A New Convolutional Neural Network-Based Steganalysis Method for Content-Adaptive Image Steganography in the Spatial Domain

被引:10
作者
Xiang, Zhili [1 ,2 ]
Sang, Jun [1 ,2 ]
Zhang, Qian [1 ,2 ]
Cai, Bin [1 ,2 ]
Xia, Xiaofeng [1 ,2 ]
Wu, Weiqun [1 ,2 ]
机构
[1] Chongqing Univ, Key Lab Dependable Serv Comp, Cyber Phys Soc, Minist Educ, Chongqing 400044, Peoples R China
[2] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 401331, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Content-adaptive image steganography; convolutional neural networks; local information; steganalysis; spatial domain;
D O I
10.1109/ACCESS.2020.2978110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Convolutional neural network-based methods are attracting increasing attention in steganalysis. However, steganalysis for content-adaptive image steganography in the spatial domain is still a difficult problem. In this paper, a new convolutional neural network-based steganalysis approach was proposed with two contributions. 1) By adding more convolutional layers in the lower part of the model, we proposed a new arrangement of convolutional layers and pooling layers, which can process the local information better than the existing CNN models in steganalysis. 2) By adding the global average pooling layer before the softmax layer instead of using global average pooling before the fully connected layer, the global average pooling was placed in a better position for steganalysis. Two state-of-the-art steganographic algorithms in the spatial domain, namely, WOW and S-UNIWARD, were used to evaluate the effectiveness of our model. The experimental results on BOSSbase showed that the proposed CNN could obtain better steganalysis performance than YeNet across all tested algorithms when the payloads were 0.2, 0.3, and 0.4 bpp.
引用
收藏
页码:47013 / 47020
页数:8
相关论文
共 34 条
  • [1] [Anonymous], 2016, P 4 ACM WORKSH INF H, DOI DOI 10.1145/2909827.2930798
  • [2] [Anonymous], 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, DOI [10.1109/APSIPA.2014.7041565, 10.1109/APSIPA.2014]
  • [3] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [4] JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images
    Chen, Mo
    Sedighi, Vahid
    Boroumand, Mehdi
    Fridrich, Jessica
    [J]. IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, : 75 - 84
  • [5] Couchot J., 2017, P IFIP INT C ICT SYS, P327
  • [6] Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
    Filler, Tomas
    Judas, Jan
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 920 - 935
  • [7] Rich Models for Steganalysis of Digital Images
    Fridrich, Jessica
    Kodovsky, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 868 - 882
  • [8] Glorot X., 2010, P 13 INT C ARTIFICIA, P249, DOI DOI 10.1109/LGRS.2016.2565705
  • [9] Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
  • [10] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778