Deep Learning in steganography and steganalysis from 2015 to 2018

For almost 10 years, the detection of a message hidden in an image has been mainly carried out by the computation of a Rich Model (RM), followed by a classification by an Ensemble Classifier (EC). In 2015, the first study using a convolutional neural network (CNN) obtained the first results of steganalysis by Deep Learning approaching the results of two-step approaches (EC + RM). Therefore, over the 2015-2018 period, numerous publications have shown that it is possible to obtain better performances notably in spatial steganalysis, in JPEG steganalysis, in Selection-Channel-Aware steganalysis, in quantitative steganalysis. This chapter deals with deep learning in steganalysis from the point of view of the existing, by presenting the different neural networks that have been evaluated with a methodology specific to the discipline of steganalysis, and this during the period 2015-2018. The chapter is not intended to repeat the basic concepts of machine learning or deep learning. We will thus give in a generic way the structure of a deep neural network, we will present the networks proposed in the literature for the different scenarios of steganalysis, and finally, we will discuss steganography by GAN.

[1]  Jianyi Liu,et al.  Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis , 2020, IEEE Transactions on Information Forensics and Security.

[2]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[3]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[4]  Jessica J. Fridrich,et al.  On completeness of feature spaces in blind steganalysis , 2008, MM&Sec '08.

[5]  Yun Q. Shi,et al.  An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[6]  Xiang Lin,et al.  Steganalysis of Adaptive JPEG Steganography Based on ResDet , 2018, 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC).

[7]  Bin Li,et al.  Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.

[8]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[9]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Dennis Shasha,et al.  SafePredict: A Meta-Algorithm for Machine Learning That Uses Refusals to Guarantee Correctness , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Jessica J. Fridrich,et al.  Breaking HUGO - The Process Discovery , 2011, Information Hiding.

[12]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[13]  Evgeny Burnaev,et al.  Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.

[14]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[15]  Jessica J. Fridrich,et al.  Quantitative steganalysis using rich models , 2013, Electronic Imaging.

[16]  Jiangqun Ni,et al.  Improved Uniform Embedding for Efficient JPEG Steganography , 2016, ICCCS.

[17]  Jingwen Yan,et al.  A Customized Convolutional Neural Network with Low Model Complexity for JPEG Steganalysis , 2019, IH&MMSec.

[18]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[19]  Patrick Bas,et al.  Steganalysis into the Wild: How to Define a Source? , 2018, Media Watermarking, Security, and Forensics.

[20]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[21]  Jessica J. Fridrich,et al.  Breaking ALASKA: Color Separation for Steganalysis in JPEG Domain , 2019, IH&MMSec.

[22]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[23]  Bin Li,et al.  CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.

[24]  Yi Ma,et al.  Improving GFR Steganalysis Features by Using Gabor Symmetry and Weighted Histograms , 2017, IH&MMSec.

[25]  Kejiang Chen,et al.  Defining Joint Distortion for JPEG Steganography , 2018, IH&MMSec.

[26]  Jessica J. Fridrich,et al.  Histogram Layer, Moving Convolutional Neural Networks Towards Feature-Based Steganalysis , 2017, Media Watermarking, Security, and Forensics.

[27]  Marc Chaumont,et al.  Steganalysis by ensemble classifiers with boosting by regression, and post-selection of features , 2012, 2012 19th IEEE International Conference on Image Processing.

[28]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[29]  Jessica Fridrich,et al.  Detection of Diversified Stego Sources with CNNs , 2019, Media Watermarking, Security, and Forensics.

[30]  Jessica J. Fridrich,et al.  Theoretical model of the FLD ensemble classifier based on hypothesis testing theory , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[31]  Guanshuo Xu,et al.  Deep Convolutional Neural Network to Detect J-UNIWARD , 2017, IH&MMSec.

[32]  Marc Chaumont,et al.  Color Image Steganalysis Based On Steerable Gaussian Filters Bank , 2016, IH&MMSec.

[33]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[34]  Jiwu Huang,et al.  Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.

[35]  Mo Chen,et al.  JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images , 2017, IH&MMSec.

[36]  Vojtech Holub,et al.  On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.

[37]  Bolin Chen,et al.  Fast and Effective Global Covariance Pooling Network for Image Steganalysis , 2019, IH&MMSec.

[38]  Jessica J. Fridrich,et al.  Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[39]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[40]  Marc Chaumont,et al.  Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[41]  Andrew D. Ker,et al.  Steganalysis with mismatched covers: do simple classifiers help? , 2012, MM&Sec '12.

[42]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[43]  Pedro Comesaña Alfaro,et al.  Improving Selection-Channel-Aware Steganalysis Features , 2016, Media Watermarking, Security, and Forensics.

[44]  Mo Chen,et al.  Deep Learning Regressors for Quantitative Steganalysis , 2018, Media Watermarking, Security, and Forensics.

[45]  Marc Chaumont,et al.  Pooled Steganalysis in JPEG: how to deal with the spreading strategy? , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).

[46]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[47]  Jessica J. Fridrich,et al.  Steganalyzing Images of Arbitrary Size with CNNs , 2018, Media Watermarking, Security, and Forensics.

[48]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[49]  Jessica J. Fridrich,et al.  Optimizing pixel predictors for steganalysis , 2012, Other Conferences.

[50]  Xiaofeng Li,et al.  Generalized transfer component analysis for mismatched JPEG steganalysis , 2013, 2013 IEEE International Conference on Image Processing.

[51]  A. Soliman,et al.  Author Biography , 2018, Understanding Language Use in the Classroom.

[52]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[53]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[54]  Marc Chaumont,et al.  Quantitative and Binary Steganalysis in JPEG: A Comparative Study , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).

[55]  Bin Li,et al.  Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis , 2017, Media Watermarking, Security, and Forensics.

[56]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[57]  Jessica J. Fridrich,et al.  Improving Steganographic Security by Synchronizing the Selection Channel , 2015, IH&MMSec.

[58]  Zhitao Gong,et al.  Strike (With) a Pose: Neural Networks Are Easily Fooled by Strange Poses of Familiar Objects , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[59]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[60]  Yang Yang,et al.  Deep Learning Scaling is Predictable, Empirically , 2017, ArXiv.

[61]  Jianhua Yang,et al.  Towards Automatic Embedding Cost Learning for JPEG Steganography , 2019, IH&MMSec.

[62]  Mauro Barni,et al.  A Comparative Study of ±1 Steganalyzers , 2008 .

[63]  Yun Q. Shi,et al.  Ensemble of CNNs for Steganalysis: An Empirical Study , 2016, IH&MMSec.

[64]  Tomás Pevný Co-occurrence steganalysis in high dimensions , 2012, Other Conferences.

[65]  Dirk Borghys,et al.  Facing the Cover-Source Mismatch on JPHide using Training-Set Design , 2018, IH&MMSec.

[66]  David Megías,et al.  Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..

[67]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[68]  Dumitru Erhan,et al.  Going deeper with convolutions , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[69]  Quoc V. Le,et al.  Efficient Neural Architecture Search via Parameter Sharing , 2018, ICML.

[70]  Stéphane Mallat,et al.  Understanding deep convolutional networks , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[71]  Bin Li,et al.  ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis , 2018, IEEE Signal Processing Letters.

[72]  Jianhua Yang,et al.  An Embedding Cost Learning Framework Using GAN , 2020, IEEE Transactions on Information Forensics and Security.

[73]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[74]  Jessica J. Fridrich,et al.  Effect of Imprecise Knowledge of the Selection Channel on Steganalysis , 2015, IH&MMSec.

[75]  Marc Chaumont,et al.  Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.

[76]  Marc Chaumont,et al.  Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[77]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[78]  Jing Dong,et al.  Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[79]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[80]  Belhassen Bayar,et al.  A Deep Learning Approach to Universal Image Manipulation Detection Using a New Convolutional Layer , 2016, IH&MMSec.

[81]  Ming Li,et al.  Contribution-based feature transfer for JPEG mismatched steganalysis , 2017, 2017 IEEE International Conference on Image Processing (ICIP).

[82]  Pascal Vincent,et al.  Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[83]  Andrew D. Ker,et al.  Going from small to large data in steganalysis , 2012, Other Conferences.

[84]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[85]  Li Fei-Fei,et al.  Progressive Neural Architecture Search , 2017, ECCV.

[86]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[87]  Marc Chaumont,et al.  Technical points about adaptive steganography by oracle (ASO) , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[88]  Dong-Ming Yan,et al.  Distinguishing Between Natural and Computer-Generated Images Using Convolutional Neural Networks , 2018, IEEE Transactions on Information Forensics and Security.

[89]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[90]  Marc Chaumont,et al.  Steganography using a 3 player game , 2019, J. Vis. Commun. Image Represent..

[91]  Jessica J. Fridrich,et al.  Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT , 2015, IEEE Transactions on Information Forensics and Security.

[92]  Jessica J. Fridrich,et al.  Phase-aware projection model for steganalysis of JPEG images , 2015, Electronic Imaging.

[93]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[94]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[95]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[96]  Ming Li,et al.  Iterative multi-order feature alignment for JPEG mismatched steganalysis , 2016, Neurocomputing.

[97]  Jessica J. Fridrich,et al.  Nonlinear Feature Normalization in Steganalysis , 2017, IH&MMSec.

[98]  Jing Dong,et al.  SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.

[99]  Bin Li,et al.  Stacked convolutional auto-encoders for steganalysis of digital images , 2014, Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific.

[100]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[101]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[102]  Marc Chaumont,et al.  How to augment a small learning set for improving the performances of a CNN-based steganalyzer? , 2018, Media Watermarking, Security, and Forensics.

[103]  Rainer Böhme,et al.  A Game-Theoretic Approach to Content-Adaptive Steganography , 2012, Information Hiding.

[104]  Kejiang Chen,et al.  Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.

[105]  Marc Chaumont,et al.  Steganalysis with cover-source mismatch and a small learning database , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[106]  Bin Li,et al.  A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.

[107]  Patrick Bas,et al.  The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis , 2019, IH&MMSec.

[108]  Simmons,et al.  The Subliminal Channel and Digital Signatures , 2022 .

[109]  François Chollet,et al.  Xception: Deep Learning with Depthwise Separable Convolutions , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[110]  Vladimir Iglovikov,et al.  Camera Model Identification Using Convolutional Neural Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[111]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[112]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[113]  Tomás Pevný,et al.  The challenges of rich features in universal steganalysis , 2013, Electronic Imaging.

[114]  Martín Abadi,et al.  Learning to Protect Communications with Adversarial Neural Cryptography , 2016, ArXiv.

[115]  John Klein,et al.  Exploiting Adversarial Embeddings for Better Steganography , 2019, IH&MMSec.

[116]  Rainer Böhme,et al.  Game Theory and Adaptive Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[117]  Jian Sun,et al.  Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.