Image Steganography Analysis Based on Deep Learning

Received: 10 February 2020 Accepted: 16 March 2020 Despite the fact that steganalysis has grown quickly lately, it despite everything faces numerous troubles and difficulties. This paper proposed a steganalysis based on deep learning technique. The convolutional neural network method is used for steganalysis approach. The steganalysis approach utilizes the deep features extracted from the stego image. The approach uses global information for feature learning. The steganalysis is used to recognize the various kinds of steganalysis calculations. This paper also proposed a steganalysis based on low embedding rate images and multi-class steganography. The study on image steganogrphy using deep learning is discussed with their pros and cons.

[1]  Lei Guo,et al.  Object Detection in Optical Remote Sensing Images Based on Weakly Supervised Learning and High-Level Feature Learning , 2015, IEEE Transactions on Geoscience and Remote Sensing.

[2]  Vijay Kumar,et al.  Comprehensive survey of 3D image steganography techniques , 2018, IET Image Process..

[3]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[4]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[5]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[6]  Lei Guo,et al.  Predicting functional cortical ROIs via DTI-derived fiber shape models. , 2012, Cerebral cortex.

[7]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[8]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[9]  Deyu Meng,et al.  Co-Saliency Detection via a Self-Paced Multiple-Instance Learning Framework , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Yue Gao,et al.  Representative Discovery of Structure Cues for Weakly-Supervised Image Segmentation , 2014, IEEE Transactions on Multimedia.

[11]  Xiang Ji,et al.  Representing and Retrieving Video Shots in Human-Centric Brain Imaging Space , 2013, IEEE Transactions on Image Processing.

[12]  King Ngi Ngan,et al.  Unsupervised extraction of visual attention objects in color images , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Xiao Liu,et al.  Probabilistic Graphlet Cut: Exploiting Spatial Structure Cue for Weakly Supervised Image Segmentation , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.

[14]  Xuelong Li,et al.  Detection of Co-salient Objects by Looking Deep and Wide , 2016, International Journal of Computer Vision.

[15]  Xuelong Li,et al.  Spatial-Aware Object-Level Saliency Prediction by Learning Graphlet Hierarchies , 2015, IEEE Transactions on Industrial Electronics.

[16]  Feng Wu,et al.  Background Prior-Based Salient Object Detection via Deep Reconstruction Residual , 2015, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[18]  Kamred UdhamSingh A Survey on Image Steganography Techniques , 2014 .

[19]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[20]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[21]  Vijay Kumar,et al.  A reversible and affine invariant 3D data hiding technique based on difference shifting and logistic map , 2019, J. Ambient Intell. Humaniz. Comput..

[22]  Xuelong Li,et al.  A Fine-Grained Image Categorization System by Cellet-Encoded Spatial Pyramid Modeling , 2015, IEEE Transactions on Industrial Electronics.

[23]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[24]  Xuelong Li,et al.  Image Categorization by Learning a Propagated Graphlet Path , 2016, IEEE Transactions on Neural Networks and Learning Systems.