Abstract
Steganography is typically used by law enforcement agencies to prevent unauthorized persons from becoming aware of the existence of a message communicated by military or other government organizations outside their network. Illegal uses of steganography such as fraud, gambling, criminal communications, hacking, electronic payments, harassment, offenses on intellectual property and viruses pose a great threat to society. Such illicit steganographers communicate with each other through stego files to exchange their plan without getting noticed by law enforcement. This paper presents a novel Deep Clustering Network for Steganographer Detection (DCNSD) based on convolutional autoencoders and a clustering model for identifying such steganographers since plenty of digital images are transferred over the internet that could carry hidden secret messages. Mostly the existing techniques involving deep learning networks for steganographer detection involves supervised learning approach which makes them unsuitable for real-world deployment. The foremost characteristic of this proposed network lies in its ability to segregate images transmitted from a steganographer from those innocent users’ images in an unsupervised approach. Thereby making the proposed DCNSD system plausible for real-world deployment. Based on the experimental results, it is shown that the proposed DCNSD framework excels in detecting steganographers who use content-adaptive steganography to embed secrets with 100% accuracy.
Similar content being viewed by others
References
Ker AD (2007) Batch steganography and pooled steganalysis. In: Camenisch JL, Collberg CS, Johnson NF, Sallee P (eds) Information hiding. IH 2006. Lecture notes in computer science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_18
Pevny T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Trans Inform Forensic Secur 3:635–650. https://doi.org/10.1109/TIFS.2008.2002936
Ker AD, Pevny T (2014) The Steganographer is the Outlier: Realistic Large-Scale Steganalysis. IEEE Trans Inform Forensic Secur 9:1424–1435. https://doi.org/10.1109/TIFS.2014.2336380
Zheng M, Zhong S, Wu S, Jiang J (2017) Steganographer detection via deep residual network. In: 2017 IEEE international conference on multimedia and expo (ICME). IEEE, Hong Kong, pp 235–240
Zheng M, Zhong S, Wu S, Jiang J (2018) Steganographer detection based on multiclass dilated residual networks. In: Proceedings of the 2018 ACM on international conference on multimedia retrieval. ACM, Yokohama Japan, pp 300–308
Zheng M, Jiang J, Wu S et al (2019) Content-adaptive selective steganographer detection via embedding probability estimation deep networks. Neurocomputing 365:336–348. https://doi.org/10.1016/j.neucom.2019.07.068
Zhang Z, Zheng M, Zhong S, Liu Y (2020) Steganographer detection via enhancement-aware graph convolutional network. In: 2020 IEEE international conference on multimedia and expo (ICME). IEEE, London, United Kingdom, pp 1–6
Zhang Z, Zheng M, Zhong S, Liu Y (2021) Steganographer detection via a similarity accumulation graph convolutional network. Neural Netw 136:97–111. https://doi.org/10.1016/j.neunet.2020.12.026
Guo X, Liu X, Zhu E, Yin J (2017) Deep clustering with convolutional autoencoders. In: Liu D, Xie S, Li Y, Zhao D, El-Alfy ES (eds) Neural Information Processing. ICONIP 2017. Lecture Notes in Computer Science, vol 10635. Springer, Cham
Luo W, Li J, Yang J et al (2017) Convolutional sparse autoencoders for image classification. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2017.2712793
Défossez A, Bottou L, Bach F, Usunier N (2020) A Simple Convergence Proof of Adam and Adagrad. http://arxiv.org/abs/2003.02395 [cs, stat]
Arthur D, Vassilvitskii S (2007) k-means++: the advantages of careful seeding, SODA '07: Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, pp 1027–1035
Gretton A, Borgwardt KM, Rasch M et al (2006) A Kernel Method for the Two-Sample-Problem. In: Proceedings of the advances in neural information processing systems conference. https://doi.org/10.7551/mitpress/7503.001.0001
Bas P, Filler T, Pevný T (2011) ”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS. In: Filler T, Pevný T, Craver S, Ker A (eds) Information hiding. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 59–70
Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inform Forensic Secur 5:705–720. https://doi.org/10.1109/TIFS.2010.2077629
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, Costa Adeje—Tenerife, Spain, pp 234–239
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security—IH&MMSec ’13. ACM Press, Montpellier, France, p 59
Hämäläinen J, Kärkkäinen T, Rossi T (2020) Improving scalable K-means++. Algorithms 14:6. https://doi.org/10.3390/a14010006
Acknowledgements
The authors would like to thank Management and Principal of Mepco Schlenk Engineering College, Sivakasi for providing the necessary facilities and support to carry out this research work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Amrutha, E., Arivazhagan, S. & Jebarani, W.S.L. Deep Clustering Network for Steganographer Detection Using Latent Features Extracted from a Novel Convolutional Autoencoder. Neural Process Lett 55, 2953–2964 (2023). https://doi.org/10.1007/s11063-022-10992-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11063-022-10992-6