Advertisement

Convolutional Neural Network for Larger JPEG Images Steganalysis

  • Qian Zhang
  • Xianfeng ZhaoEmail author
  • Changjun Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11378)

Abstract

This paper proposes an effective steganalytic scheme based on CNN in order to detect steganography on larger JPEG images. Most of the CNN schemes were designed very deep to achieve high accuracy, resulting in inability to train large size images due to the limitation of GPUs’ memory. Most existing network architectures use small images of 256 \(\times \) 256 or 512 \(\times \) 512 pixels as their detection objects which are far from meeting the needs of practical applications. Meanwhile, the resizing operation on stegos will make the slight noise signal caused by steganography become difficult to detect. In our proposed network architecture, we try to solve the problem by compressing the depth of network structure. And in order to reduce the data dimension, we apply a histogram layer to transform the feature maps to feature vectors before the fully connected layer. We test our network on images of size 512 \(\times \) 512, 1024 \(\times \) 1024 and 2048 \(\times \) 2048. For different application scenes, we take two methods to generate large samples. The result demonstrates that the proposed scheme can make directly training the steganalysis detectors on large images feasible.

Keywords

JPEG steganalysis Larger images Histogram layer Convolutional Neural Networks (CNN) 

Notes

Acknowledgments

This work was supported by National Key Technology R&D Program under 2016YFB0801003, NSFC under U1636102 and U1736214, Fundamental Theory and Cutting Edge Technology Research Program of IIE, CAS, under Y7Z0371102, and National Key Technology R&D Program under 2016QY15Z2500.

References

  1. 1.
    Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the Ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-24178-9_5CrossRefGoogle Scholar
  2. 2.
    Chen, M., Sedighi, V., Boroumand, M., Fridrich, J.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 75–84. ACM (2017)Google Scholar
  3. 3.
    Guo, L., Ni, J., Shi, Y.Q.: Uniform embedding for efficient JPEG steganography. IEEE Trans. Inf. Forensics Secur. 9(5), 814–825 (2014)CrossRefGoogle Scholar
  4. 4.
    Holub, V., Fridrich, J.: Random projections of residuals for digital image steganalysis. IEEE Trans. Inf. Forensics Secur. 8(12), 1996–2006 (2013)CrossRefGoogle Scholar
  5. 5.
    Holub, V., Fridrich, J.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)CrossRefGoogle Scholar
  6. 6.
    Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1 (2014)CrossRefGoogle Scholar
  7. 7.
    Jia, Y., et al.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the ACM International Conference on Multimedia, MM 2014, Orlando, FL, USA, 03–07 November 2014, pp. 675–678. ACM (2014)Google Scholar
  8. 8.
    Kodovský, J., Fridrich, J.: Steganalysis of JPEG images using rich models. In: Media Watermarking, Security, and Forensics 2012, Burlingame, CA, USA, 22 January 2012, Proceedings, vol. 8303, p. 83030A. SPIE (2012)Google Scholar
  9. 9.
    Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, 9–11 February 2015, Proceedings, vol. 9409, p. 94090J. International Society for Optics and Photonics (2015)Google Scholar
  10. 10.
    Qian, Y., Dong, J., Wang, W., Tan, T.: Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing, ICIP 2016, Phoenix, AZ, USA, 25–28 September 2016, pp. 2752–2756. IEEE (2016)Google Scholar
  11. 11.
    Sedighi, V., Fridrich, J.: Histogram layer, moving convolutional neural networks towards feature-based steganalysis. In: Proceedings of IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2017, San Francisco, CA, USA, pp. 50–55 (2017)Google Scholar
  12. 12.
    Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, 17–19 June 2015, pp. 15–23. ACM (2015)Google Scholar
  13. 13.
    Tsang, C.F., Fridrich, J.: Steganalyzing images of arbitrary size with CNNs. In: Proceedings of IS&T, Electronic Imaging, Media Watermarking, Security, and Forensics 2018, San Francisco, CA, USA, pp. 1–8 (2018)Google Scholar
  14. 14.
    Westfeld, A.: F5—a steganographic algorithm. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 289–302. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45496-9_21CrossRefGoogle Scholar
  15. 15.
    Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 67–73. ACM (2017)Google Scholar
  16. 16.
    Xu, G., Wu, H.Z., Shi, Y.Q.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.State Key Laboratory of Information SecurityInstitute of Information Engineering, Chinese Academy of SciencesBeijingChina
  2. 2.School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina

Personalised recommendations