Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3651781.3651783acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicscaConference Proceedingsconference-collections
research-article
Open access

Comparison of computational complexity of neural network models for detection of steganographic algorithms

Published: 30 May 2024 Publication History

Abstract

The purpose of the paper is to compare the computational complexity of the steganalytic method created by the authors in previously developed and presented by other academics to detect three steganographic algorithms, including jUniward, nsF5 and UERD, against other solutions found during the literature survey. The article describes shortly each analyzed steganographic algorithm along with all compared solutions, gives their characteristic points, and includes list of the model specifications. Moreover, the metric comparing the computational complexity, so the number of parameters in a given neural network, is presented. Since none of the compared articles provided this parameter, there is provided algorithm by which these values could be calculated for each analyzed model. The comparison of the results and final conclusions are presented to explain the distinctions between the obtained outcomes and to identify the factors which could have affected such performance.

References

[1]
[n. d.]. Break Our Steganographic System Base webpage (BossBase). http://agents.fel.cvut.cz/boss/. Accessed: 2022-01-18.
[2]
Mo Chen, Vahid Sedighi, Mehdi Boroumand, and Jessica Fridrich. 2017. JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In Proceedings of the 5th ACM workshop on information hiding and multimedia security. 75–84.
[3]
Tomas Filler, Jan Judas, and Jessica Fridrich. 2010. Minimizing Embedding Impact in Steganography using Trellis-Coded Quantization. In Media Forensics and Security II, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III (Eds.). International Society for Optics and Photonics, SPIE, 38 – 51.
[4]
Jessica Fridrich, Tomas Pevný, and Jan Kodovský. 2007. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In the 9th ACM Multimedia & Security Workshop. Association for Computing Machinery, 3–14.
[5]
Linjie Guo, Jiangqun Ni, Wenkang Su, Chengpei Tang, and Yun-Qing Shi. 2015. Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE transactions on information forensics and security 10, 12 (2015), 2669–2680.
[6]
Vojtěch Holub, Jessica Fridrich, and Tomáš Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Multimedia and Information Security 2014, 1 (2014), 1–1.
[7]
Xiaosa Huang, Shilin Wang, Tanfeng Sun, Gongshen Liu, and Xiang Lin. 2018. Steganalysis of adaptive JPEG steganography based on resdet. In 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, 549–553.
[8]
Mikołaj Płachta and Artur Janicki. 2022. A Simple Neural Network for Detection of Various Image Steganography Methods. Proceedings of the 3rd International Conference on Data Science and Machine Learning - DSML 2022, Computer Science & Information Technology 12, 15 (2022). https://doi.org/
[9]
Mikołaj Płachta, Marek Krzemień, Krzysztof Szczypiorski, and Artur Janicki. 2022. Detection of Image Steganography Using Deep Learning and Ensemble Classifiers. Electronics 11, 10 (2022). https://doi.org/10.3390/electronics11101565
[10]
Hongbo Wang, Xingyu Pan, Lingyan Fan, and Shuofeng Zhao. 2021. Steganalysis of convolutional neural network based on neural architecture search. Multimedia Systems 27 (06 2021). https://doi.org/10.1007/s00530-021-00779-5
[11]
Jianhua Yang, Yun-Qing Shi, Edward K Wong, and Xiangui Kang. 2017. JPEG steganalysis based on densenet. arXiv preprint arXiv:1711.09335 (2017).
[12]
Yassine Yousfi, Jan Butora, Eugene Khvedchenya, and Jessica Fridrich. 2020. ImageNet pre-trained CNNs for JPEG steganalysis. In 2020 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 1–6.
[13]
Yassine Yousfi and Jessica Fridrich. 2020. An Intriguing Struggle of CNNs in JPEG Steganalysis and the OneHot Solution. IEEE Signal Processing Letters 27 (2020), 830–834. https://doi.org/10.1109/LSP.2020.2993959

Index Terms

  1. Comparison of computational complexity of neural network models for detection of steganographic algorithms

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICSCA '24: Proceedings of the 2024 13th International Conference on Software and Computer Applications
        February 2024
        395 pages
        ISBN:9798400708329
        DOI:10.1145/3651781
        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 May 2024

        Check for updates

        Author Tags

        1. UERD
        2. computational complexity
        3. image steganography
        4. jUniward
        5. nsF5
        6. steganalysis
        7. steganography

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICSCA 2024

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 92
          Total Downloads
        • Downloads (Last 12 months)92
        • Downloads (Last 6 weeks)26
        Reflects downloads up to 18 Nov 2024

        Other Metrics

        Citations

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media