Skip to main content
Log in

Steganalysis using learned denoising kernels

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganalysis is the science for detecting steganographic traces in innocent-looking digital media like images, videos, etc. In recent literature, it has been observed that state-of-the-art image steganographic techniques such as S-UNIWARD, HUGO, WOW, etc. still remain undetected even with considerable embedding payload. Recently, the deep learning framework has been hugely successful in different computer vision applications like object detection, image classification, event detection, etc. Some recent deep learning-based works also show promising results for image steganalysis and have opened a new avenue for research. The current literature reveals that the steganalytic detector becomes more precise if trained on the residual error (embedding noise) domain. To get an accurate noise residual, it is required to predict the cover image precisely from the corresponding stego image. In this work, a denoising kernel has been learned to obtain a more precise noise residual. After that, a CNN based steganalytic detector is devised, which is trained using the noise residual to get a more precise detection. Experimental results show that the proposed scheme outperforms the state-of-the-art steganalysis schemes against the state-of-the-art steganographic approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. In order to find the suitable kernel size for denoising, the extensive experiment has been carried out with different filter sizes (e.g., 3 × 3, 5 × 5 and 7 × 7). The 5×5 filters are found to be suitable as denoising filters.

  2. SRNet model code is available at http://dde.binghmton.edu/download/

  3. SRNet trained weights, test data, and codes are available at https://drive.google.com/open?id=1MxObzvnkFSSGR4gcfcl_Esqp27kSk5TN

  4. http://tflearn.org/

References

  1. Abadi M, Barham P, Chen J, et al. (2016) Tensorflow: a system for large-scale machine learning. In: 12Th {USENIX} symposium on operating systems design and implementation ({OSDI} 16), pp 265–283

  2. Bas P, Filler T, Pevnỳ T (2011) “break our steganographic system”: the ins and outs of organizing boss. In: International workshop on information hiding, Springer, pp 59–70

  3. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inform Forensics and Security 14(5):1181–1193

    Article  Google Scholar 

  4. De Boer PT, Kroese DP, Mannor S, Rubinstein RY (2005) A tutorial on the cross-entropy method. Ann Oper Res 134(1):19–67

    Article  MathSciNet  Google Scholar 

  5. Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014) Selection-channel-aware rich model for steganalysis of digital images. In: 2014 IEEE International workshop on information forensics and security (WIFS), IEEE, pp 48–53

  6. Duchi J, Hazan E, Singer Y (2011) Adaptive subgradient methods for online learning and stochastic optimization. J Mach Learn Res 12(Jul):2121–2159

    MathSciNet  MATH  Google Scholar 

  7. Fridrich J (2012) Digital data embedding laboratory. http://dde.binghamton.edu/download/

  8. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forensics and Security 7(3):868–882

    Article  Google Scholar 

  9. Goljan M, Fridrich J, Holotyak T (2006) New blind steganalysis and its implications. In: Security, steganography, and watermarking of multimedia contents VIII, vol 6072. International Society for Optics and Photonics, p 607201

  10. Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (hugo). In: International workshop on information hiding, Springer, pp 71–84

  11. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778

  12. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS), IEEE, pp 234–239

  13. Holub V, Fridrich J (2013) Random projections of residuals for digital image steganalysis. IEEE Transactions on Information Forensics and Security 8 (12):1996–2006

    Article  Google Scholar 

  14. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inform Security 2014 (1):1

    Article  Google Scholar 

  15. Ioffe S, Szegedy C (2015) Batch normalization:, Accelerating deep network training by reducing internal covariate shift. arXiv:1502.03167

  16. Kodovsky J, Fridrich J, Holub V (2011) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensics and Security 7(2):432–444

    Article  Google Scholar 

  17. Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097–1105

  18. LeCun Y, Kavukcuoglu K, Farabet C (2010) Convolutional networks and applications in vision. In: Proceedings of 2010 IEEE international symposium on circuits and systems, IEEE, pp 253–256

  19. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International conference on image processing (ICIP), IEEE, pp 4206–4210

  20. Li B, Wei W, Ferreira A, Tan S (2018) Rest-net: Diverse activation modules and parallel subnets-based cnn for spatial image steganalysis. IEEE Signal Process Lett 25(5):650–654

    Article  Google Scholar 

  21. Li Y, Hu H, Zhu Z, Zhou G (2020) Scanet: Sensor-based continuous authentication with two-stream convolutional neural networks. ACM Trans Sensor Networks (TOSN) 16(3):1–27

    Article  Google Scholar 

  22. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Transactions on Dependable and Secure Computing, pp 1–1

  23. Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circ Syst Vid Technol 30(3):685–696

    Article  Google Scholar 

  24. Lyu S, Farid H (2002) Detecting hidden messages using higher-order statistics and support vector machines. In: International workshop on information hiding, Springer, pp 340–354

  25. Nair V, Hinton GE (2010) Rectified linear units improve restricted boltzmann machines. In: Proceedings of the 27th international conference on machine learning (ICML-10), pp 807–814

  26. Patrick Bas TF (2007) Bows-2. http://bows2.ec-lille.fr/

  27. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inform Forensics and Security 5(2):215–224

    Article  Google Scholar 

  28. Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding, Springer, pp 161–177

  29. Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Security & Privacy 1(3):32–44

    Article  Google Scholar 

  30. Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Media watermarking, security, and forensics 2015, vol 9409, International society for optics and photonics, pp 94090j

  31. Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International conference on image processing (ICIP), IEEE, pp 2752–2756

  32. Rabevohitra FH, Li Y (2019) Text cover steganography using font color of the invisible characters and optimized primary color-intensities. In: 2019 IEEE 19Th international conference on communication technology (ICCT), IEEE, pp 1704–1708

  33. Sadek MM, Khalifa AS, Mostafa MG (2015) Video steganography: a comprehensive review. Multimedia Tools and Applications 74 (17):7063–7094

    Article  Google Scholar 

  34. Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forensics and Security 11(2):221–234

    Article  Google Scholar 

  35. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv:1409.1556

  36. Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929–1958

    MathSciNet  MATH  Google Scholar 

  37. Szegedy C, Ioffe S, Vanhoucke V, Alemi A (2016) Inception-v4, inception-resnet and the impact of residual connections on learning. arXiv:1602.07261

  38. Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and information processing association annual summit and conference (APSIPA), 2014 asia-pacific, IEEE, pp 1–4

  39. Tong Yb, Zhang QS, QI YP (2006) Image quality assessing by combining psnr with ssim. Journal of Image and Graphics 12:1758–1763

    Google Scholar 

  40. Wang P, Wei Z, Xiao L (2016) Pure spatial rich model features for digital image steganalysis. Multimedia Tools and Applications 75(5):2897–2912

    Article  Google Scholar 

  41. Wang Z, Bovik AC (2009) Mean squared error: Love it or leave it? a new look at signal fidelity measures. IEEE Signal process Magazine 26(1):98–117

    Article  Google Scholar 

  42. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP et al (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image process 13(4):600–612

    Article  Google Scholar 

  43. Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712

    Article  Google Scholar 

  44. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forensics and Security 12(11):2545–2557

    Article  Google Scholar 

  45. Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intel Magazine 13(3):55–75

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by Ministry of Human Resource Development, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Brijesh Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, B., Chhajed, M., Sur, A. et al. Steganalysis using learned denoising kernels. Multimed Tools Appl 80, 4903–4917 (2021). https://doi.org/10.1007/s11042-020-09960-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09960-w

Keywords

Navigation