Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 2314860, 9 pages
https://doi.org/10.1155/2017/2314860
Research Article

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks

1School of Computer and Information, Hefei University of Technology, Hefei 230009, China
2School of Computer and Information, Wuhan University, Wuhan 430072, China

Correspondence should be addressed to Donghui Hu; nc.ude.tufh@hduh

Received 19 September 2017; Accepted 23 October 2017; Published 12 November 2017

Academic Editor: Zhenxing Qian

Copyright © 2017 Donghui Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding—a survey,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1062–1078, 1999. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Filler and J. Fridrich, “Gibbs construction in steganography,” IEEE Transactions on Information Forensics Security, vol. 5, no. 4, pp. 705–720, 2010. View at Google Scholar
  3. V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in Proceedings of the IEEE International Workshop on Information Forensics and Security, WIFS 2012, pp. 234–239, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganography in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, article 1, 2014. View at Publisher · View at Google Scholar · View at Scopus
  5. B. Li, M. Wang, J. Huang, and X. Li, “A new cost function for spatial image steganography,” in Proceedings of the IEEE International Conference on Image Processing, pp. 4206–4210, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Transactions on Information Forensics Security, vol. 6, no. 3, pp. 920–935, 2011. View at Google Scholar
  7. J. Fridrich and J. Kodovsky, “Rich models for steganalysis of digital images,” IEEE Transactions on Information Forensics Security, vol. 7, no. 3, pp. 868–882, 2012. View at Google Scholar
  8. W. Tang, H. Li, W. Luo, and J. Huang, “Adaptive steganalysis against WOW embedding algorithm,” in Proceedings of the the 2nd ACM workshop, pp. 91–96, Salzburg, Austria, June 2014. View at Publisher · View at Google Scholar
  9. W. Tang, H. Li, W. Luo, and J. Huang, “Adaptive steganalysis based on embedding probabilities of pixels,” IEEE Transactions on Information Forensics Security, vol. 11, no. 4, pp. 734–745, 2016. View at Google Scholar
  10. T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and J. Fridrich, “Selection-channel-aware rich model for Steganalysis of digital images,” in Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, WIFS 2014, pp. 48–53, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2323, 1998. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Qian, J. Dong, W. Wang, and T. Tan, “Deep learning for steganalysis via convolutional neural networks,” in Proceedings of the IS&T/SPIE Electronic Imaging, p. 94090J, San Francisco, Calif, USA. View at Publisher · View at Google Scholar
  13. Y. Qian, J. Dong, W. Wang, and T. Tan, “Learning and transferring representations for image steganalysis using convolutional neural network,” in Proceedings of the 23rd IEEE International Conference on Image Processing, ICIP 2016, pp. 2752–2756, September 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Xu, H. Wu, and Y. Q. Shi, “Ensemble of CNNs for Steganalysis: An empirical study,” in Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, pp. 103–107, ACM, June 2016. View at Publisher · View at Google Scholar
  15. G. Xu, H.-Z. Wu, and Y.-Q. Shi, “Structural design of convolutional neural networks for steganalysis,” IEEE Signal Processing Letters, vol. 23, no. 5, pp. 708–712, 2016. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Zeng, S. Tan, B. Li, and J. Huang, “Large-scale jpeg steganalysis using hybrid deep-learning framework,” 2017.
  17. J. Zeng, S. Tan, and B. Li, “Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis,” in Proceedings of the Media Watermarking, Security, and Forensics, Part of IS&T International Symposium on Electronic Imaging (EI ’17), Burlingame, Calif, USA, Juanuary-February 2017.
  18. J. Ni, J. Ye, and Y. I. Yang, “Deep learning hierarchical representations for image steganalysis,” IEEE Transactions on Information Forensics Security, 2017. View at Google Scholar
  19. J. Yang, K. Liu, X. Kang, E. Wong, and Y. Shi, “Steganalysis Based on Awareness of Selection-Channel and Deep Learning,” in Digital Forensics and Watermarking, vol. 10431 of Lecture Notes in Computer Science, pp. 263–272, Springer International Publishing, 2017. View at Publisher · View at Google Scholar
  20. C. Szegedy, W. Liu, Y. Jia et al., “Going deeper with convolutions,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR '15), pp. 1–9, Boston, Mass, USA, June 2015. View at Publisher · View at Google Scholar
  21. J. Fridrich and T. Filler, “Practical methods for minimizing embedding impact in steganography,” in Proceedings of the Electronic Imaging, p. 650502, San Jose, Calif, USA, 2007. View at Publisher · View at Google Scholar
  22. V. Sedighi and J. Fridrich, “Effect of imprecise knowledge of the selection channel on steganalysis,” in Proceedings of the 3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015, pp. 33–42, June 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. G. Hinton E, N. Srivastava, and A. Krizhevsky, “Improving neural networks by preventing co-adaptation of feature detectors,” Computer Science, vol. 3, no. 4, pp. 212–223, 2012. View at Google Scholar
  24. S. Ioffe and C. Szegedy, “Batch normalization: Accelerating deep network training by reducing internal covariate shift,” https://arxiv.org/abs/1502.03167.
  25. P. Bas, T. Filler, and T. Pevný, “”Break Our Steganographic System”: The Ins and Outs of Organizing BOSS,” in Information Hiding, vol. 6958 of Lecture Notes in Computer Science, pp. 59–70, Springer Berlin Heidelberg, Berlin, Heidelberg, 2011. View at Publisher · View at Google Scholar
  26. J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media,” IEEE Transactions on Information Forensics Security, vol. 7, no. 2, pp. 432–444, 2012. View at Google Scholar
  27. Y. Jia, E. Shelhamer, J. Donahue et al., “Caffe: convolutional architecture for fast feature embedding,” in Proceedings of the ACM International Conference on Multimedia, pp. 675–678, ACM, Orlando, Fla, USA, November 2014. View at Publisher · View at Google Scholar
  28. J. Sanders and E. Kandrot, CUDA by Example: An Introduction to General-Purpose GPU Programming, Addison-Wesley Professional, 2010, Addison-Wesley Professional.