Skip to main content
Log in

Deep Clustering Network for Steganographer Detection Using Latent Features Extracted from a Novel Convolutional Autoencoder

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

Abstract

Steganography is typically used by law enforcement agencies to prevent unauthorized persons from becoming aware of the existence of a message communicated by military or other government organizations outside their network. Illegal uses of steganography such as fraud, gambling, criminal communications, hacking, electronic payments, harassment, offenses on intellectual property and viruses pose a great threat to society. Such illicit steganographers communicate with each other through stego files to exchange their plan without getting noticed by law enforcement. This paper presents a novel Deep Clustering Network for Steganographer Detection (DCNSD) based on convolutional autoencoders and a clustering model for identifying such steganographers since plenty of digital images are transferred over the internet that could carry hidden secret messages. Mostly the existing techniques involving deep learning networks for steganographer detection involves supervised learning approach which makes them unsuitable for real-world deployment. The foremost characteristic of this proposed network lies in its ability to segregate images transmitted from a steganographer from those innocent users’ images in an unsupervised approach. Thereby making the proposed DCNSD system plausible for real-world deployment. Based on the experimental results, it is shown that the proposed DCNSD framework excels in detecting steganographers who use content-adaptive steganography to embed secrets with 100% accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ker AD (2007) Batch steganography and pooled steganalysis. In: Camenisch JL, Collberg CS, Johnson NF, Sallee P (eds) Information hiding. IH 2006. Lecture notes in computer science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_18

    Chapter  Google Scholar 

  2. Pevny T, Fridrich J (2008) Multiclass detector of current steganographic methods for JPEG format. IEEE Trans Inform Forensic Secur 3:635–650. https://doi.org/10.1109/TIFS.2008.2002936

    Article  Google Scholar 

  3. Ker AD, Pevny T (2014) The Steganographer is the Outlier: Realistic Large-Scale Steganalysis. IEEE Trans Inform Forensic Secur 9:1424–1435. https://doi.org/10.1109/TIFS.2014.2336380

    Article  Google Scholar 

  4. Zheng M, Zhong S, Wu S, Jiang J (2017) Steganographer detection via deep residual network. In: 2017 IEEE international conference on multimedia and expo (ICME). IEEE, Hong Kong, pp 235–240

  5. Zheng M, Zhong S, Wu S, Jiang J (2018) Steganographer detection based on multiclass dilated residual networks. In: Proceedings of the 2018 ACM on international conference on multimedia retrieval. ACM, Yokohama Japan, pp 300–308

  6. Zheng M, Jiang J, Wu S et al (2019) Content-adaptive selective steganographer detection via embedding probability estimation deep networks. Neurocomputing 365:336–348. https://doi.org/10.1016/j.neucom.2019.07.068

    Article  Google Scholar 

  7. Zhang Z, Zheng M, Zhong S, Liu Y (2020) Steganographer detection via enhancement-aware graph convolutional network. In: 2020 IEEE international conference on multimedia and expo (ICME). IEEE, London, United Kingdom, pp 1–6

  8. Zhang Z, Zheng M, Zhong S, Liu Y (2021) Steganographer detection via a similarity accumulation graph convolutional network. Neural Netw 136:97–111. https://doi.org/10.1016/j.neunet.2020.12.026

    Article  Google Scholar 

  9. Guo X, Liu X, Zhu E, Yin J (2017) Deep clustering with convolutional autoencoders. In: Liu D, Xie S, Li Y, Zhao D, El-Alfy ES (eds) Neural Information Processing. ICONIP 2017. Lecture Notes in Computer Science, vol 10635. Springer, Cham

    Google Scholar 

  10. Luo W, Li J, Yang J et al (2017) Convolutional sparse autoencoders for image classification. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2017.2712793

    Article  Google Scholar 

  11. Défossez A, Bottou L, Bach F, Usunier N (2020) A Simple Convergence Proof of Adam and Adagrad. http://arxiv.org/abs/2003.02395 [cs, stat]

  12. Arthur D, Vassilvitskii S (2007) k-means++: the advantages of careful seeding, SODA '07: Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, pp 1027–1035

  13. Gretton A, Borgwardt KM, Rasch M et al (2006) A Kernel Method for the Two-Sample-Problem. In: Proceedings of the advances in neural information processing systems conference. https://doi.org/10.7551/mitpress/7503.001.0001

  14. Bas P, Filler T, Pevný T (2011) ”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS. In: Filler T, Pevný T, Craver S, Ker A (eds) Information hiding. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 59–70

    Chapter  Google Scholar 

  15. Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inform Forensic Secur 5:705–720. https://doi.org/10.1109/TIFS.2010.2077629

    Article  Google Scholar 

  16. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, Costa Adeje—Tenerife, Spain, pp 234–239

  17. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security—IH&MMSec ’13. ACM Press, Montpellier, France, p 59

  18. Hämäläinen J, Kärkkäinen T, Rossi T (2020) Improving scalable K-means++. Algorithms 14:6. https://doi.org/10.3390/a14010006

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors would like to thank Management and Principal of Mepco Schlenk Engineering College, Sivakasi for providing the necessary facilities and support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Amrutha.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Amrutha, E., Arivazhagan, S. & Jebarani, W.S.L. Deep Clustering Network for Steganographer Detection Using Latent Features Extracted from a Novel Convolutional Autoencoder. Neural Process Lett 55, 2953–2964 (2023). https://doi.org/10.1007/s11063-022-10992-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-022-10992-6

Keywords

Navigation