Abstract
Image steganography involves the process of concealing sensitive information in the cover image to achieve secret communication. The counterpart of steganography is image steganalysis, which is used to detect any hidden information that is being communicated among different entities. The image steganalysis has gained much attention in the recent past from the information law enforcement as well as with the advancements in communication and information technology, the techniques available for steganography make it more challenging to detect steganographic content. Several steganalysis techniques are available as reported in the literature and each technique relies on the underlying steganographic method used. In this study, we expound an in-depth review of existing state-of-the-art steganalysis approaches and also discuss the evolving intelligent approaches i.e. deep learning (DL) that may be used for image steganalysis. We also present a comparative analysis of various benchmark datasets and evaluation metrics that are commonly used for image steganalysis algorithms. Besides, we also illustrate some openly available tools that may be used for the task of image steganalysis. Our analysis identifies several open research issues in this active field of DL-based image steganalysis and we also present different frameworks that exist in the literature. This study can serve as a reference document to the investigators for future directions in research on deep learning-based steganalysis.
Similar content being viewed by others
Data availability
The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.
References
Abadi M, Barham P, Chen J, et al (2016) TensorFlow: A system for large-scale machine learning. Proc 12th USENIX Symp Oper Syst Des Implementation, OSDI 2016 265–283
Abiodun OI, Jantan A, Omolara AE et al (2018) State-of-the-art in artificial neural network applications: a survey. Heliyon 4:e00938. https://doi.org/10.1016/j.heliyon.2018.e00938
Al-Manaseer RM, Al-Jarrah MM (2019) Steganalysis of Color Images for Low Payload Detection. 35–38. https://doi.org/10.1145/3383913.3383915
Alom MZ, Taha TM, Yakopcic C, Westberg S, Sidike P, Nasrin MS, et al (2018) The history began from AlexNet: a comprehensive survey on deep learning approaches. arXiv:1803.01164
Amina S, Mubeena AK, Shireen MT (2021) AAAAAA A CNN and BILSTM based Image Steganalysis. 9:63–67
Avcibaş I, Kharrazi M, Memon N, Sankur B (2005) Image steganalysis with binary similarity measures. EURASIP J Appl Signal Process 2005:2749–2757. https://doi.org/10.1155/ASP.2005.2749
Ayub N, Selwal A (2020) An improved image steganography technique using edge based data hiding in DCT domain. J Interdiscip Math 23:357–366. https://doi.org/10.1080/09720502.2020.1731949
Bae H, Lee B, Kwon S, Yoon S (2019) DNA steganalysis using deep recurrent neural networks. Pac Symp Biocomput 24:88–99. https://doi.org/10.1142/9789813279827_0009
Bao Y, Yang H, Yang Z, et al (2020) Text steganalysis with attentional L STM-CNN. 2020 5th Int Conf Comput Commun Syst ICCCS 2020. 138–142. https://doi.org/10.1109/ICCCS49078.2020.9118410
Bao H, Dong L, Wei F (2021) BEiT: BERT Pre-Training of Image Transformers. 1–16
Baragada SR, Ramakrishna S, Rao MS, Purushothaman S (2008) Implementation of radial basis function neural network for image steganalysis. Int J Comput Sci Secur 2:12–22
Bas PL, Filler T, Pevný T (2011) “Break our steganographic system”: the ins and outs of organizing BOSS. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 6958 LNCS:59–70. https://doi.org/10.1007/978-3-642-24178-9_5
Bashir B, Selwal A (2021) Towards deep learning-based image steganalysis: practices and open research issues. SSRN Electron J. https://doi.org/10.2139/ssrn.3883330
Bashkirova D (2016) Convolutional neural networks for image steganalysis. Bionanoscience 6:246–248. https://doi.org/10.1007/s12668-016-0215-z
Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14:1181–1193. https://doi.org/10.1109/TIFS.2018.2871749
Broda M, Levicky D, Banoci V, Bugar G (2014) Universal image steganalytic method based on binary similarity measures. 2014 24th Int Conf Radioelektronika, RADIOELEKTRONIKA 2014 - Proc 3–6. https://doi.org/10.1109/Radioelek.2014.6828467
Chakraborty S, Jalal AS, Bhatnagar C (2013) Secret image sharing using grayscale payload decomposition and irreversible image steganography. J Inf Secur Appl 18:180–192. https://doi.org/10.1016/j.istr.2013.02.006
Chang CC, Lin CJ (2011) LIBSVM: a library for support vector machines. ACM Trans Intell Syst Technol 2:1–39. https://doi.org/10.1145/1961189.1961199
Chaumont M (2019) Deep Learning in steganography and steganalysis from 2015 to 2018 To cite this version : HAL Id : lirmm-02087729 Deep Learning in steganog-raphy and steganalysis from
Chen J (2013) Anti PoV-steganalysis data hiding algorithm. ICICS 2013—Conf Guid 9th Int Conf Information, Commun Signal Process 0–4. https://doi.org/10.1109/ICICS.2013.6782915
Chhikara R, Singh L (2013) A review on digital image steganalysis techniques categorised by features extracted. Image (IN) 3:203–213
Chollet F (2017) Xception: Deep learning with depthwise separable convolutions. Proc—30th IEEE Conf Comput Vis Pattern Recognition, CVPR 2017 2017-Janua:1800–1807. https://doi.org/10.1109/CVPR.2017.195
Couchot J-F, Couturier R, Guyeux C, Salomon M (2016) Steganalysis via a Convolutional Neural Network using Large Convolution Filters for Embedding Process with Same Stego Key. 1–24
Cramer R, Damgård IB, Nielsen JB (2001) Multiparty computation from threshold homomorphic encryption. In: Pfitzmann B (ed) EUROCRYPT 2001. LNCS, vol. 2045, Springer, Heidelberg, pp 280–299
Dengpan Y, Shunzhi J, Shiyu L, ChangRui L (2019) Faster and transferable deep learning steganalysis on GPU. J Real-Time Image Process. https://doi.org/10.1007/s11554-019-00870-1
Djebbar F, Ayad B, Meraim KA, Hamam H (2012) Comparative study of digital audio steganography techniques. Eurasip J Audio Speech Music Process 2012:1–16. https://doi.org/10.1186/1687-4722-2012-25
Ekblad U, Kinser JM, Atmer J, Zetterlund N (2004) The intersecting cortical model in image processing. Nucl Instrum Methods Phys Res Sect A 525(1–2):392–396
Farsi H, Shahi A (2014) Steganalysis of images based on spatial domain and two-dimensional JPEG array. J Chin Inst Eng Trans Chin Inst Eng A 37:1055–1063. https://doi.org/10.1080/02533839.2014.929711
Fei-Fei L, Deng J, Li K (2010) ImageNet: constructing a large-scale image database. J Vis 9:1037–1037. https://doi.org/10.1167/9.8.1037
Fischer A, Igel C (2012) An introduction to restricted Boltzmann machines. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 7441 LNCS:14–36. https://doi.org/10.1007/978-3-642-33275-3_2
Fridrich J, Goljan M (2002) <title>Practical steganalysis of digital images: state of the art</title>. Secur Watermarking Multimed Contents IV 4675:1–13. https://doi.org/10.1117/12.465263
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7:868–882. https://doi.org/10.1109/TIFS.2012.2190402
Fridrich J, Goljan M, Du R (2001) Reliable detection of LSB steganography in color and grayscale images. Proc ACM Int Multimed Conf Exhib 27–30. https://doi.org/10.1145/1232454.1232466
Ghanbari S, Keshtegary M, ghanbari N (2012) New steganalysis method using GLCM and neural network. Int J Comput Appl 42:46–50. https://doi.org/10.5120/5708-6266
Gonog L, Zhou Y (2019) A review: Generative adversarial networks. Proc 14th IEEE Conf Ind Electron Appl ICIEA 2019 505–510. https://doi.org/10.1109/ICIEA.2019.8833686
Guo L, Ni J, Su W et al (2015) Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans Inf Forensics Secur 10:2669–2680. https://doi.org/10.1109/TIFS.2015.2473815
Hasoon S, Khalifa F (2012) Steganalysis using KL transform and radial basis neural network. AL-Rafidain J Comput Sci Math 9:47–58. https://doi.org/10.33899/csmj.2012.163670
Hassan M, AMIN M, Mahdi S, “Steganalysis Techniques and Comparison of Available Softwares,” no. 2000, 2020. https://doi.org/10.4108/eai.28-6-2020.2297970
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 2016-Decem:770–778. https://doi.org/10.1109/CVPR.2016.90
Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9:1735–1780. https://doi.org/10.1162/neco.1997.9.8.1735
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. WIFS 2012—Proc 2012 IEEE Int Work Inf Forensics Secur 234–239. https://doi.org/10.1109/WIFS.2012.6412655
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. Eurasip J Inf Secur 2014:1–13. https://doi.org/10.1186/1687-417X-2014-1
Hu Y, Wen G, Luo M, Dai, D, Ma J, Yu Z (2018) Competitive Inner-imaging squeeze and excitation for residual network. arXiv:1807.08920
Hu D, Zhou S, Shen Q et al (2019) Digital image steganalysis based on visual attention and deep reinforcement learning. IEEE Access 7:25924–25935. https://doi.org/10.1109/ACCESS.2019.2900076
Hu J, Shen L, Albanie S et al (2020) Squeeze-and-excitation networks. IEEE Trans Pattern Anal Mach Intell 42:2011–2023. https://doi.org/10.1109/TPAMI.2019.2913372
Huang G, Liu Z, Van Der Maaten L, Weinberger KQ (2017) Densely connected convolutional networks. Proc—30th IEEE Conf Comput Vis Pattern Recognition, CVPR 2017 2017-Janua:2261–2269. https://doi.org/10.1109/CVPR.2017.243
Huiskes MJ, Lew MS (2008) The MIR Flickr retrieval evaluation. Proc 1st Int ACM Conf Multimed Inf Retrieval, MIR2008, Co-located with 2008 ACM Int Conf Multimedia, MM’08 39–43. https://doi.org/10.1145/1460096.1460104
Hussain M, Wahab AWA, Bin IYI et al (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66. https://doi.org/10.1016/j.image.2018.03.012
Jain T (2020) Spatial domain steganography techniques and neural network based steganalysis with differential storage. Int Conf Emerg Trends Inf Technol Eng Ic-ETITE 2020:1–4. https://doi.org/10.1109/ic-ETITE47903.2020.416
Jia C, Yang Y, Xia Y, Chen YT, Parekh Z, Pham H et al (2021) Scaling up visual and vision-language representation learning with noisy text supervision. In: International Conference on Machine Learning, pp 4904–4916. PMLR
JinaChanu Y, Manglem Singh K, Tuithung T (2012) Image steganography and steganalysis: a survey. Int J Comput Appl 52:1–11. https://doi.org/10.5120/8171-1484
Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326. https://doi.org/10.1016/j.neucom.2018.06.075
Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. J Inf Secur Appl 40:217–235. https://doi.org/10.1016/j.jisa.2018.04.005
Kaur M, Kaur G (2014) Review of various steganalysis. Techniques 5:1744–1747
Ke Y, Liu J, Zhang MQ et al (2018) Steganography security: principle and practice. IEEE Access 6:73009–73022. https://doi.org/10.1109/ACCESS.2018.2881680
Ke Q, Ming LD, Daxing Z (2019) Image steganalysis via multi-column convolutional neural network. Int Conf Signal Process Proceedings, ICSP 2018-Augus:550–553. https://doi.org/10.1109/ICSP.2018.8652324
Ker AD (2007) A fusion of maximum likelihood and structural steganalysis. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 4567 LNCS:204–219. https://doi.org/10.1007/978-3-540-77370-2_14
Khan A, Sohail A, Zahoora U, Qureshi AS (2020) A survey of the recent architectures of deep convolutional neural networks. Artif Intell Rev. https://doi.org/10.1007/s10462-020-09825-6
Kim DH, Lee HY (2018) Deep learning-based steganalysis against spatial domain steganography. Proc—2017 Eur Conf Electr Eng Comput Sci EECS 2017 1–4. https://doi.org/10.1109/EECS.2017.9
Kim J, Park H, Il PJ (2020) CNN-based image steganalysis using additional data embedding. Multimed Tools Appl 79:1355–1372. https://doi.org/10.1007/s11042-019-08251-3
Kim JT, Kim S, Kim K (2019) A Study on Improved JPEG Steganography Algorithm to Prevent Steganalysis. ICTC 2019—10th Int Conf ICT Converg ICT Converg Lead Auton Futur 960–963. https://doi.org/10.1109/ICTC46691.2019.8939763
Kodovský J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7:432–444. https://doi.org/10.1109/TIFS.2011.2175919
Kolesnikov A, Beyer L, Zhai X et al (2020) Big transfer (BiT): general visual representation learning. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 12350 LCNS:491–507. https://doi.org/10.1007/978-3-030-58558-7_29
Krizhevsky A (2009) Learning multiple layers of features from tiny images. Master’s thesis, University of Tront
Krizhevsky A, Sutskever I, Hinton GE (2017) ImageNet classification with deep convolutional neural networks. Commun ACM 60:84–90. https://doi.org/10.1145/3065386
Kumar N, Kumar D (2020) Classification using artificial neural network optimized with bat algorithm. Int J Innov Technol Explor Eng 9:696–700. https://doi.org/10.35940/ijitee.c8378.019320
L R, B L (2017) Approaches and methods for steganalysis—a survey. Ijarcce 6:433–438. https://doi.org/10.17148/ijarcce.2017.6678
Laskar SA, Hemachandran K (2014) A review on image steganalysis techniques for attacking steganography. Int J Eng Res Technol 3:3400–3410
LeCun Y, Jackel LD, Bottou L et al (1995) Learning algorithms for classification: a comparison on handwritten digit recognition. Neural Netw Stat Mech Perspect 261:276
Lecun Y, Bottou L, Bengio Y, Ha P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86:1–46
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. 2014 IEEE Int Conf Image Process ICIP 2014 4206–4210. https://doi.org/10.1109/ICIP.2014.7025854
Lin TY, Maire M, Belongie S et al (2014) Microsoft COCO: common objects in context. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 8693:740–755. https://doi.org/10.1007/978-3-319-10602-1_48
Lin Z, Huang Y, Wang J (2018) RNN-SM: fast steganalysis of VoIP streams using recurrent neural network. IEEE Trans Inf Forensics Secur 13:1854–1868. https://doi.org/10.1109/TIFS.2018.2806741
Lipton ZC, Berkowitz J, Elkan C (2015) A critical review of recurrent neural networks for sequence learning. arXiv preprint arXiv:1506.00019
Liu F, Yan X, Lu Y (2020) Feature selection for image steganalysis using binary bat algorithm. IEEE Access 8:4244–4249. https://doi.org/10.1109/ACCESS.2019.2963084
Lubenko I, Ker AD (2012) Steganalysis with mismatched covers. Do simple classifiers help?. In: Proceedings of the on Multimedia and security. pp 11–18
Maeda-Gutiérrez V, Galván-Tejada CE, Zanella-Calzada LA et al (2020) Comparison of convolutional neural network architectures for classification of tomato plant diseases. Appl Sci. https://doi.org/10.3390/app10041245
Marius-Constantin P, Balas VE, Perescu-Popescu L, Mastorakis N (2009) Multilayer perceptron and neural networks. WSEAS Trans Circuits Syst 8:579–588
Ni D, Feng G, Shen L, Zhang X (2019) Selective ensemble classification of image steganalysis via deep Q network. IEEE Signal Process Lett 26:1065–1069. https://doi.org/10.1109/LSP.2019.2913018
Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digit Signal Process A Rev J 20:1758–1770. https://doi.org/10.1016/j.dsp.2010.02.003
Pan Y, Ni J, Su W (2016) Improved uniform embedding for efficient JPEG steganography. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 10039:125–133. https://doi.org/10.1007/978-3-319-48671-0_12
Park JS, Kim HG, Kim DG et al (2018) Paired mini-batch training: a new deep network training for image forensics and steganalysis. Signal Process Image Commun 67:132–139. https://doi.org/10.1016/j.image.2018.04.015
Pathak P, Selvakumar S (2014) Blind Image steganalysis of JPEG images using feature extraction through the process of dilation. Digit Investig 11:67–77. https://doi.org/10.1016/j.diin.2013.12.002
Paulin C, Selouani SA (2016) Hervet E (2016) Speech steganalysis using evolutionary restricted Boltzmann machines. IEEE Congr Evol Comput CEC 2016:4831–4838. https://doi.org/10.1109/CEC.2016.7744409
Pevny T, Bas P, Fridrich J, et al (2010) Steganalysis by Subtractive Pixel Adjacency Matrix To cite this version : HAL Id : hal-00541410 Steganalysis by Subtractive Pixel Adjacency Matrix
Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 6387 LNCS:161–177. https://doi.org/10.1007/978-3-642-16435-4_13
Pham H, Dai Z, Xie Q, Luong M-T, Le QV (2021) Meta pseudo labels. Mach Learn. https://doi.org/10.48550/arXiv.2003.10580
Pibre L, Pasquet J, Ienco D, Chaumont M (2016) Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch. IS T Int Symp Electron Imaging Sci Technol. https://doi.org/10.2352/ISSN.2470-1173.2016.8.MWSF-078
Powell BA (2020) Securing LSB embedding against structural steganalysis. J Computer Secur 30:1–11
Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. Media Watermarking Secur Forensics 9409:94090J. https://doi.org/10.1117/12.2083479
Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. Proc—Int Conf Image Process ICIP 2016-Augus:2752–2756. https://doi.org/10.1109/ICIP.2016.7532860
Qian Y, Dong J, Wang W, Tan T (2018) Feature learning for steganalysis using convolutional neural networks. Multimed Tools Appl 77:19633–19657. https://doi.org/10.1007/s11042-017-5326-1
Rasras R, AlQadi Z, Sara M (2019) A methodology based on steganography and cryptography to protect highly secure messages. Eng Technol Appl Sci Res 9:3681–3684. https://doi.org/10.5281/zenodo.2576230
Ruan F, Zhang X, Zhu D et al (2019) Deep learning for real-time image steganalysis: a survey. J Real-Time Image Process. https://doi.org/10.1007/s11554-019-00915-5
Sabnis SK, Awale RN (2016) Statistical steganalysis of high capacity image steganography with cryptography. Procedia Comput Sci 79:321–327. https://doi.org/10.1016/j.procs.2016.03.042
Sabour S, Frosst N, Hinton GE (2017) Dynamic routing between capsules. Adv Neural Inf Process Syst 2017:3857–3867
Sajid Ansari A, Sajid Mohammadi M, Tanvir Parvez M (2019) A comparative study of recent steganography techniques for multiple image formats. Int J Comput Netw Inf Secur 11:11–25. https://doi.org/10.5815/ijcnis.2019.01.02
Sandler M, Howard A, Zhu M, et al (2018) MobileNetV2: Inverted Residuals and Linear Bottlenecks. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 4510–4520. https://doi.org/10.1109/CVPR.2018.00474
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11:221–234. https://doi.org/10.1109/TIFS.2015.2486744
Sencar HT (2006) Performance study of common image steganography and steganalysis techniques. J Electron Imaging 15:041104. https://doi.org/10.1117/1.2400672
Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. 3rd Int Conf Learn Represent ICLR 2015—Conf Track Proc 1–14
Singh B (2021) Spatial-domain image steganalysis using deep learning techniques
Surse NM, Vinayakray-Jani P (2018) A comparative study on recent image steganography techniques based on DWT. Proc 2017 Int Conf Wirel Commun Signal Process Networking, WiSPNET 2017 2018-Janua:1308–1314. https://doi.org/10.1109/WiSPNET.2017.8299975
Szegedy C, Liu W, Jia Y, et al (2015) Going deeper with convolutions. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 07-12-June:1–9. https://doi.org/10.1109/CVPR.2015.7298594
Szegedy C, Vanhoucke V, Ioffe S, et al (2016) Rethinking the Inception Architecture for Computer Vision. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 2016-Decem:2818–2826. https://doi.org/10.1109/CVPR.2016.308
Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-ResNet and the impact of residual connections on learning. 31st AAAI Conf Artif Intell AAAI 2017 4278–4284
Tabares-Soto R, Ramos-Pollán R, Isaza G, Orozco-Arias S, Ortíz MAB, Arteaga HBA (2020) Digital media steganalysis. In: Digital Media Steganography, Academic Press, pp 259–293, Academic Press
Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. 2014 Asia-Pacific Signal Inf Process Assoc Annu Summit Conf APSIPA 2014. https://doi.org/10.1109/APSIPA.2014.7041565
Taneja K, Taneja H, Kumar K et al (2021) Data science and innovations for intelligent systems. Data Sci Innov Intell Syst. https://doi.org/10.1201/9781003132080/DATA-SCIENCE-INNOVATIONS-INTELLIGENT-SYSTEMS-KAVITA-TANEJA-HARMUNISH-TANEJA-KULDEEP-KUMAR-ARVIND-SELWAL-ENG-LIEH-OUH
Tang YH, Jiang LH, He HQ, Dong WY (2018) A review on deep learning based image steganalysis. Proc 2018 IEEE 3rd Adv Inf Technol Electron Autom Control Conf IAEAC 2018 1764–1770. https://doi.org/10.1109/IAEAC.2018.8577655
Tian J, Li Y (2019) Convolutional neural networks for steganalysis via transfer learning. Int J Pattern Recognit Artif Intell. https://doi.org/10.1142/S0218001419590067
Touvron H, Vedaldi A, Douze M, Jégou H (2019) Fixing the train-test resolution discrepancy. Adv Neural Inf Process Syst 32:1–14
Wang F, Jiang M, Qian C, et al (2017) Residual attention network for image classification. Proc-30th IEEE Conf Comput Vis Pattern Recognition, CVPR 2017 2017-Janua:6450–6458. https://doi.org/10.1109/CVPR.2017.683
Wang J, Sun K, Cheng T et al (2020) Deep high-resolution representation learning for visual recognition. IEEE Trans Pattern Anal Mach Intell 43:3349–3364. https://doi.org/10.1109/tpami.2020.2983686
Westfeld A (2001) F5-a steganographic algorithm high capacity despite better steganalysis. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 2137:289–302
Westfeld A, Pfitzmann A (2000) Attacks on Steganographic Systems. Springer, Berlin, pp 61–76. https://doi.org/10.1007/10719724_5
Woo S, Park J, Lee JY, Kweon IS (2018) CBAM: Convolutional block attention module. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 11211 LNCS:3–19. https://doi.org/10.1007/978-3-030-01234-2_1
Woolley C, Ibrahim A, Hannay P (2017) Building a dataset for image steganography. Proc 15th Aust Digit Forensics Conf ADF 2017 36–45. https://doi.org/10.4225/75/5a83a0541d284
Wu S, Zhong S, Liu Y (2017) Deep residual learning for image steganalysis. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4440-4
Xie C, Tan M, Gong B, et al (2020a) Adversarial examples improve image recognition. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 816–825. https://doi.org/10.1109/CVPR42600.2020.00090
Xie Q, Luong MT, Hovy E, Le Q V. (2020b) Self-training with noisy student improves imagenet classification. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 10684–10695. https://doi.org/10.1109/CVPR42600.2020.01070
Xu G (2017) Deep convolutional neural network to detect J-UNIWARD. IH MMSec 2017—Proc 2017 ACM Work Inf Hiding Multimed Secur 67–73. https://doi.org/10.1145/3082031.3083236
Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23:708–712. https://doi.org/10.1109/LSP.2016.2548421
Yang J, Liu K, Kang X, Wong E, Shi Y (2017) Steganalysis based on awareness of selection-channel and deep learning. In: Digital forensics and watermarking: 16th international workshop, IWDW 2017, Magdeburg, Germany, August 23–25, 2017, Proceedings 16, Springer, pp 263–272
Yang Z, Wang K, Li J et al (2019) TS-RNN: text steganalysis based on recurrent neural networks. IEEE Signal Process Lett 26:1743–1747. https://doi.org/10.1109/LSP.2019.2920452
Yang H, Bao Y, Yang Z, et al (2020) Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid. IH MMSec 2020—Proc 2020 ACM Work Inf Hiding Multimed Secur 5–10. https://doi.org/10.1145/3369412.3395067
Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12:2545–2557. https://doi.org/10.1109/TIFS.2017.2710946
Yedroudj M, Comby F, Chaumont M (2018) Yedroudj-Net: An Efficient CNN for Spatial Steganalysis. ICASSP, IEEE Int Conf Acoust Speech Signal Process-Proc 2018-April:2092–2096. https://doi.org/10.1109/ICASSP.2018.8461438
Young P, Lai A, Hodosh M, Hockenmaier J (2014) From image descriptions to visual denotations. Trans Assoc Comput Linguist 2:67–78
Zeiler MD, Fergus R (2014) Visualizing and understanding convolutional networks. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 8689 LNCS:818–833. https://doi.org/10.1007/978-3-319-10590-1_53
Zeng J, Tan S, Li B, Huang J (2018) Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Trans Inf Forensics Secur 13:1200–1214. https://doi.org/10.1109/TIFS.2017.2779446
Zhang X, Li Z, Loy CC, Lin D (2017) PolyNet: A pursuit of structural diversity in very deep networks. Proc-30th IEEE Conf Comput Vis Pattern Recognition, CVPR 2017 2017-Janua:3900–3908. https://doi.org/10.1109/CVPR.2017.415
Zhang R, Zhu F, Liu J, Liu G (2018) Efficient feature learning and multi-size image steganalysis based on CNN. 1–10
Zheng L, Zhang Y, Thing VLL (2018) Understanding multi-layer perceptrons on spatial image steganalysis features. Proc-9th Asia-Pacific Signal Inf Process Assoc Annu Summit Conf APSIPA ASC 2017 2018-Febru:1035–1039. https://doi.org/10.1109/APSIPA.2017.8282181
Zou Y, Zhang G, Liu L (2019) Research on image steganography analysis based on deep learning. J vis Commun Image Represent 60:266–275. https://doi.org/10.1016/j.jvcir.2019.02.034
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they do not have any conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Farooq, N., Selwal, A. Image steganalysis using deep learning: a systematic review and open research challenges. J Ambient Intell Human Comput 14, 7761–7793 (2023). https://doi.org/10.1007/s12652-023-04591-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-023-04591-z