la esteganografía en la seguridad informática. Available: https://www.sans.org/readingroom/whitepapers/stenganography/hiding-plain-view-steganography-terrorist-tool-551

  17. Thampi SM (2008) Information hiding techniques: a tutorial review. arXiv preprint arXiv:0802.3746

  18. Anderson RJ, Petitcolas FAP (1998) On the limits of steganography. In: IEEE Journal on Selected Areas in Communications 16(4):474–481. https://doi.org/10.1109/49.668971

  19. Salakhutdinov R, Hinton G (2009) Deep boltzmann machines. In Artificial intelligence and statistics (pp. 448–455). PMLR

  20. Larochelle H, Bengio Y, Louradour J, Lamblin P (2009) Exploring strategies for training deep neural networks. J Mach Learn Res 10(1):40. https://doi.org/10.1145/1577069.1577070

  21. Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. Proceedings of SPIE - The International Society for Optical Engineering, 9409. https://doi.org/10.1117/12.2083479

  22. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882

    Article  Google Scholar 

  23. Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712

    Article  Google Scholar 

  24. Yang S, Sun Y, Tang G, Jiang M (2018) Analysis for Influence of Training Data Sequence on CNN-based Steganalysis. In 2018 IEEE 4th International Conference on Computer and Communications (ICCC) (pp. 2110–2114). IEEE. Zhang, R., Zhu, F., Liu, J., & Liu, G. (2018). Efficient feature learning and multi-size image steganalysis based on CNN. ArXiv, abs/1807.11428

  25. Ni J, Ye J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, pp 1–1. https://doi.org/10.1109/TIFS.2017.2710946

  26. Yedroudj M, Comby F, Chaumont M (2018) Yedroudj-net: An efficient CNN for spatial steganalysis. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (pp 2092–2096). IEEE

  27. He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell 37(9):1904–1916

    Article  Google Scholar 

  28. Rubio Alejandro, Grisales Jesus, Tabares Soto Reinel, Ramos-Pollán Raúl, Ortíz Mario, Arteaga Arteaga Harold, Isaza Gustavo, Arias Daniel, Orozco Arias, Simon, Burbano Jàcome Alejandro (2021) GBRAS-Net: a convolutional neural network architecture for spatial image steganalysis. IEEE Access 9:14340–14350. https://doi.org/10.1109/ACCESS.2021.3052494.

  29. Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2818–2826)

  30. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition (pp 770–778)

  31. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556

  32. Krizhevsky Alex, Sutskever I, Hinton G (2012) Imagenet classification with deep convolutional neural networks, pp 1097–1105

  33. Holub V, Fridrich J (2013) Designing steganographic distortion using directional filters. IEEE International Workshop on Information Forensics and Security 2:234–239

  34. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 1. https://doi.org/10.1186/1687-417X-2014-1

  35. Tan S, Li B (2015) Stacked convolutional auto-encoders for steganalysis of digital images. https://doi.org/10.1109/APSIPA.2014.7041565

  36. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181–1193

    Article  Google Scholar 

  37. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing, pp 1–1. https://doi.org/10.1109/TDSC.2020.3004708

  38. Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685–696

    Article  Google Scholar 

  39. Tan J, Liao X, Liu J, Cao Y, Jiang H (2021) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888–903

    Article  Google Scholar 

  40. Binghamton University (2015) Steganographic algorithms. Available at http://dde.binghamton.edu/download/stego_algorithms/. Accessed Oct 2022

  41. Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234

    Article  Google Scholar 

  42. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding: 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers 12 (pp. 161-177). Springer, Berlin. Accessed 2022

  43. Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In 2014 IEEE International Workshop on Information Forensics and Security (WIFS) (pp. 48–53). IEEE

  44. Tang W, Li H, Luo W, Huang J (2014) Adaptive steganalysis against WOW embedding algorithm. In: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security (IH&MMSec ’14). Association for Computing Machinery, New York, NY, USA, pp 91–96. https://doi.org/10.1145/2600918.2600935

  45. Tang W, Li H, Luo W, Huang J (2016) Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans Inf Forensics Secur 11:734–745

  46. Denemark T, Fridrich J, Comesaña P (2016) Improving selection-channel-aware steganalysis features. Electron Imaging 2016:1–8. https://doi.org/10.2352/ISSN.2470-1173.2016.8.MWSF-080

  47. Kadhim IJ, Premaratne P, Vial PJ, Al-Qershi OM, Al-Shebani Q (2020) Towards a Universal Steganalyser Using Convolutional Neural Networks. In Intelligent Computing Methodologies: 16th International Conference, ICIC 2020, Bari, Italy, October 2–5, 2020, Proceedings, Part III 16 (pp. 611–623). Springer International Publishing

  48. Agarwal S, Kim C, Jung KH (2022) Steganalysis of Context-Aware Image Steganography Techniques Using Convolutional Neural Network. Appl Sci 12(21):10793

    Article  Google Scholar 

  49. Dwaik A, Belkhouche Y (2022) Analysis of Deep Learning-Based Image Steganalysis Methods Under Different Steganographic Algorithms. In International Symposium on Visual Computing (pp. 284–294). Cham: Springer

  50. Liu F, Zhou X, Yan X, Lu Y, Wang S (2021) Image steganalysis via diverse filters and squeeze-and-excitation convolutional neural network. Mathematics 9(2):189. https://doi.org/10.3390/math9020189

  51. Zhang H, Liu F, Song Z, Zhang X, Zhao Y,  (2022) "AG-Net: An Advanced General CNN Model for Steganalysis," in IEEE Access, vol. 10, pp. 44116-44122. https://doi.org/10.1109/ACCESS.2022.3150276.

  52. Su H, Han M, Liang J, Yu S (2022) Steganalysis of image with adaptively parametric activation. arXiv preprint arXiv:2203.12843

  53. Swarnkar N, Rawal A, Patel G (2021) A paradigm shift for computational excellence from traditional machine learning to modern deep learning-based image steganalysis. In: Data Science and Innovations for Intelligent Systems (pp 209–240). CRC Press

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neelam Swarnkar.

Ethics declarations

Conflicts of Interest

The authors declare that there are no conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Swarnkar, N., Thomas, A. & Selwal, A. A generalized image steganalysis approach via decision level fusion of deep models. Multimed Tools Appl 83, 43513–43538 (2024). https://doi.org/10.1007/s11042-023-17068-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17068-0

Keywords

Navigation