Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG Steganalysis
Abstract
An effective feature selection method to capture the weak stego noise is essential to image steganalysis. In the conventional JPEG steganalysis, Gabor filter and DCT filter are both used for residual extraction. However, there are few comparisons in existing convolutional neural networks (CNNs) based JPEG steganalysis using Gabor filter or DCT filter in the pre-processing stage to extract residuals. In this paper, we compare the performance of DCT filter with Gabor filter in the pre-processing phase of the steganalysis CNN. Firstly, we choose the parameters empirically and theoretically for Gabor filters which are used in CNN. Secondly, we improve the performance by removing the ABS layer in the original XuNet. Finally, the experimental results show that using Gabor filters or DCT filter can achieve comparable performance whenever the parameters of pre-processing filters are fixed or learnable. It’s different from the conventional steganalysis method where Gabor filters have advantages over DCT filters. When the parameters of the pre-processing filters are learnable, both Gabor filter and DCT filter can achieve better performance compared with the condition where the parameters are fixed.
Keywords
JPEG steganalysis Gabor filter Convolutional neural networks (CNNs)References
- 1.Bas, P., Filler, T., Pevný, T.: “break our steganographic system”: the ins and outs of organizing BOSS. In: Proceedings of Information Hiding - 13th International Conference, IH 2011, Prague, Czech Republic, 18–20 May 2011, Revised Selected Papers, pp. 59–70 (2011)CrossRefGoogle Scholar
- 2.Chen, M., Sedighi, V., Boroumand, M., Fridrich, J.J.: JPEG-phase-aware convolutional neural network for steganalysis of JPEG images. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 75–84 (2017)Google Scholar
- 3.Chen, Y., Lyu, Z., Kang, X., Wang, Z.J.: A rotation-invariant convolutional neural network for image enhancement forensics. In: Proceedings of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, pp. 2111–2115 (2018)Google Scholar
- 4.Daugman, J.G.: Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. J. Opt. Soc. Am. Opt. Image Sci. 2(7), 1160 (1985)CrossRefGoogle Scholar
- 5.Denemark, T., Boroumand, M., Fridrich, J.J.: Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forensics Secur. 11(8), 1736–1746 (2016)CrossRefGoogle Scholar
- 6.Fridrich, J.J., Kodovský, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012)CrossRefGoogle Scholar
- 7.Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the 13th International Conference on Artificial Intelligence and Statistics, AISTATS 2010, Chia Laguna Resort, Sardinia, Italy, 13–15 May 2010, pp. 249–256 (2010)Google Scholar
- 8.Guo, L., Ni, J., Shi, Y.: An efficient JPEG steganographic scheme using uniform embedding. In: Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Tenerife, Spain, 2–5 December 2012, pp. 169–174 (2012)Google Scholar
- 9.Guo, L., Ni, J., Su, W., Tang, C., Shi, Y.: Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans. Inf. Forensics Secur. 10(12), 2669–2680 (2015)CrossRefGoogle Scholar
- 10.Holub, V., Fridrich, J.J.: Digital image steganography using universal distortion. In: Proceedings of ACM Information Hiding and Multimedia Security Workshop, IH&MMSec 2013, Montpellier, France, 17–19 June 2013, pp. 59–68 (2013)Google Scholar
- 11.Holub, V., Fridrich, J.J.: Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans. Inf. Forensics Secur. 10(2), 219–228 (2015)CrossRefGoogle Scholar
- 12.Holub, V., Fridrich, J.J.: Phase-aware projection model for steganalysis of JPEG images. In: Proceedings of Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, 9–11 February 2015, Proceedings, p. 94090T (2015)Google Scholar
- 13.Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: Proceedings of the 32nd International Conference on Machine Learning, ICML 2015, Lille, France, 6–11 July 2015, pp. 448–456 (2015)Google Scholar
- 14.Jia, Y., et al.: Caffe: convolutional architecture for fast feature embedding. In: Proceedings of the ACM International Conference on Multimedia, MM 2014, Orlando, FL, USA, 03–07 November 2014, pp. 675–678 (2014)Google Scholar
- 15.Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on Machine Learning (ICML-10), 21–24 June 2010, Haifa, Israel, pp. 807–814 (2010)Google Scholar
- 16.Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Proceedings of Media Watermarking, Security, and Forensics 2015, San Francisco, CA, USA, 9–11 February 2015, Proceedings, p. 94090J (2015)Google Scholar
- 17.Russakovsky, O., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211–252 (2015)MathSciNetCrossRefGoogle Scholar
- 18.Song, X., Liu, F., Yang, C., Luo, X., Zhang, Y.: Steganalysis of adaptive JPEG steganography using 2D gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, 17–19 June 2015, pp. 15–23 (2015)Google Scholar
- 19.Xu, G.: Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2017, Philadelphia, PA, USA, 20–22 June 2017, pp. 67–73 (2017)Google Scholar
- 20.Xu, G., Wu, H., Shi, Y.Q.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, 20–22 June 2016, pp. 103–107 (2016)Google Scholar
- 21.Xu, G., Wu, H., Shi, Y.: Structural design of convolutional neural networks for steganalysis. IEEE Sig. Process. Lett. 23(5), 708–712 (2016)CrossRefGoogle Scholar
- 22.Yang, J., Shi, Y., Wong, E.K., Kang, X.: JPEG steganalysis based on DenseNet. Computing Research Repository abs/1711.09335 (2017)Google Scholar
- 23.Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)CrossRefGoogle Scholar
- 24.Zeng, J., Tan, S., Li, B., Huang, J.: Large-scale JPEG steganalysis using hybrid deep-learning framework. Computing Research Repository abs/1611.03233 (2016)Google Scholar