Abstract
Steganalysis is the science for detecting steganographic traces in innocent-looking digital media like images, videos, etc. In recent literature, it has been observed that state-of-the-art image steganographic techniques such as S-UNIWARD, HUGO, WOW, etc. still remain undetected even with considerable embedding payload. Recently, the deep learning framework has been hugely successful in different computer vision applications like object detection, image classification, event detection, etc. Some recent deep learning-based works also show promising results for image steganalysis and have opened a new avenue for research. The current literature reveals that the steganalytic detector becomes more precise if trained on the residual error (embedding noise) domain. To get an accurate noise residual, it is required to predict the cover image precisely from the corresponding stego image. In this work, a denoising kernel has been learned to obtain a more precise noise residual. After that, a CNN based steganalytic detector is devised, which is trained using the noise residual to get a more precise detection. Experimental results show that the proposed scheme outperforms the state-of-the-art steganalysis schemes against the state-of-the-art steganographic approaches.
Similar content being viewed by others
Notes
In order to find the suitable kernel size for denoising, the extensive experiment has been carried out with different filter sizes (e.g., 3 × 3, 5 × 5 and 7 × 7). The 5×5 filters are found to be suitable as denoising filters.
SRNet model code is available at http://dde.binghmton.edu/download/
SRNet trained weights, test data, and codes are available at https://drive.google.com/open?id=1MxObzvnkFSSGR4gcfcl_Esqp27kSk5TN
References
Abadi M, Barham P, Chen J, et al. (2016) Tensorflow: a system for large-scale machine learning. In: 12Th {USENIX} symposium on operating systems design and implementation ({OSDI} 16), pp 265–283
Bas P, Filler T, Pevnỳ T (2011) “break our steganographic system”: the ins and outs of organizing boss. In: International workshop on information hiding, Springer, pp 59–70
Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inform Forensics and Security 14(5):1181–1193
De Boer PT, Kroese DP, Mannor S, Rubinstein RY (2005) A tutorial on the cross-entropy method. Ann Oper Res 134(1):19–67
Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International workshop on information forensics and security (WIFS), IEEE, pp 48–53
Duchi J, Hazan E, Singer Y (2011) Adaptive subgradient methods for online learning and stochastic optimization. J Mach Learn Res 12(Jul):2121–2159
Fridrich J (2012) Digital data embedding laboratory. http://dde.binghamton.edu/download/
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forensics and Security 7(3):868–882
Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In: Security, steganography, and watermarking of multimedia contents VIII, vol 6072. International Society for Optics and Photonics, p 607201
Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (hugo). In: International workshop on information hiding, Springer, pp 71–84
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS), IEEE, pp 234–239
Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8 (12):1996–2006
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inform Security 2014 (1):1
Ioffe S, Szegedy C (2015) Batch normalization:, Accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167
Kodovsky J, Fridrich J, Holub V (2011) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensics and Security 7(2):432–444
Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105
LeCun Y, Kavukcuoglu K, Farabet C (2010) Convolutional networks and applications in vision. In: Proceedings of 2010 IEEE international symposium on circuits and systems, IEEE, pp 253–256
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International conference on image processing (ICIP), IEEE, pp 4206–4210
Li B, Wei W, Ferreira A, Tan S (2018) Rest-net: Diverse activation modules and parallel subnets-based cnn for spatial image steganalysis. IEEE Signal Process Lett 25(5):650–654
Li Y, Hu H, Zhu Z, Zhou G (2020) Scanet: Sensor-based continuous authentication with two-stream convolutional neural networks. ACM Trans Sensor Networks (TOSN) 16(3):1–27
Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing, pp 1–1
Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Vid Technol 30(3):685–696
Lyu S, Farid H (2002) Detecting hidden messages using higher-order statistics and support vector machines. In: International workshop on information hiding, Springer, pp 340–354
Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th international conference on machine learning (ICML-10), pp 807–814
Patrick Bas TF (2007) Bows-2. http://bows2.ec-lille.fr/
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inform Forensics and Security 5(2):215–224
Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding, Springer, pp 161–177
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security & Privacy 1(3):32–44
Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Media watermarking, security, and forensics 2015, vol 9409, International society for optics and photonics, pp 94090j
Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International conference on image processing (ICIP), IEEE, pp 2752–2756
Rabevohitra FH, Li Y (2019) Text cover steganography using font color of the invisible characters and optimized primary color-intensities. In: 2019 IEEE 19Th international conference on communication technology (ICCT), IEEE, pp 1704–1708
Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia Tools and Applications 74 (17):7063–7094
Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forensics and Security 11(2):221–234
Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556
Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929–1958
Szegedy C, Ioffe S, Vanhoucke V, Alemi A (2016) Inception-v4, inception-resnet and the impact of residual connections on learning. arXiv:1602.07261
Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and information processing association annual summit and conference (APSIPA), 2014 asia-pacific, IEEE, pp 1–4
Tong Yb, Zhang QS, QI YP (2006) Image quality assessing by combining psnr with ssim. Journal of Image and Graphics 12:1758–1763
Wang P, Wei Z, Xiao L (2016) Pure spatial rich model features for digital image steganalysis. Multimedia Tools and Applications 75(5):2897–2912
Wang Z, Bovik AC (2009) Mean squared error: Love it or leave it? a new look at signal fidelity measures. IEEE Signal process Magazine 26(1):98–117
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image process 13(4):600–612
Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712
Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forensics and Security 12(11):2545–2557
Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intel Magazine 13(3):55–75
Acknowledgment
This work is supported by Ministry of Human Resource Development, Government of India.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, B., Chhajed, M., Sur, A. et al. Steganalysis using learned denoising kernels. Multimed Tools Appl 80, 4903–4917 (2021). https://doi.org/10.1007/s11042-020-09960-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09960-w