Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (4): 157-169.doi: 10.19665/j.issn1001-2400.2023.04.016
• Special Issue on Cyberspace Security • Previous Articles Next Articles
FAN Wentong1,2,3(),LI Zhenyu1,2,3(),ZHANG Tao4(),LUO Xiangyang1,2,3()
Received:
2023-01-15
Online:
2023-08-20
Published:
2023-10-17
Contact:
Zhenyu LI
E-mail:fftxxgc@sina.com;li1989zhenyu@126.com;tzhang@cslg.edu.cn;luoxy_ieu@sina.com
CLC Number:
FAN Wentong,LI Zhenyu,ZHANG Tao,LUO Xiangyang. JPEG image steganalysis based on deep extraction of stego noise[J].Journal of Xidian University, 2023, 50(4): 157-169.
"
隐写 算法 | 嵌入率/ bpnzap | 质量因子为75 | 质量因子为85 | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
SNdesNet | EWNet | SRNet | CSANet | J-XuNet | SNdesNet | EWNet | SRNet | CSANet | J-XuNet | ||
J- | 0.5 | 0.091 6 | 0.062 5 | 0.106 2 | 0.088 2 | 0.196 6 | 0.169 5 | 0.173 0 | 0.181 4 | 0.181 6 | 0.274 8 |
UNIWARD | 0.4 | 0.116 6 | 0.099 5 | 0.131 3 | 0.114 7 | 0.248 4 | 0.231 1 | 0.246 5 | 0.243 5 | 0.235 3 | 0.330 9 |
0.3 | 0.198 3 | 0.174 5 | 0.225 0 | 0.196 9 | 0.296 8 | 0.280 5 | 0.301 0 | 0.304 2 | 0.302 5 | 0.397 7 | |
0.2 | 0.261 9 | 0.248 5 | 0.297 4 | 0.254 3 | 0.386 5 | 0.339 3 | 0.361 5 | 0.377 1 | 0.360 4 | 0.465 4 | |
0.1 | 0.390 1 | 0.377 5 | 0.406 4 | 0.388 3 | 0.454 4 | 0.428 5 | 0.423 0 | 0.445 3 | 0.450 3 | 0.487 6 | |
UED-JC | 0.5 | 0.032 6 | 0.003 5 | 0.046 1 | 0.014 2 | 0.077 5 | 0.078 5 | 0.087 0 | 0.091 9 | 0.116 4 | 0.187 6 |
0.4 | 0.066 5 | 0.024 5 | 0.084 1 | 0.037 5 | 0.114 0 | 0.114 6 | 0.118 5 | 0.132 3 | 0.141 7 | 0.228 4 | |
0.3 | 0.087 4 | 0.039 5 | 0.131 5 | 0.051 4 | 0.157 3 | 0.168 5 | 0.160 5 | 0.204 6 | 0.166 3 | 0.284 5 | |
0.2 | 0.120 2 | 0.093 5 | 0.172 6 | 0.089 2 | 0.206 1 | 0.197 2 | 0.185 5 | 0.234 4 | 0.224 7 | 0.346 4 | |
0.1 | 0.204 6 | 0.196 5 | 0.226 1 | 0.204 1 | 0.262 4 | 0.321 9 | 0.304 5 | 0.335 1 | 0.311 4 | 0.417 3 |
[1] | XIANG S J, LUO X R. Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key Cryptosystem[J]. Journal of Software, 2016, 27(6):1592-1601. |
[2] |
MANDAL P C, MUKHERJEE I, PAUL G, et al. Digital Image Steganography:A Literature Survey[J]. Information Sciences, 2022, 609:1451-1488.
doi: 10.1016/j.ins.2022.07.120 |
[3] |
NISSAR A, MIR A H. Classification of Steganalysis Techniques:A Study[J]. Digital Signal Processing, 2010, 20(6):1758-1770.
doi: 10.1016/j.dsp.2010.02.003 |
[4] | 翟黎明, 嘉炬, 任魏翔, 等. 深度学习在图像隐写术与隐写分析领域中的研究进展[J]. 信息安全学报, 2018, 3(6):2-12. |
ZHAI Liming, JIA Ju, REN Weixiang, et al. Recent Advances in Deep Learning for Image Steganography and Steganalysis[J]. Journal of Cyber Security, 2018, 3(6):2-12. | |
[5] |
FRIDRICH J, KODOVSKY J. Rich Models for Steganalysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):868-882.
doi: 10.1109/TIFS.2012.2190402 |
[6] | HOLUB V, FRIDRICH J. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J]. IEEE Transactions on Information Forensics and Security, 2014, 10(2):219-228. |
[7] | HOLUB V, FRIDRICH J. Phase-Aware Projection Model for Steganalysis of JPEG Images[C]// Media Watermarking,Security,and Forensics 2015. San Francisco: SPIE, 2015:259-269. |
[8] | SONG X, LIU F, YANG C, et al. Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters[C]// Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2015:15-23. |
[9] |
SU W, NI J, HU X, et al. Towards Improving the Security of Image Steganography via Minimizing the Spatial Embedding Impact[J]. Digital Signal Processing, 2022, 131:103758.
doi: 10.1016/j.dsp.2022.103758 |
[10] | 邱应强, 蔡灿辉, 曾焕强, 等. 可自纠错的联合式加密图像可逆数据隐藏算法[J]. 西安电子科技大学学报, 2021, 48(1):107-116. |
QIU Yingqiang, CAI Canhui, ZENG Huanqiang, et al. Joint Reversible Data Hiding in Encrypted Images with the Self-Correcting Ability[J]. Journal of Xidian University, 2021, 48(1):107-116. | |
[11] | 陈君夫, 付章杰, 张卫明, 等. 基于深度学习的图像隐写分析综述[J]. 软件学报, 2021, 32(2):551-578. |
CHEN Junfu, FU Zhangjie, ZHANG Weiming, et al. Review of Image Steganalysis Based on Deep Learning[J]. Journal of Software, 2021, 32(2):551-578. | |
[12] |
KHAN A, SOHAIL A, ZAHOORA U, et al. A Survey of the Recent Architectures of Deep Convolutional Neural Networks[J]. Artificial Intelligence Review, 2020, 53:5455-5516.
doi: 10.1007/s10462-020-09825-6 |
[13] |
王晓丹, 李京泰, 宋亚飞. DDAC:面向卷积神经网络图像隐写分析模型的特征提取方法[J]. 通信学报, 2022, 43(5):68-81.
doi: 10.11959/j.issn.1000-436x.2022089 |
WANG Xiaodan, LI Jingtai, SONG Yafei. DDAC:A Feature Extraction Method for Model of Image Steganalysis Based on Convolutional Neural Network[J]. Journal on Communications, 2022, 43(5):68-81.
doi: 10.11959/j.issn.1000-436x.2022089 |
|
[14] | TAN S, LI B. Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images[C]// Signal and Information Processing Association Annual Summit and Conference (APSIPA).Piscataway:IEEE, 2014:1-4. |
[15] | QIAN Y, DONG J, WANG W, et al. Deep Learning for Steganalysis via Convolutional Neural Networks[C]// Media Watermarking,Security,and Forensics 2015. San Francisco: SPIE, 2015:171-180. |
[16] |
XU G, WU H Z, SHI Y Q. Structural Design of Convolutional Neural Networks for Steganalysis[J]. IEEE Signal Processing Letters, 2016, 23(5):708-712.
doi: 10.1109/LSP.2016.2548421 |
[17] |
YE J, NI J, YI Y. Deep Learning Hierarchical Representations for Image Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11):2545-2557.
doi: 10.1109/TIFS.2017.2710946 |
[18] |
ZHANG R, ZHU F, LIU J, et al. Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2019, 15:1138-1150.
doi: 10.1109/TIFS.10206 |
[19] | TSANG C F, FRIDRICH J. Steganalyzing Images of Arbitrary Size with CNNs[J]. Electronic Imaging, 2018, 2018(7):121-1-121-8. |
[20] |
YOU W, ZHANG H, ZHAO X. A Siamese CNN for Image Steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2020, 16:291-306.
doi: 10.1109/TIFS.10206 |
[21] | ZENG J, TAN S, LI B, et al. Pre-Training via Fitting Deep Neural Network to Rich-Model Features Extraction Procedure and Its Effect on Deep Learning for Steganalysis[J]. Electronic Imaging, 2017, 2017(7):44-49. |
[22] |
ZENG J, TAN S, LI B, et al. Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework[J]. IEEE Transactions on Information Forensics and Security, 2017, 13(5):1200-1214.
doi: 10.1109/TIFS.2017.2779446 |
[23] | XU G. Deep Convolutional Neural Network to Detect J-UNIWARD[C]// Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2017:67-73. |
[24] |
BOROUMAND M, CHEN M, FRIDRICH J. Deep Residual Network for Steganalysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security, 2018, 14(5):1181-1193.
doi: 10.1109/TIFS.2018.2871749 |
[25] | SU A, ZHAO X, HE X. Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network[C]// International Workshop on Digital Watermarking.Heidelberg:Springer, 2021:197-211. |
[26] | LIU Q, NI J, JIAN M. Effective JPEG Steganalysis Using Non-Linear Pre-Processing and Residual Channel-Spatial Attention[C]// 2022 IEEE International Conference on Multimedia and Expo (ICME).Piscataway:IEEE, 2022:1-6. |
[27] | ZHUO S, JIN Z, ZOU W, et al. RIDNet:Recursive Information Distillation Network for Color Image Denoising[C]// Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops.Piscataway:IEEE, 2019:3896-3903. |
[28] | EBRAHIMI M S, ABADI H K. Study of Residual Networks for Image Recognition[C]// Intelligent Computing:Proceedings of the 2021 Computing Conference.Heidelberg:Springer, 2021:754-763. |
[29] |
SETIADI D R I M. PSNR vs SSIM:Imperceptibility Quality Assessment for Image Steganography[J]. Multimedia Tools and Applications, 2021, 80(6):8423-8444.
doi: 10.1007/s11042-020-10035-z |
[30] | LIU Z, LIN Y, CAO Y, et al. Swin Transformer:Hierarchical Vision Transformer Using Shifted Windows[C]// Proceedings of the IEEE/CVF International Conference on Computer Vision.Piscataway:IEEE, 2021:10012-10022. |
[31] | BAS P, FILLER T, PEVNY T. “Break Our Steganographic System”:The Ins and Outs of Organizing BOSS[C]// International Workshop on Information Hiding.Heidelberg:Springer, 2011:59-70. |
[32] | BAS P, FURON T. BOWS-2 Contest(Break Our Watermarking System)(2021)[OB/OL].[2021-12-12]. http://bows2.eclille.fr/. |
[33] | HOLUB V, FRIDRICH J. Digital Image SteganographyUsing Universal Distortion[C]// Proceedings of the first ACM Workshop on Information Hiding and Multimedia Security. New York: ACM, 2013:59-68. |
[34] |
GUO L, NI J, SHI Y Q. Uniform Embedding for Efficient JPEG Steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5):814-825.
doi: 10.1109/TIFS.2014.2312817 |
[35] |
ZHANG J, CHEN K, QIN C, et al. Distribution-Preserving-Based Automatic Data Augmentation for Deep Image Steganalysis[J]. IEEE Transactions on Multimedia, 2021, 24:4538-4550.
doi: 10.1109/TMM.2021.3119994 |
[36] |
ZHANG K, ZUO W, CHEN Y, et al. Beyond a Gaussian Denoiser:Residual Learning of Deep CNN for Image Denoising[J]. IEEE Transactions on Image Processing, 2017, 26(7):3142-3155.
doi: 10.1109/TIP.83 |
[37] | ZAMIR S W, ARORA A, KHAN S, et al. Learning Enriched Features for Real Image Restoration and Enhancement[C]// European Conference on Computer Vision.Heidelberg:Springer, 2020:492-511. |
[1] | WANG Yuhua,GAO Sheng,ZHU Jianming,HUANG Chen. Efficient deep learning scheme with adaptive differential privacy [J]. Journal of Xidian University, 2023, 50(4): 54-64. |
[2] | WANG Juan,LIU Zishan,WU Minghu,CHEN Guanhai,GUO Liquan. Multi-scale object detection algorithm combined with super-resolution reconstruction technology [J]. Journal of Xidian University, 2023, 50(3): 122-131. |
[3] | XIE Wen,HUA Wenqiang,JIAO Licheng,WANG Ruonan. Review on polarimetric SAR terrain classification methods using deep learning [J]. Journal of Xidian University, 2023, 50(3): 151-170. |
[4] | ZHOU Shuo,ZHOU Yiqing,ZHANG Chong,XING Wang. ResNet enabled joint channel estimation and signal detection for OTFS [J]. Journal of Xidian University, 2023, 50(3): 19-30. |
[5] | WANG Keyan,CHENG Jicong,HUANG Shirui,CAI Kunlun,WANG Weiran,LI Yunsong. Low-light image dehazing network with aggregated context-aware attention [J]. Journal of Xidian University, 2023, 50(2): 23-32. |
[6] | LIU Bochong, CAI Huaiyu, YANG Shiyuan, LI Haotian, WANG Yi, CHEN Xiaodong. Lightweight semantic segmentation network for autonomous driving scenarios [J]. Journal of Xidian University, 2023, 50(1): 118-128. |
[7] | ZHANG Qiang, YANG Xinpeng, ZHAO Shixiang, WEI Dongdong, HAN Zhen. Vehicle-target detection network for SAR images based on the attention mechanism [J]. Journal of Xidian University, 2023, 50(1): 36-47. |
[8] | LIU Xiaowen, GUO Jichang, ZHENG Sida. Weakly-supervised salient object detection with the multi-scale progressive network [J]. Journal of Xidian University, 2023, 50(1): 48-57. |
[9] | ZHANG Zehuan, LIU Qiang, GUO Difei. High efficient framework for large-scale zero-shot image recognition [J]. Journal of Xidian University, 2022, 49(6): 103-110. |
[10] | LI Jiaojiao, LIU Zhiqiang, SONG Rui, LI Yunsong. Algorithm for segmentation of remote sensing imagery using the improved Unet [J]. Journal of Xidian University, 2022, 49(6): 67-75. |
[11] | ZHANG Zhaoyu,TIAN Chunna,ZHOU Heng,TIAN Xilan. Online classification jointed RGBT tracking based on the dual attention Siamese network [J]. Journal of Xidian University, 2022, 49(6): 76-85. |
[12] | WANG Kan, WANG Mengyang, LIU Xin, TIAN Guoqiang, LI Chuan, LIU Wei. Event detection by combining self-attention and CNN-BiGRU [J]. Journal of Xidian University, 2022, 49(5): 181-188. |
[13] | QI Peihan,LI Bing,XIE Aiping,GAO Xianglan. Deep learning reconstruction algorithm for incomplete samples of frequency hopping communication signals [J]. Journal of Xidian University, 2022, 49(4): 1-7. |
[14] | MA Lun,LIU Xin,ZHAO Bin,WANG Ruiping,LIAO Guisheng,ZHANG Yajing. Impaired behavior recognition by using the multi-head-siamese neural network [J]. Journal of Xidian University, 2022, 49(4): 100-108. |
[15] | JING Peiguang,LI Yaxin,SU Yuting. Micro-video multi-label classification method based on multi-modal feature encoding [J]. Journal of Xidian University, 2022, 49(4): 109-117. |
|