Deep learning for real-time image steganalysis: a survey

Steganography is a technique that transmits secret data or message in an appropriate multimedia carrier, e.g., image, audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident. However, such technology is always used by criminals who do not want to be easily discovered to hide harmful information in various media, especially in images. Massive spreading of those harmful information will increase the difficulty of social security management. In this case, excellent image steganalysis should be developed and applied. Specially, real-time image steganalysis is necessary when information timelines need to be protected. If detection scene has large amounts of users, deep learning can be applied to improve performance of image steganalysis benefiting from its powerful processing capability. Using deep learning, real-time image steganalysis system gets higher accuracy and efficiency. In this paper, we give an account of preliminary knowledge first. A brief overview of the deep neural networks (DNN) is also presented. The combination of DNN and real-time image steganalysis is introduced. Then, we import the concept of CNN in DNN, and expound theory as well as advantages of combining CNN and image steganalysis. For multi-user scenarios, we analyze a practical real-time image steganalysis application based on outlier detection methods. At last, we prospect the future issues of real-time image steganalysis.

[1]  Wang Yun,et al.  Research on an information hiding algorithm base on most significant bit in image , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[2]  Jianming Fu,et al.  Spec-ResNet: A General Audio Steganalysis scheme based on Deep Residual Network of Spectrogram , 2019, ArXiv.

[3]  Weisong Shi,et al.  The Promise of Edge Computing , 2016, Computer.

[4]  R.T. McKeon,et al.  Strange fourier steganography in movies , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[5]  Xuyun Zhang,et al.  EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment , 2016, IEEE Transactions on Cloud Computing.

[6]  Mansour Sheikhan,et al.  Hybrid of Evolutionary and Swarm Intelligence Algorithms for Prosody Modeling in Natural Speech Synthesis , 2016 .

[7]  Jie Zhang,et al.  Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds , 2017, Secur. Commun. Networks.

[8]  S. El-Rabaie,et al.  High security data hiding using image cropping and LSB least significant bit steganography , 2016, 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt).

[9]  Bin Li,et al.  ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis , 2018, IEEE Signal Processing Letters.

[10]  Hui Li,et al.  Steganalysis Using Unsupervised End-to-End CNN Fused with Residual Image , 2018, 2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI).

[11]  Tao Huang,et al.  An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks , 2019, J. Netw. Comput. Appl..

[12]  Larry S. Davis,et al.  Deep Residual Learning in the JPEG Transform Domain , 2018, 2019 IEEE/CVF International Conference on Computer Vision (ICCV).

[13]  Fu Bing,et al.  Information hiding technique in most significant bit of still image , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[14]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[15]  Xuyun Zhang,et al.  BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing , 2020, IEEE Transactions on Industrial Informatics.

[16]  Xingming Sun,et al.  Dynamic Resource Allocation for Load Balancing in Fog Environment , 2018, Wirel. Commun. Mob. Comput..

[17]  Xianfeng Zhao,et al.  Highly accurate real-time image steganalysis based on GPU , 2016, Journal of Real-Time Image Processing.

[18]  Arun Kumar Sangaiah,et al.  Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..

[19]  S. Han,et al.  Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[20]  Xingming Sun,et al.  Effective and Efficient Global Context Verification for Image Copy Detection , 2017, IEEE Transactions on Information Forensics and Security.

[21]  Zhili Zhou,et al.  Multiple Distance-Based Coding: Toward Scalable Feature Matching for Large-Scale Web Image Search , 2019, IEEE Transactions on Big Data.

[22]  Shancang Li,et al.  A Heuristic Offloading Method for Deep Learning Edge Services in 5G Networks , 2019, IEEE Access.

[23]  Mohammad Hassan Shirali-Shahreza,et al.  A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).

[24]  Xiaoou Tang,et al.  Accelerating the Super-Resolution Convolutional Neural Network , 2016, ECCV.

[25]  Dongdong Hou,et al.  Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[26]  Hedieh Sajedi,et al.  Region based Image Steganalysis using Artificial Bee Colony , 2017, J. Vis. Commun. Image Represent..

[27]  Qiang He,et al.  An IoT-Oriented data placement method with privacy preservation in cloud environment , 2018, J. Netw. Comput. Appl..

[28]  Xingming Sun,et al.  Encoding multiple contextual clues for partial-duplicate image retrieval , 2017, Pattern Recognit. Lett..

[29]  Lie-Hui Jiang,et al.  A review on deep learning based image steganalysis , 2018, 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).

[30]  J. Anita Christaline,et al.  Bio-Inspired Computational Algorithms for Improved Image Steganalysis , 2016 .

[31]  Rainer Poisel,et al.  Software architecture for real-time steganography in auditive media , 2010, 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON).

[32]  Somjit Arch-int,et al.  An adaptive multi bit-plane image steganography using block data-hiding , 2016, Multimedia Tools and Applications.

[33]  Igor Carron,et al.  XNOR-Net: ImageNet Classification Using Binary Convolutional Neural Networks , 2016 .

[34]  Tao Huang,et al.  Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing , 2019, Multimedia Tools and Applications.

[35]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[36]  Mansour Sheikhan,et al.  Synthesizing suprasegmental speech information using hybrid of GA-ACO and dynamic neural network , 2013, The 5th Conference on Information and Knowledge Technology.

[37]  Ki-Hyun Jung,et al.  Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.

[38]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[39]  Ping Zhong,et al.  Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine , 2019, Int. J. Digit. Crime Forensics.

[40]  Latika Singh,et al.  An improved dynamic discrete firefly algorithm for blind image steganalysis , 2018, Int. J. Mach. Learn. Cybern..

[41]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[42]  Jing Dong,et al.  Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[43]  Q. M. Jonathan Wu,et al.  Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.

[44]  Abdulaleem Z. Al-Othmani,et al.  A survey on steganography techniques in real time audio signals and evaluation , 2012 .

[45]  Yambem Jina Chanu,et al.  A short survey on image steganography and steganalysis techniques , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[46]  Yaojie Lu,et al.  Shallow Convolutional Neural Network for Implicit Discourse Relation Recognition , 2015, EMNLP.

[47]  Xuyun Zhang,et al.  A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.

[48]  Aakaash Jois,et al.  Survey on LSB Data hiding techniques , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[49]  Wanchun Dou,et al.  Multiobjective computation offloading for workflow management in cloudlet‐based mobile cloud using NSGA‐II , 2018, Comput. Intell..

[50]  Andrew D. Ker,et al.  The Steganographer is the Outlier: Realistic Large-Scale Steganalysis , 2014, IEEE Transactions on Information Forensics and Security.

[51]  Jing Dong,et al.  Feature learning for steganalysis using convolutional neural networks , 2017, Multimedia Tools and Applications.

[52]  Jiangqun Ni,et al.  Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy , 2018, IEEE Signal Processing Letters.

[53]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[54]  Slawomir Grzonkowski,et al.  Enabling Trust in Deep Learning Models: A Digital Forensics Case Study , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[55]  Marc Chaumont,et al.  Color Image Steganalysis Based On Steerable Gaussian Filters Bank , 2016, IH&MMSec.

[56]  Zdenek Becvar,et al.  Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.

[57]  Xian-Ting Zeng,et al.  Lossless Data Hiding Scheme Based on Adjacent Pixel Difference , 2009, 2009 International Conference on Computer Engineering and Technology.

[58]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[59]  Yan Liu,et al.  Deep residual learning for image steganalysis , 2018, Multimedia Tools and Applications.

[60]  Chang-Tsun Li,et al.  A Multi-Task Learning CNN for Image Steganalysis , 2018, 2018 IEEE International Workshop on Information Forensics and Security (WIFS).

[61]  Qi Ke,et al.  Image Steganalysis via Multi-Column Convolutional Neural Network , 2018, 2018 14th IEEE International Conference on Signal Processing (ICSP).

[62]  Qun Li,et al.  A Survey of Fog Computing: Concepts, Applications and Issues , 2015, Mobidata@MobiHoc.

[63]  Jiri Fridrich,et al.  Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[64]  Xuyun Zhang,et al.  A computation offloading method over big data for IoT-enabled cloud-edge computing , 2019, Future Gener. Comput. Syst..

[65]  Tong Li,et al.  Development of Private Processes: A Refinement Approach , 2019, IEEE Access.

[66]  Xinpeng Zhang,et al.  Selective Ensemble Classification of Image Steganalysis Via Deep Q Network , 2019, IEEE Signal Processing Letters.

[67]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[68]  Xuyun Zhang,et al.  A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.

[69]  Tao Zhang,et al.  Deep neural networks for efficient steganographic payload location , 2019, Journal of Real-Time Image Processing.

[70]  B. Luo,et al.  A Color Images Steganography Method by Multiple Embedding Strategy Based on Sobel Operator , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[71]  Marc Chaumont,et al.  Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.

[72]  Siwei Lyu,et al.  Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.

[73]  Chuan Qin,et al.  Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.

[74]  Xingming Sun,et al.  Coverless Image Steganography Without Embedding , 2015, ICCCS.

[75]  Xuyun Zhang,et al.  A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems , 2017, Future Gener. Comput. Syst..

[76]  Jie Zhang,et al.  A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment , 2019, IEEE Transactions on Computational Social Systems.

[77]  Xuyun Zhang,et al.  An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..

[78]  Tao Huang,et al.  Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks , 2018, Secur. Commun. Networks.

[79]  Xiangyang Luo,et al.  Attack on Deep Steganalysis Neural Networks , 2018, ICCCS.

[80]  Leon A. Gatys,et al.  Image Style Transfer Using Convolutional Neural Networks , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[81]  Xihua Liu,et al.  Energy-Efficient Virtual Machine Scheduling across Cloudlets in Wireless Metropolitan Area Networks , 2020, Mob. Networks Appl..

[82]  N. Sruthi Das,et al.  Large-scale steganalysis using outlier detection method for image sharing application , 2015, 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015].

[83]  Amritpal Singh,et al.  An improved LSB based image steganography technique for RGB images , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[84]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[85]  Hany Farid,et al.  Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.

[86]  Yan Liu,et al.  A Novel Convolutional Neural Network for Image Steganalysis With Shared Normalization , 2017, IEEE Transactions on Multimedia.

[87]  Qiang He,et al.  Time-aware distributed service recommendation with privacy-preservation , 2019, Inf. Sci..

[88]  Qun Li,et al.  Fog Computing: Platform and Applications , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).

[89]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.