Convolutional Neural Network for Larger JPEG Images Steganalysis
Abstract
This paper proposes an effective steganalytic scheme based on CNN in order to detect steganography on larger JPEG images. Most of the CNN schemes were designed very deep to achieve high accuracy, resulting in inability to train large size images due to the limitation of GPUs’ memory. Most existing network architectures use small images of 256 \(\times \) 256 or 512 \(\times \) 512 pixels as their detection objects which are far from meeting the needs of practical applications. Meanwhile, the resizing operation on stegos will make the slight noise signal caused by steganography become difficult to detect. In our proposed network architecture, we try to solve the problem by compressing the depth of network structure. And in order to reduce the data dimension, we apply a histogram layer to transform the feature maps to feature vectors before the fully connected layer. We test our network on images of size 512 \(\times \) 512, 1024 \(\times \) 1024 and 2048 \(\times \) 2048. For different application scenes, we take two methods to generate large samples. The result demonstrates that the proposed scheme can make directly training the steganalysis detectors on large images feasible.
Keywords
JPEG steganalysis Larger images Histogram layer Convolutional Neural Networks (CNN)Notes
Acknowledgments
This work was supported by National Key Technology R&D Program under 2016YFB0801003, NSFC under U1636102 and U1736214, Fundamental Theory and Cutting Edge Technology Research Program of IIE, CAS, under Y7Z0371102, and National Key Technology R&D Program under 2016QY15Z2500.
References
- 1.Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the Ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5CrossRefGoogle Scholar
- 2.Chen, M., Sedighi, V., Boroumand, M., Fridrich, J.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 75–84. ACM (2017)Google Scholar
- 3.Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)CrossRefGoogle Scholar
- 4.Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)CrossRefGoogle Scholar
- 5.Holub, V., Fridrich, J.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)CrossRefGoogle Scholar
- 6.Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1 (2014)CrossRefGoogle Scholar
- 7.Jia, Y., et al.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the ACM International Conference on Multimedia, MM 2014, Orlando, FL, USA, 03–07 November 2014, pp. 675–678. ACM (2014)Google Scholar
- 8.Kodovský, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Media Watermarking, Security, and Forensics 2012, Burlingame, CA, USA, 22 January 2012, Proceedings, vol. 8303, p. 83030A. SPIE (2012)Google Scholar
- 9.Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, 9–11 February 2015, Proceedings, vol. 9409, p. 94090J. International Society for Optics and Photonics (2015)Google Scholar
- 10.Qian, Y., Dong, J., Wang, W., Tan, T.: Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing, ICIP 2016, Phoenix, AZ, USA, 25–28 September 2016, pp. 2752–2756. IEEE (2016)Google Scholar
- 11.Sedighi, V., Fridrich, J.: Histogram layer, moving convolutional neural networks towards feature-based steganalysis. In: Proceedings of IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, USA, pp. 50–55 (2017)Google Scholar
- 12.Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, 17–19 June 2015, pp. 15–23. ACM (2015)Google Scholar
- 13.Tsang, C.F., Fridrich, J.: Steganalyzing images of arbitrary size with CNNs. In: Proceedings of IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, USA, pp. 1–8 (2018)Google Scholar
- 14.Westfeld, A.: F5—a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45496-9_21CrossRefGoogle Scholar
- 15.Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 67–73. ACM (2017)Google Scholar
- 16.Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)CrossRefGoogle Scholar