A Preprocessing by Using Multiple Steganography for Intentional Image Downsampling on CNN-Based Steganalysis

被引:4
作者
Kato, Hiroya [1 ]
Osuge, Kyohei [1 ]
Haruta, Shuichiro [1 ]
Sasase, Iwao [1 ]
机构
[1] Keio Univ, Dept Informat & Comp Sci, Fac Sci & Technol, Yokohama, Kanagawa 2238522, Japan
关键词
Feature extraction; Training; Terrorism; Transform coding; Convolutional neural networks; Deep learning; Steganalysis; deep learning; image downsampling; convolutional neural networks; INTERPOLATION;
D O I
10.1109/ACCESS.2020.3033814
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There exists a need of image steganalysis which reveals whether steganographic signals are embedded in an image to improve information security. Among various steganalysis, Convolutional Neural Networks (CNN) based steganalysis is promising since it can automatically learn the features of diverse steganographic algorithms. However, the detection performance of CNN is degraded when an image is intentionally resized by the nearest-neighbor interpolation before steganography. This is because spatial frequency in a resized image gets high, which disturbs the training. In order to overcome this shortcoming, in this article, we propose a preprocessing by using multiple steganography for intentional image downsampling on CNN-based steganalysis. In the proposed preprocessing, steganographic signals are additionally embedded into both resized original images and resized steganographic ones with the same embedding key since difference of spatial frequencies between them gets obvious, which helps CNN learn features. The reason why the difference gets obvious is that steganographic signals tend to be continuously embedded into same pixels in resized images when they are additionally embedded. Thus, by training resized images after the proposed preprocessing, the detection performance can be improved. Since the proposed preprocessing is very simple, it does not greatly increase the training time of CNN. Our evaluation shows accuracy in a model with the proposed preprocessing is up to 34.8% higher than that in the conventional model when the same steganography is additionally embedded. Besides, we also show that the proposed preprocessing yields up to 23.1% higher accuracy compared with the conventional one even when another steganography is additionally embedded.
引用
收藏
页码:195578 / 195593
页数:16
相关论文
共 34 条
[1]  
Bak P, 2018, 2018 4TH INTERNATIONAL CONFERENCE ON FRONTIERS OF SIGNAL PROCESSING (ICFSP 2018), P34, DOI 10.1109/ICFSP.2018.8552057
[2]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[3]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[4]   A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[5]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[6]  
Choudhary K., 2012, IOSR J COMPUT ENG, V3, P1
[7]   Ensemble methods in machine learning [J].
Dietterich, TG .
MULTIPLE CLASSIFIER SYSTEMS, 2000, 1857 :1-15
[8]   Gibbs Construction in Steganography [J].
Filler, Tomas ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :705-720
[9]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[10]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778