Abstract
The goal of steganalysis is to unearth a concealed message hidden inside an innocent carrier by steganography. Steganography in the hands of unlawful people can pose a great threat to society. Secret message is embedded as a noise (residue) which silently disrupts the statistical nature of the carrier without visual transformation. For the purpose of unearthing covert communication, modeling this noise (residue) is a crucial factor. In this paper, a hybrid deep learning framework is proposed with convolutional neural network (CNN) to emphasize the need for residual based investigation for digital image steganalysis. In order to model the noise residuals, five types of handcrafted features are extracted, in which the first four types rely on acquiring noise residuals based on filtering by linear and nonlinear filters, and the fifth type relies on residual acquisition method based on Empirical Mode Decomposition (EMD). The extracted features are categorized using a robust CNN with a new parallel architecture that is capable of learning intricate details from input features to classify it as cover or stego. Mostly CNNs are trained with raw images, but in the proposed method, the 1-dimensional residual features are stacked into 2-dimensional grid and are then used to train the CNN. Three spatial content-adaptive and four spatial non-content-adaptive algorithms are used to evaluate the performance of the proposed architecture. The experimental results show the versatility and robustness of the proposed hybrid architecture towards these algorithms when compared to existing state-of-the-art steganalytic methods. A practical issue prevalent in deploying steganalysis in real-world is ‘mismatch scenario,’ and based on the experimentation done in this paper, the proposed architecture performs well under stego algorithm mismatch and payload mismatch scenarios.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Sencar HT, Mahalingam R, Akansu AN (2004) Data hiding fundamentals and applications: content security in digital media. Elsevier Academic Press, Amsterdam, Boston
Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge, New York
Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digital Signal Process 20:1758–1770. https://doi.org/10.1016/j.dsp.2010.02.003
Fridrich J, Lisoněk P, Soukal D (2007) On Steganographic embedding efficiency. In: Camenisch JL, Collberg CS, Johnson NF, Sallee P (eds) Information Hiding. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 282–296
Arivazhagan S, Sylvia Lilly Jebarani W, Keerthinathan S (2015) Extended Adaptive Pixel Pair Matching for data hiding in medical images. Journal of Intelligent & Fuzzy Systems: 877–883. https://doi.org/https://doi.org/10.3233/IFS-151617
Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inform Security 2009:1–9. https://doi.org/10.1155/2009/658047
Filler T, Fridrich J (2010) Gibbs Construction in Steganography. IEEE Trans Inform Forensic Secur 5:705–720. https://doi.org/10.1109/TIFS.2010.2077629
Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on information hiding and multimedia security—IH&MMSec ’13. ACM Press, Montpellier, France, p 59
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, Costa Adeje—Tenerife, Spain, pp 234–239
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE international conference on image processing (ICIP). IEEE, Paris, France, pp 4206–4210
Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forensic Secur 11:221–234. https://doi.org/10.1109/TIFS.2015.2486744
Fridrich J, Pevný T, and Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on multimedia & security (MM&Sec ’07). Association for Computing Machinery, New York, NY, USA, 3–14. https://doi.org/https://doi.org/10.1145/1288869.1288872
Solanki K, Sarkar A, Manjunath B (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Lect Notes Comput Sci 2939:16–31. https://doi.org/10.1007/978-3-540-77370-2_2
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J on Info Security 2014:1. https://doi.org/10.1186/1687-417X-2014-1
Guo, Linjie & Ni, Jiangqun & Shi, Y.Q. (2014) Uniform embedding for efficient JPEG steganography. I IEEE Trans Inform Forensic Secur 9. 814–825. https://doi.org/10.1109/TIFS.2014.2312817.
Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans Inf Forensics Security 10(12):2669–2680
Doshi R, Jain P, Gupta L (2012) Steganography and Its Applications in Security. International Journal of Modern Engineering Research, 4634–4638.
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forensic Secur 7:868–882. https://doi.org/10.1109/TIFS.2012.2190402
Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensic Secur 7:432–444. https://doi.org/10.1109/TIFS.2011.2175919
Arivazhagan S, Sylvia Lilly Jebarani W, Veena ST, Shanmugaraj M (2015) A novel low-d feature based generic steganalyzer to detect low volume payloads. Indian J Sci Technol 8. https://doi.org/10.17485/ijst/2015/v8i24/79991
Arivazhagan S, Jebarani WSL, Veena ST (2016) Enormity of low volume blind steganalysis in clean and uncompressed image formats. 2016 International conference on circuit, power and computing technologies (ICCPCT). IEEE, Nagercoil, pp 1–7
Yu J, Zhang X, Li F (2016) Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multimed Tools Appl 75:13613–13625. https://doi.org/10.1007/s11042-015-2742-y
Yu J, Li F, Cheng H, Zhang X (2016) Spatial steganalysis using contrast of residuals. IEEE Signal Process Lett 23:989–992. https://doi.org/10.1109/LSP.2016.2575100
Lu J, Zhou G, Yang C, et al (2019) Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection. IEEE Access 7:21702–21711. https://doi.org/10.1109/ACCESS.2019.2896781
Pibre L, Pasquet J, Ienco D, Chaumont M (2016) Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch. Electronic Imaging 2016:1–11. https://doi.org/10.2352/ISSN.2470-1173.2016.8.MWSF-078
Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific. IEEE, Chiang Mai, Thailand, pp 1–4
Xu G, Wu H-Z, Shi Y-Q (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23:708–712. https://doi.org/10.1109/LSP.2016.2548421
Qian Y, Dong J, Wang W, Tan T (2016) Learning representations for steganalysis from regularized CNN model with auxiliary tasks. In: Liang Q, Mu J, Wang W, Zhang B (eds) Proceedings of the 2015 international conference on communications, signal processing, and systems. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 629–637
Wu S, Zhong S, Liu Y (2017) Residual convolution network based steganalysis with adaptive content suppression. 2017 IEEE international conference on multimedia and expo (ICME). IEEE, Hong Kong, Hong Kong, pp 241–246
Wu S, Zhong S, Liu Y (2018) Deep residual learning for image steganalysis. Multimed Tools Appl 77:10437–10453. https://doi.org/10.1007/s11042-017-4440-4
Qian Y, Dong J, Wang W, Tan T (2018) Feature learning for steganalysis using convolutional neural networks. Multimed Tools Appl 77:19633–19657. https://doi.org/10.1007/s11042-017-5326-1
Wu S, Zhong S, Liu Y (2020) A novel convolutional neural network for image steganalysis with shared normalization. IEEE Trans Multimedia 22:256–270. https://doi.org/10.1109/TMM.2019.2920605
Kim J, Park H, Park J-I (2020) CNN-based image steganalysis using additional data embedding. Multimed Tools Appl 79:1355–1372. https://doi.org/10.1007/s11042-019-08251-3
Zhang R, Zhu F, Liu J, Liu G (2020) Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE TransInformForensic Secur 15:1138–1150. https://doi.org/10.1109/TIFS.2019.2936913
Sicuranza GL (2000) Polynomial filters for image and video processing. In: IWISPA 2000. Proceedings of the First International Workshop on Image and Signal Processing and Analysis. in conjunction with 22nd International conference on information technology interfaces. (IEEE Cat. No.00EX437). Univ. Zagreb, Pula, Croatia, pp 15–26
Huang NE et al (1998), The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. In: Proceedings of the royal society london a—mathematical, physical & engineering sciences, vol. A454, pp 903–995.
Huang S, Zhang Y, Liu Z (2016) Image feature extraction and analysis based on empirical mode decomposition. In: 2016 IEEE advanced information management, communicates, electronic and automation control conference (IMCEC). IEEE, Xi’an, China, pp 615–619
Tan S, Huang J, Shi YQ (2008) Steganalysis of enhanced BPCS steganography using the hilbert-huang transform based sequential analysis. In: Shi YQ, Kim H-J, Katzenbeisser S (eds) Digital watermarking. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 112–126
Goodfellow I, Bengio Y, Courville, (2016) Deep Learning. MIT Press, Cambridge, MA, USA
Rosenblatt F (1958) The perceptron: a probabilistic model for information storage and organization in the brain. Psychol Rev 65:386–408
Bas P, Filler T, and Pevný T (2011) Break our steganographic system: the ins and outs of organizing BOSS, Information Hiding, Czech Republic, IH 2011. Lecture Notes in Computer Science, vol. 6958, Springer, Berlin, Heidelbergpp. pp. 59–70, DOI: https://doi.org/10.1007/978-3-642-24178-9_5.
Steganographic Algorithms. http://dde.binghamton. edu/download/stego_algorithms/. Accessed 31 July 2020
Veena ST, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105:39–49. https://doi.org/10.1016/j.patrec.2017.08.016
Zhang R, Zhu F, Liu J, Liu G (2018) Efficient feature learning and multi-size image steganalysis based on CNN. arXiv: 180711428 [cs]
Wang Z, Chen M, Yang Y, et al (2020) Joint multi-domain feature learning for image steganalysis based on CNN. In Review
Quach T-T (2011) Optimal cover estimation methods and steganographic payload location. IEEE Trans Inform Forensic Secur 6:1214–1222. https://doi.org/10.1109/TIFS.2011.2160855
Holub V, Fridrich J, Denemark T (2013) Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Alattar AM, Memon ND, Heitzenrater CD (eds) Burlingame. California, USA, p 86650L
Denemark T, Sedighi V, Holub V et al (2014) Selection-channel-aware rich model for steganalysis of digital images. 2014 IEEE international workshop on information forensics and security (WIFS). IEEE, Atlanta, GA, USA, pp 48–53
Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forensic Secur 12:2545–2557. https://doi.org/10.1109/TIFS.2017.2710946
Yu X, Tan H, Liang H (2018) A Multi-Task Learning CNN for Image Steganalysis, A Multi-Task Learning CNN for Image Steganalysis, In: IEEE international workshop on information forensics and security (WIFS), Hong Kong, Hong Kong, 2018, pp 1–7, doi: https://doi.org/10.1109/WIFS.2018.8630766.
Ruan F, Zhang X, Zhu D, et al (2020) Deep learning for real-time image steganalysis: a survey. J Real-Time Image Proc 17:149–160. https://doi.org/10.1007/s11554-019-00915-5
Acknowledgements
The authors would like to thank ER & IPR—DRDO New Delhi, Management and Principal of Mepco Schlenk Engineering College, Sivakasi for providing the necessary facilities and support to carry out this research work. The authors would like to express their gratitude to the anonymous reviewers for their insightful comments and suggestions.
Funding
The work presented in this paper was funded by Directorate of Extramural Research & Intellectual Property Rights (ER & IPR), Defence Research Development Organization (DRDO), Ministry of Defence, Government of India under Grant No. ERIP/ER/201702007/M/01/1733. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of Indian Government.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Arivazhagan, S., Amrutha, E., Sylvia Lilly Jebarani, W. et al. Hybrid convolutional neural network architecture driven by residual features for steganalysis of spatial steganographic algorithms. Neural Comput & Applic 33, 11465–11485 (2021). https://doi.org/10.1007/s00521-021-05837-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-021-05837-7