Linguistic Steganalysis via Densely Connected LSTM with Feature Pyramid

With the growing attention on multimedia security and rapid development of natural language processing technologies, various linguistic steganographic algorithms based on automatic text generation technology have been proposed increasingly, which brings great challenges in maintaining security of cyberspace. The prevailing linguistic steganalysis methods based on neural networks only conduct linguistic steganalysis with feature vectors from last layer of neural network, which may be insufficient for neural linguistic steganalysis. In this paper, we propose a neural linguistic steganalysis scheme based on densely connected Long short-term memory networks (LSTM) with feature pyramids which can incorporate more low level features to detect generative text steganographic algorithms. In the proposed framework, words in text are firstly mapped into semantic space with a hidden representation for better exploitation of the semantic features. Then, stacked bidirectional Long short-term memory networks are ultilized to extract different levels of semantic features. In order to incorporate more low level features from neural networks, we introduced two components: dense connections and feature pyramids to enhance the low level features in feature vectors. Finally, the semantic features from all levels are fused and we use a sigmoid layer to categorize the input text as cover or stego. Experiments showed that the proposed scheme can achieve the state-of-the-art results in detecting recently proposed linguistic steganographic algorithms.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Xin Li,et al.  Transparent and robust audio data hiding in subband domain , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[3]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[4]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[5]  Edward J. Delp,et al.  Attacks on lexical natural language steganography systems , 2006, Electronic Imaging.

[6]  Renata Teixeira,et al.  Early Recognition of Encrypted Applications , 2007, PAM.

[7]  Alec Go,et al.  Twitter Sentiment Classification using Distant Supervision , 2009 .

[8]  Stephen Clark,et al.  Linguistic Steganography Using Automatically Generated Paraphrases , 2010, NAACL.

[9]  Christopher Potts,et al.  Learning Word Vectors for Sentiment Analysis , 2011, ACL.

[10]  Nathan Schneider,et al.  Association for Computational Linguistics: Human Language Technologies , 2011 .

[11]  Alex Graves,et al.  Long Short-Term Memory , 2020, Computer Vision.

[12]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[13]  Hanafizah Yaacob,et al.  Performance Analysis on Text Steganalysis Method Using A Computational Intelligence Approach , 2015 .

[14]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[15]  Wei Liu,et al.  SSD: Single Shot MultiBox Detector , 2015, ECCV.

[16]  Goutam Sanyal,et al.  A real time text steganalysis by using statistical method , 2016, 2016 IEEE International Conference on Engineering and Technology (ICETECH).

[17]  Lin Huo,et al.  Synonym substitution-based steganographic algorithm with vector distance of two-gram dependency collocations , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).

[18]  Katerina J. Argyraki,et al.  Generating Steganographic Text with LSTMs , 2017, ACL.

[19]  Kaiming He,et al.  Feature Pyramid Networks for Object Detection , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[20]  Weiming Zhang,et al.  Text Semantic Steganalysis Based on Word Embedding , 2018, ICCCS.

[21]  Yongfeng Huang,et al.  RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural Network , 2018, IEEE Transactions on Information Forensics and Security.

[22]  Ali Farhadi,et al.  YOLOv3: An Incremental Improvement , 2018, ArXiv.

[23]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[24]  Hao Yang,et al.  Steganalysis of VoIP Streams with CNN-LSTM Network , 2019, IH&MMSec.

[25]  Yongfeng Huang,et al.  Hierarchical Representation Network for Steganalysis of QIM Steganography in Low-Bit-Rate Speech Signals , 2019, ICICS.

[26]  Ping Zhong,et al.  Convolutional Neural Network Based Text Steganalysis , 2019, IEEE Signal Processing Letters.

[27]  Alexander M. Rush,et al.  Neural Linguistic Steganography , 2019, EMNLP.

[28]  Yong-Feng Huang,et al.  RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks , 2019, IEEE Transactions on Information Forensics and Security.

[29]  Yongfeng Huang,et al.  A Fast and Efficient Text Steganalysis Method , 2019, IEEE Signal Processing Letters.

[30]  Fast Steganalysis Method for VoIP Streams , 2019, IEEE Signal Processing Letters.

[31]  Yongfeng Huang,et al.  FCEM: A Novel Fast Correlation Extract Model For Real Time Steganalysis Of VoIP Stream Via Multi-Head Attention , 2019, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).