Abstract
The goal of image steganalysis is to counter steganography algorithms which attempt to hide a secret message within an image file. We focus specifically on blind image steganalysis in the spatial domain which involves detecting the presence of secret messages in image files without knowing the exact algorithm used to embed them. In this paper, we demonstrate that we can achieve better performance on the blind steganalysis task by training the YeNet architecture with adversarially generated examples provided by SteganoGAN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baluja, S.: Hiding images in plain sight: deep steganography. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems 30, pp. 2069–2079. Curran Associates, Inc. (2017)
Bas, P., Filler, T., Pevný, T.: “Break our steganographic system”: the ins and outs of organizing BOSS. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 59–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_5
Boehm, B.: StegExpose - a tool for detecting LSB steganography. CoRR abs/1410.6656 (2014)
Dumitrescu, S., Wu, X., Memon, N.: On steganalysis of random LSB embedding in continuous-tone images 3, 641–644 (2002). https://doi.org/10.1109/ICIP.2002.1039052
Dumitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355–372. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36415-3_23
Fridrich, J., Kodovsky, J.: Rich models for steganalysis of digital images. IEEE Trans. Inf. Forensics Secur. 7(3), 868–882 (2012). https://doi.org/10.1109/TIFS.2012.2190402
Fridrich, J., Goljan, M., Du, R.: Reliable detection of LSB steganography in color and grayscale images. In: Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, pp. 27–30. ACM (2001). https://doi.org/10.1145/1232454.1232466
Hayes, J., Danezis, G.: Generating steganographic images via adversarial training. In: NIPS (2017)
Lin, T., et al.: Microsoft COCO: common objects in context. CoRR abs/1405.0312 (2014)
Wu, P., Yang, Y., Li, X.: StegNet: mega image steganography capacity with deep convolutional network. Future Internet 10, 54 (2018). https://doi.org/10.3390/fi10060054
Ye, J., Ni, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017). https://doi.org/10.1109/TIFS.2017.2710946
Zhang, K.A., Cuesta-Infante, A., Xu, L., Veeramachaneni, K.: SteganoGAN: high capacity image steganography with gans. CoRR abs/1901.03892 (2019). http://arxiv.org/abs/1901.03892
Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: HiDDeN: hiding data with deep networks. CoRR abs/1807.09937 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, K.A., Veeramachaneni, K. (2019). Enhancing Image Steganalysis with Adversarially Generated Examples. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2019. Lecture Notes in Computer Science(), vol 11527. Springer, Cham. https://doi.org/10.1007/978-3-030-20951-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-20951-3_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-20950-6
Online ISBN: 978-3-030-20951-3
eBook Packages: Computer ScienceComputer Science (R0)