Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Hybrid convolutional neural network architecture driven by residual features for steganalysis of spatial steganographic algorithms

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The goal of steganalysis is to unearth a concealed message hidden inside an innocent carrier by steganography. Steganography in the hands of unlawful people can pose a great threat to society. Secret message is embedded as a noise (residue) which silently disrupts the statistical nature of the carrier without visual transformation. For the purpose of unearthing covert communication, modeling this noise (residue) is a crucial factor. In this paper, a hybrid deep learning framework is proposed with convolutional neural network (CNN) to emphasize the need for residual based investigation for digital image steganalysis. In order to model the noise residuals, five types of handcrafted features are extracted, in which the first four types rely on acquiring noise residuals based on filtering by linear and nonlinear filters, and the fifth type relies on residual acquisition method based on Empirical Mode Decomposition (EMD). The extracted features are categorized using a robust CNN with a new parallel architecture that is capable of learning intricate details from input features to classify it as cover or stego. Mostly CNNs are trained with raw images, but in the proposed method, the 1-dimensional residual features are stacked into 2-dimensional grid and are then used to train the CNN. Three spatial content-adaptive and four spatial non-content-adaptive algorithms are used to evaluate the performance of the proposed architecture. The experimental results show the versatility and robustness of the proposed hybrid architecture towards these algorithms when compared to existing state-of-the-art steganalytic methods. A practical issue prevalent in deploying steganalysis in real-world is ‘mismatch scenario,’ and based on the experimentation done in this paper, the proposed architecture performs well under stego algorithm mismatch and payload mismatch scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Sencar HT, Mahalingam R, Akansu AN (2004) Data hiding fundamentals and applications: content security in digital media. Elsevier Academic Press, Amsterdam, Boston

    MATH  Google Scholar 

  2. Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge, New York

    MATH  Google Scholar 

  3. Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digital Signal Process 20:1758–1770. https://doi.org/10.1016/j.dsp.2010.02.003

    Article  Google Scholar 

  4. Fridrich J, Lisoněk P, Soukal D (2007) On Steganographic embedding efficiency. In: Camenisch JL, Collberg CS, Johnson NF, Sallee P (eds) Information Hiding. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 282–296

    Chapter  Google Scholar 

  5. Arivazhagan S, Sylvia Lilly Jebarani W, Keerthinathan S (2015) Extended Adaptive Pixel Pair Matching for data hiding in medical images. Journal of Intelligent & Fuzzy Systems: 877–883. https://doi.org/https://doi.org/10.3233/IFS-151617

  6. Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inform Security 2009:1–9. https://doi.org/10.1155/2009/658047

    Article  Google Scholar 

  7. Filler T, Fridrich J (2010) Gibbs Construction in Steganography. IEEE Trans Inform Forensic Secur 5:705–720. https://doi.org/10.1109/TIFS.2010.2077629

    Article  Google Scholar 

  8. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on information hiding and multimedia security—IH&MMSec ’13. ACM Press, Montpellier, France, p 59

  9. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE international workshop on information forensics and security (WIFS). IEEE, Costa Adeje—Tenerife, Spain, pp 234–239

  10. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE international conference on image processing (ICIP). IEEE, Paris, France, pp 4206–4210

  11. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forensic Secur 11:221–234. https://doi.org/10.1109/TIFS.2015.2486744

    Article  Google Scholar 

  12. Fridrich J, Pevný T, and Kodovský J (2007) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on multimedia & security (MM&Sec ’07). Association for Computing Machinery, New York, NY, USA, 3–14. https://doi.org/https://doi.org/10.1145/1288869.1288872

  13. Solanki K, Sarkar A, Manjunath B (2007) YASS: yet another steganographic scheme that resists blind steganalysis. Lect Notes Comput Sci 2939:16–31. https://doi.org/10.1007/978-3-540-77370-2_2

    Article  Google Scholar 

  14. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J on Info Security 2014:1. https://doi.org/10.1186/1687-417X-2014-1

    Article  Google Scholar 

  15. Guo, Linjie & Ni, Jiangqun & Shi, Y.Q. (2014) Uniform embedding for efficient JPEG steganography. I IEEE Trans Inform Forensic Secur 9. 814–825. https://doi.org/10.1109/TIFS.2014.2312817.

  16. Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans Inf Forensics Security 10(12):2669–2680

    Article  Google Scholar 

  17. Doshi R, Jain P, Gupta L (2012) Steganography and Its Applications in Security. International Journal of Modern Engineering Research, 4634–4638.

  18. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forensic Secur 7:868–882. https://doi.org/10.1109/TIFS.2012.2190402

    Article  Google Scholar 

  19. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensic Secur 7:432–444. https://doi.org/10.1109/TIFS.2011.2175919

    Article  Google Scholar 

  20. Arivazhagan S, Sylvia Lilly Jebarani W, Veena ST, Shanmugaraj M (2015) A novel low-d feature based generic steganalyzer to detect low volume payloads. Indian J Sci Technol 8. https://doi.org/10.17485/ijst/2015/v8i24/79991

  21. Arivazhagan S, Jebarani WSL, Veena ST (2016) Enormity of low volume blind steganalysis in clean and uncompressed image formats. 2016 International conference on circuit, power and computing technologies (ICCPCT). IEEE, Nagercoil, pp 1–7

    Google Scholar 

  22. Yu J, Zhang X, Li F (2016) Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multimed Tools Appl 75:13613–13625. https://doi.org/10.1007/s11042-015-2742-y

    Article  Google Scholar 

  23. Yu J, Li F, Cheng H, Zhang X (2016) Spatial steganalysis using contrast of residuals. IEEE Signal Process Lett 23:989–992. https://doi.org/10.1109/LSP.2016.2575100

    Article  Google Scholar 

  24. Lu J, Zhou G, Yang C, et al (2019) Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection. IEEE Access 7:21702–21711. https://doi.org/10.1109/ACCESS.2019.2896781

  25. Pibre L, Pasquet J, Ienco D, Chaumont M (2016) Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch. Electronic Imaging 2016:1–11. https://doi.org/10.2352/ISSN.2470-1173.2016.8.MWSF-078

    Article  Google Scholar 

  26. Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific. IEEE, Chiang Mai, Thailand, pp 1–4

    Google Scholar 

  27. Xu G, Wu H-Z, Shi Y-Q (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23:708–712. https://doi.org/10.1109/LSP.2016.2548421

    Article  Google Scholar 

  28. Qian Y, Dong J, Wang W, Tan T (2016) Learning representations for steganalysis from regularized CNN model with auxiliary tasks. In: Liang Q, Mu J, Wang W, Zhang B (eds) Proceedings of the 2015 international conference on communications, signal processing, and systems. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 629–637

  29. Wu S, Zhong S, Liu Y (2017) Residual convolution network based steganalysis with adaptive content suppression. 2017 IEEE international conference on multimedia and expo (ICME). IEEE, Hong Kong, Hong Kong, pp 241–246

    Chapter  Google Scholar 

  30. Wu S, Zhong S, Liu Y (2018) Deep residual learning for image steganalysis. Multimed Tools Appl 77:10437–10453. https://doi.org/10.1007/s11042-017-4440-4

    Article  Google Scholar 

  31. Qian Y, Dong J, Wang W, Tan T (2018) Feature learning for steganalysis using convolutional neural networks. Multimed Tools Appl 77:19633–19657. https://doi.org/10.1007/s11042-017-5326-1

    Article  Google Scholar 

  32. Wu S, Zhong S, Liu Y (2020) A novel convolutional neural network for image steganalysis with shared normalization. IEEE Trans Multimedia 22:256–270. https://doi.org/10.1109/TMM.2019.2920605

    Article  Google Scholar 

  33. Kim J, Park H, Park J-I (2020) CNN-based image steganalysis using additional data embedding. Multimed Tools Appl 79:1355–1372. https://doi.org/10.1007/s11042-019-08251-3

    Article  Google Scholar 

  34. Zhang R, Zhu F, Liu J, Liu G (2020) Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE TransInformForensic Secur 15:1138–1150. https://doi.org/10.1109/TIFS.2019.2936913

    Article  Google Scholar 

  35. Sicuranza GL (2000) Polynomial filters for image and video processing. In: IWISPA 2000. Proceedings of the First International Workshop on Image and Signal Processing and Analysis. in conjunction with 22nd International conference on information technology interfaces. (IEEE Cat. No.00EX437). Univ. Zagreb, Pula, Croatia, pp 15–26

  36. Huang NE et al (1998), The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. In: Proceedings of the royal society london a—mathematical, physical & engineering sciences, vol. A454, pp 903–995.

  37. Huang S, Zhang Y, Liu Z (2016) Image feature extraction and analysis based on empirical mode decomposition. In: 2016 IEEE advanced information management, communicates, electronic and automation control conference (IMCEC). IEEE, Xi’an, China, pp 615–619

  38. Tan S, Huang J, Shi YQ (2008) Steganalysis of enhanced BPCS steganography using the hilbert-huang transform based sequential analysis. In: Shi YQ, Kim H-J, Katzenbeisser S (eds) Digital watermarking. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 112–126

    Chapter  Google Scholar 

  39. Goodfellow I, Bengio Y, Courville, (2016) Deep Learning. MIT Press, Cambridge, MA, USA

    MATH  Google Scholar 

  40. Rosenblatt F (1958) The perceptron: a probabilistic model for information storage and organization in the brain. Psychol Rev 65:386–408

    Article  Google Scholar 

  41. Bas P, Filler T, and Pevný T (2011) Break our steganographic system: the ins and outs of organizing BOSS, Information Hiding, Czech Republic, IH 2011. Lecture Notes in Computer Science, vol. 6958, Springer, Berlin, Heidelbergpp. pp. 59–70, DOI: https://doi.org/10.1007/978-3-642-24178-9_5.

  42. Steganographic Algorithms. http://dde.binghamton. edu/download/stego_algorithms/. Accessed 31 July 2020

  43. Veena ST, Arivazhagan S (2018) Quantitative steganalysis of spatial LSB based stego images using reduced instances and features. Pattern Recogn Lett 105:39–49. https://doi.org/10.1016/j.patrec.2017.08.016

    Article  Google Scholar 

  44. Zhang R, Zhu F, Liu J, Liu G (2018) Efficient feature learning and multi-size image steganalysis based on CNN. arXiv: 180711428 [cs]

  45. Wang Z, Chen M, Yang Y, et al (2020) Joint multi-domain feature learning for image steganalysis based on CNN. In Review

  46. Quach T-T (2011) Optimal cover estimation methods and steganographic payload location. IEEE Trans Inform Forensic Secur 6:1214–1222. https://doi.org/10.1109/TIFS.2011.2160855

    Article  Google Scholar 

  47. Holub V, Fridrich J, Denemark T (2013) Random projections of residuals as an alternative to co-occurrences in steganalysis. In: Alattar AM, Memon ND, Heitzenrater CD (eds) Burlingame. California, USA, p 86650L

    Google Scholar 

  48. Denemark T, Sedighi V, Holub V et al (2014) Selection-channel-aware rich model for steganalysis of digital images. 2014 IEEE international workshop on information forensics and security (WIFS). IEEE, Atlanta, GA, USA, pp 48–53

    Chapter  Google Scholar 

  49. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forensic Secur 12:2545–2557. https://doi.org/10.1109/TIFS.2017.2710946

    Article  Google Scholar 

  50. Yu X, Tan H, Liang H (2018) A Multi-Task Learning CNN for Image Steganalysis, A Multi-Task Learning CNN for Image Steganalysis, In: IEEE international workshop on information forensics and security (WIFS), Hong Kong, Hong Kong, 2018, pp 1–7, doi: https://doi.org/10.1109/WIFS.2018.8630766.

  51. Ruan F, Zhang X, Zhu D, et al (2020) Deep learning for real-time image steganalysis: a survey. J Real-Time Image Proc 17:149–160. https://doi.org/10.1007/s11554-019-00915-5

Download references

Acknowledgements

The authors would like to thank ER & IPR—DRDO New Delhi, Management and Principal of Mepco Schlenk Engineering College, Sivakasi for providing the necessary facilities and support to carry out this research work. The authors would like to express their gratitude to the anonymous reviewers for their insightful comments and suggestions.

Funding

The work presented in this paper was funded by Directorate of Extramural Research & Intellectual Property Rights (ER & IPR), Defence Research Development Organization (DRDO), Ministry of Defence, Government of India under Grant No. ERIP/ER/201702007/M/01/1733. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of Indian Government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Amrutha.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix 1

Appendix 1

See Appendix Tables 7, 8.

Table 6 Test accuracy obtained for multiclass classification of content-adaptive algorithms and non-content-adaptive algorithms by the proposed hybrid steganalysis framework
Table 7 Confusion matrix obtained for active steganalysis of content-adaptive steganographic algorithms by proposed hybrid steganalysis framework
Table 8 Confusion matrix obtained for active steganalysis of non-content-adaptive steganographic algorithms by proposed hybrid steganalysis framework

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Arivazhagan, S., Amrutha, E., Sylvia Lilly Jebarani, W. et al. Hybrid convolutional neural network architecture driven by residual features for steganalysis of spatial steganographic algorithms. Neural Comput & Applic 33, 11465–11485 (2021). https://doi.org/10.1007/s00521-021-05837-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-021-05837-7

Keywords

Navigation