[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning

Published: 12 July 2023 Publication History

Abstract

With the rapid proliferation of urbanization, massive data in social networks are collected and aggregated in real time, making it possible for criminals to use images as a cover to spread secret information on the Internet. How to determine whether these images contain secret information is a huge challenge for multimedia computing security. The steganalysis method based on deep learning can effectively judge whether the pictures transmitted on the Internet in urban scenes contain secret information, which is of great significance to safeguarding national and social security. Image steganalysis based on deep learning has powerful learning ability and classification ability, and its detection accuracy of steganography images has surpassed that of traditional steganalysis based on manual feature extraction. In recent years, it has become a hot topic of the information hiding technology. However, the detection accuracy of existing deep learning based steganalysis methods still needs to be improved, especially when detecting arbitrary-size and multi-source images, their detection efficientness is easily affected by cover mismatch. In this manuscript, we propose a steganalysis method based on Inverse Residuals structured Siamese network (abbreviated as SiaIRNet method, Siamese-Inverted-Residuals-Network Based method). The SiaIRNet method uses a siamese convolutional neural network (CNN) to obtain the residual features of subgraphs, including three stages of preprocessing, feature extraction, and classification. Firstly, a preprocessing layer with high-pass filters combined with depth-wise separable convolution is designed to more accurately capture the correlation of residuals between feature channels, which can help capture rich and effective residual features. Then, a feature extraction layer based on the Inverse Residuals structure is proposed, which improves the ability of the model to obtain residual features by expanding channels and reusing features. Finally, a fully connected layer is used to classify the cover image and the stego image features. Utilizing three general datasets, BossBase-1.01, BOWS2, and ALASKA#2, as cover images, a large number of experiments are conducted comparing with the state-of-the-art steganalysis methods. The experimental results show that compared with the classical SID method and the latest SiaStegNet method, the detection accuracy of the proposed method for 15 arbitrary-size images is improved by 15.96% and 5.86% on average, respectively, which verifies the higher detection accuracy and better adaptability of the proposed method to multi-source and arbitrary-size images in urban scenes.

References

[1]
Sajid Anwar, Kyuyeon Hwang, and Wonyong Sung. 2017. Structured pruning of deep convolutional neural networks. ACM Journal on Emerging Technologies in Computing Systems (JETC) 13, 3 (2017), 1–18.
[2]
Patrick Bas, Tomáš Filler, and Tomáš Pevnỳ. 2011. Break our steganographic system: The ins and outs of organizing BOSS. In International Workshop on Information Hiding. Springer, 59–70.
[3]
Patrick Bas and Teddy Furon. 2022. BOWS-2. Retrieved February 17, 2022 from http://bows2.ec-lille.fr/.
[4]
Mehdi Boroumand, Mo Chen, and Jessica Fridrich. 2018. Deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 14, 5 (2018), 1181–1193.
[5]
Junfu Chen, Zhangjie Fu, Weiming Zhang, Xu Cheng, and Xingming Sun. 2021. Steganalysis based on deep learning:A review. J. Softw. 32, 2 (2021), 551–745.
[6]
Wenhuang Cheng, Jiaying Liu, Nicu Sebe, Junsong Yuan, and Honghan Shuai. 2021. Introduction to the special issue on explainable AI on multimedia computing. ACM Trans. Multimedia Comput. Commun. Appl. 17, 3s (2021).
[7]
François Chollet. 2017. Xception: Deep learning with depthwise separable convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1251–1258.
[8]
Rémi Cogranne, Quentin Giboulot, and Patrick Bas. 2019. The ALASKA steganalysis challenge: A first step towards steganalysis. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 125–137.
[9]
Rémi Cogranne, Quentin Giboulot, and Patrick Bas. 2022. Documentation of AlaskaV2 Dataset Scripts: A Hint Moving Towards Steganography and Steganalysis into the Wild. Retrieved February 17, 2022 from https://alaska.utt.fr.
[10]
Rémi Cogranne, Cathel Zitzmann, Lionel Fillatre, Florent Retraint, Igor Nikiforov, and Philippe Cornu. 2011. A cover image model for reliable steganalysis. In International Workshop on Information Hiding. Springer, 178–192.
[11]
Sorina Dumitrescu, Xiaolin Wu, and Zhe Wang. 2002. Detection of LSB steganography via sample pair analysis. In International Workshop on Information Hiding. Springer, 355–372.
[12]
Tomáš Filler, Andrew D. Ker, and Jessica Fridrich. 2009. The square root law of steganographic capacity for Markov covers. Proceedings of SPIE the International Society for Optical Engineering 7254, 107–116.
[13]
Jessica Fridrich, Miroslav Goljan, and Rui Du. 2001. Reliable detection of LSB steganography in color and grayscale images. In Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges. 27–30.
[14]
Jessica Fridrich and Jan Kodovskỳ. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 7, 3 (2012), 868–882.
[15]
Teddy Furon, Jingen Liu, Yogesh Rawat, Wei Zhang, and Qi Zhao. 2021. Trustworthy AI’21: 1st International Workshop on Trustworthy AI for Multimedia Computing. Association for Computing Machinery, New York, NY, USA, 5708C5709.
[16]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770–778.
[17]
Vojtěch Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 234–239.
[18]
Vojtěch Holub and Jessica Fridrich. 2013. Digital image steganography using universal distortion. In Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security. 59–68.
[19]
Vojtech Holub and Jessica Fridrich. 2013. Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Security 8, 12 (2013), 1996–2006.
[20]
Andrew D. Ker. 2007. A capacity result for batch steganography. IEEE Signal Process. Lett. 14, 8 (2007), 525–528.
[21]
Andrew D. Ker, Tomáš Pevnỳ, Jan Kodovskỳ, and Jessica Fridrich. 2008. The square root law of steganographic capacity. In Proceedings of the 10th ACM Workshop on Multimedia and Security. 107–116.
[22]
Jan Kodovsky, Jessica Fridrich, and Vojtěch Holub. 2011. Ensemble classifiers for steganalysis of digital media. IEEE Trans. Inf. Forensics Security 7, 2 (2011), 432–444.
[23]
Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2014. A new cost function for spatial image steganography. In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 4206–4210.
[24]
Hao Li, Asim Kadav, Igor Durdanovic, Hanan Samet, and Hans Peter Graf. 2016. Pruning filters for efficient ConvNets. arXiv preprint arXiv:1608.08710 (2016).
[25]
Wojciech Mazurczyk and Steffen Wendzel. 2017. Information hiding: Challenges for forensic experts. Commun. ACM 61, 1 (2017), 86C94.
[26]
Tomáš Pevnỳ and Andrew D. Ker. 2015. Towards dependable steganalysis. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. 94090I.
[27]
Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2016. Learning and transferring representations for image steganalysis using convolutional neural network. In 2016 IEEE International Conference on Image Processing (ICIP). IEEE, 2752–2756.
[28]
Mark Sandler, Andrew Howard, Menglong Zhu, Andrey Zhmoginov, and Liang-Chieh Chen. 2018. MobileNetV2: Inverted residuals and linear bottlenecks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 4510–4520.
[29]
Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going deeper with convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1–9.
[30]
Mingxing Tan and Quoc Le. 2019. EfficientNet: Rethinking model scaling for convolutional neural networks. In International Conference on Machine Learning. PMLR, 6105–6114.
[31]
Mingxing Tan, Ruoming Pang, and Quoc V Le. 2020. EfficientDet: Scalable and efficient object detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 10781–10790.
[32]
Shunquan Tan, Weilong Wu, Zilong Shao, Qiushi Li, Bin Li, and Jiwu Huang. 2020. CALPA-NET: Channel-pruning-assisted deep residual network for steganalysis of digital images. IEEE Trans. Inf. Forensics Security 16 (2020), 131–146.
[33]
Weixuan Tang, Haodong Li, Weiqi Luo, and Jiwu Huang. 2015. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans. Inf. Forensics Security 11, 4 (2015), 734–745.
[34]
Chao Tong, Mengze Zhang, Chao Lang, and Zhigao Zheng. 2021. An image privacy protection algorithm based on adversarial perturbation generative networks. ACM Trans. Multimedia Comput. Commun. Appl. 17, 2 (2021).
[35]
Clement Fuji Tsang and Jessica Fridrich. 2018. Steganalyzing images of arbitrary size with CNNs. Electron. Imag. 2018, 7 (2018), 121–1.
[36]
Guanshuo Xu, Hanzhou Wu, and Yunqing Shi. 2016. Ensemble of CNNs for steganalysis: An empirical study. In Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security. 103–107.
[37]
Guanshuo Xu, Hanzhou Wu, and Yunqing Shi. 2016. Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23, 5 (2016), 708–712.
[38]
Jian Ye, Jiangqun Ni, and Yang Yi. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Security 12, 11 (2017), 2545–2557.
[39]
Mehdi Yedroudj, Frédéric Comby, and Marc Chaumont. 2018. Yedroudj-Net: An efficient CNN for spatial steganalysis. In 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2092–2096.
[40]
Weike You, Hong Zhang, and Xianfeng Zhao. 2020. A Siamese CNN for image steganalysis. IEEE Trans. Inf. Forensics Security 16 (2020), 291–306.
[41]
Yassine Yousfi, Jan Butora, Jessica Fridrich, and Clément Fuji Tsang. 2021. Improving EfficientNet for JPEG steganalysis. In Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security. 149–157.
[42]
Yassine Yousfi, Jan Butora, Jessica Fridrich, and Quentin Giboulot. 2019. Breaking ALASKA: Color separation for steganalysis in JPEG domain. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 138–149.
[43]
Ru Zhang, Feng Zhu, Jianyi Liu, and Gongshen Liu. 2019. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans. Inf. Forensics Security 15 (2019), 1138–1150.
[44]
Yi Zhang, Xiangyang Luo, Jinwei Wang, Yanqing Guo, and Fenlin Liu. 2021. Image robust adaptive steganography adapted to lossy channels in open social networks. Inf. Sci. 564 (2021), 306–326.

Cited By

View all
  • (2024)An Image Steganalysis Algorithm Based on Multi-Resolution Feature FusionInternational Journal of Information Security and Privacy10.4018/IJISP.35989318:1(1-19)Online publication date: 7-Nov-2024
  • (2024)Lightweight Steganography Detection Method Based on Multiple Residual Structures and TransformerChinese Journal of Electronics10.23919/cje.2022.00.45233:4(965-978)Online publication date: Jul-2024
  • (2024)Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature reviewPLOS ONE10.1371/journal.pone.030880719:9(e0308807)Online publication date: 16-Sep-2024
  • Show More Cited By

Index Terms

  1. A Siamese Inverted Residuals Network Image Steganalysis Scheme based on Deep Learning

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 6
    November 2023
    858 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3599695
    • Editor:
    • Abdulmotaleb El Saddik
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 July 2023
    Online AM: 11 January 2023
    Accepted: 23 December 2022
    Revised: 20 September 2022
    Received: 28 February 2022
    Published in TOMM Volume 19, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Urban scenes
    2. multimedia computing
    3. steganalysis
    4. siamese network
    5. Inverted Residuals

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China
    • the Zhongyuan Science and Technology Innovation Leading Talent Project, China
    • National Key Research and Development Program of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)141
    • Downloads (Last 6 weeks)17
    Reflects downloads up to 16 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)An Image Steganalysis Algorithm Based on Multi-Resolution Feature FusionInternational Journal of Information Security and Privacy10.4018/IJISP.35989318:1(1-19)Online publication date: 7-Nov-2024
    • (2024)Lightweight Steganography Detection Method Based on Multiple Residual Structures and TransformerChinese Journal of Electronics10.23919/cje.2022.00.45233:4(965-978)Online publication date: Jul-2024
    • (2024)Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature reviewPLOS ONE10.1371/journal.pone.030880719:9(e0308807)Online publication date: 16-Sep-2024
    • (2024)SEMScene: Semantic-Consistency Enhanced Multi-Level Scene Graph Matching for Image-Text RetrievalACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3664816Online publication date: 11-May-2024
    • (2024)Universal Relocalizer for Weakly Supervised Referring Expression GroundingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365604520:7(1-23)Online publication date: 16-May-2024
    • (2024)Context-detail-aware United Network for Single Image DerainingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363940720:5(1-18)Online publication date: 22-Jan-2024
    • (2024)A Secure Image Outsourcing Using Privacy-Preserved Local Color Layout Descriptor in Cloud EnvironmentIEEE Transactions on Services Computing10.1109/TSC.2024.335735817:2(378-391)Online publication date: Mar-2024
    • (2024)Emotional Video Captioning With Vision-Based Emotion Interpretation NetworkIEEE Transactions on Image Processing10.1109/TIP.2024.335904533(1122-1135)Online publication date: 1-Feb-2024
    • (2024)Leveraging chaos for enhancing encryption and compression in large cloud data transfersThe Journal of Supercomputing10.1007/s11227-024-05906-380:9(11923-11957)Online publication date: 4-Feb-2024
    • (2024)Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art ClassificationJournal of Network and Systems Management10.1007/s10922-024-09810-232:2Online publication date: 26-Mar-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media