IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel

被引:8
作者
Jin, Zhujun [1 ,2 ]
Yang, Yu [1 ,2 ]
Chen, Yuling [1 ]
Chen, Yuwei [2 ]
机构
[1] Guizhou Univ, State Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing, Peoples R China
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2020年 / 16卷 / 03期
基金
中国国家自然科学基金;
关键词
Steganalysis; convolutional neural networks; selection channel; adaptive steganalysis; lightweight network; deep learning;
D O I
10.1177/1550147720911002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography. Nowadays, steganalysis based on deep learning generally has a large number of parameters, and its pertinence to adaptive steganography algorithms is weak. In this article, we propose a lightweight convolutional neural network named IAS-CNN which targets to image adaptive steganalysis. To solve the limitation of manually designing residual extraction filters, we adopt the method of self-learning filter in the network. That is, a high-pass filter in spatial rich model is applied to initialize the weights of the first layer and then these weights are updated through the backpropagation of the network. In addition, the knowledge of selection channel is incorporated into IAS-CNN to enhance residuals in regions that have a high probability for steganography by inputting embedding probability maps into IAS-CNN. Also, IAS-CNN is designed as a lightweight network to reduce the consumption of resources and improve the speed of processing. Experimental results show that IAS-CNN performs well in steganalysis. IAS-CNN not only has similar performance with YedroudjNet in S-UNIWARD steganalysis but also has fewer parameters and convolutional computations.
引用
收藏
页数:9
相关论文
共 21 条
  • [1] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [2] Xception: Deep Learning with Depthwise Separable Convolutions
    Chollet, Francois
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 1800 - 1807
  • [3] Denemark T., 2016, Electronic imaging, V2016, P1, DOI 10.2352/ISSN.2470-1173.2016.8.MWSF-080
  • [4] Denemark T, 2014, IEEE INT WORKS INFOR, P48, DOI 10.1109/WIFS.2014.7084302
  • [5] Detecting LSB steganography in color and gray-scale images
    Fridrich, J.
    Goljan, M.
    Du, R.
    [J]. IEEE Multimedia, 2001, 8 (04) : 22 - 28
  • [6] Rich Models for Steganalysis of Digital Images
    Fridrich, Jessica
    Kodovsky, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 868 - 882
  • [7] Glorot X., 2010, JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P JMLR WORKSHOP C P, P249, DOI DOI 10.1007/BFB0056905
  • [8] He KM, 2014, LECT NOTES COMPUT SC, V8691, P346, DOI [arXiv:1406.4729, 10.1007/978-3-319-10578-9_23]
  • [9] Hinton G. E., 2012, ARXIV12070580
  • [10] Universal distortion function for steganography in an arbitrary domain
    Holub, Vojtech
    Fridrich, Jessica
    Denemark, Tomas
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)