Learning selection channels for image steganalysis in spatial domain

被引:19
作者
Ren, Weixiang [1 ,2 ]
Zhai, Liming [1 ,2 ]
Jia, Ju [1 ,2 ]
Wang, Lina [1 ,2 ]
Zhang, Lefei [3 ]
机构
[1] Wuhan Univ, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[3] Wuhan Univ, Sch Comp Sci, Wuhan 430072, Peoples R China
关键词
Steganalysis; Selection channel; Deep learning; Convolutional neural network; STEGANOGRAPHY;
D O I
10.1016/j.neucom.2020.02.105
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced steganography modifies the complex regions of digital media to embed secret messages, while steganalysis aims to detect whether the digital media contains secret messages or not. It is well recognized that the content adaptivity which adopted in steganography should also be considered for steganalysis to improve detection accuracy, and thus the embedding locations are weighted (so called selection channel) to build steganalytic detectors. However, the existing selection channels incorporated into steganalysis are all manually designed and keep constant even in the whole training stage of deep learning based steganalysis. Therefore, the handcrafted and fixed selection channels leave much room for improvement in steganalysis. In this paper, we propose to learn the selection channels in an end-to-end manner. Our steganalytic scheme has two parts: selection channel network and steganalysis network. These two networks are trained together. The selection channel network learns and outs the selection channels for the steganalysis network, and the steganalysis network integrated with the learned selection channels predicts the final steganalysis results. Our experiments under various conditions show that the learned selection channels considerably improve the detection accuracy of steganalytic schemes against content-adaptive steganography, and also exhibit high universality and robustness in real-world environments. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:78 / 90
页数:13
相关论文
共 43 条
  • [1] [Anonymous], BOWS BREAK OUR WATER
  • [2] [Anonymous], 2012, ADADELTA ADAPTIVE LE
  • [3] [Anonymous], PROC CVPR IEEE
  • [4] [Anonymous], 2013, P ACM WORKSH INF HID
  • [5] [Anonymous], 2016, P 4 ACM WORKSH INF H, DOI DOI 10.1145/2909827.2930798
  • [6] [Anonymous], 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, DOI [10.1109/APSIPA.2014.7041565, 10.1109/APSIPA.2014]
  • [7] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [8] Applications of Explicit Non-Linear Feature Maps in Steganalysis
    Boroumand, Mehdi
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 823 - 833
  • [9] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [10] Defining Cost Functions for Adaptive JPEG Steganography at the Microscale
    Chen, Kejiang
    Zhou, Hang
    Zhou, Wenbo
    Zhang, Weiming
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 1052 - 1066