多媒体信息安全专刊

深度学习空域隐写分析的预处理层

展开
  • 1. 深圳大学 信息工程学院, 广东 深圳 518060;
    2. 深圳大学 计算机与科学学院, 广东 深圳 518060;
    3. 深圳大学 深圳市媒体内容安全重点实验室, 广东 深圳 518060

收稿日期: 2018-01-25

  网络出版日期: 2018-03-31

基金资助

国家自然科学基金(No.61572329,No.61772349)资助

Preprocessing Layer in Spatial Steganalysis Based on Deep Learning

Expand
  • 1. College of Information Engineering, Shenzhen University, Shenzhen 518060, Guangdong Province, China;
    2. College of Computer Science and Software Engineering, Shenzhen University, Shenzhen 518060, Guangdong Province, China;
    3. Shenzhen Key Lab of Media Security, Shenzhen University, Shenzhen 518060, Guangdong Province, China

Received date: 2018-01-25

  Online published: 2018-03-31

摘要

在一种具有预处理层的卷积神经网络模型基础上,对其高通滤波器预处理层进行改进,采用一组导数滤波器以获得线性及非线性残差图像,并对残差图像进行量化和截断操作,从而更加有效地提取图像特征.实验结果表明,与已有方法相比,尽管所提的3种方法对各空域隐写算法及各嵌入率下的性能表现并不一致,但这些方法均能显著提升隐写分析检测率.对于检测嵌入率为0.4 bpp的S-UNIWARD隐写算法,检测正确率提高了6%.

本文引用格式

史晓裕, 李斌, 谭舜泉 . 深度学习空域隐写分析的预处理层[J]. 应用科学学报, 2018 , 36(2) : 309 -320 . DOI: 10.3969/j.issn.0255-8297.2018.02.010

Abstract

In this paper, we propose some preprocessing methods to improve the performance of a well-designed convolution neural network based on the preprocessed layer. In the proposed methods, linear and nonlinear residuals are obtained by employing a set of derivative flters, and then quantized and truncated for the effective extraction. Experimental results show that the detection performances with the three proposed preprocessing methods are all improved. Although the improvements are not consistence under different spatial steganographic algorithms and different embedding rates. The detection performance is 6% better than the prior work for S-UNIWARD at 0.4bpp.

参考文献

[1] Fridrich J, Kodovský J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(3):868-882.
[2] Holub V, Fridrich J. Random projections of residuals for digital image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(12):1996-2006.
[3] Tang W, Li H, Luo W, Huang J. Adaptive steganalysis against WOW embedding algorithm[C]//Proceedings of the 2nd ACM Workshop on Information Hiding and Multimedia Security, 2014:91-96.
[4] Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J. Selection-channel-aware rich model for steganalysis of digital images[C]//International Workshop on Information Forensics and Security, 2014:48-53.
[5] Li B, Wang M, Huang J, Li X. A new cost function for spatial image steganography[C]//Proceedings of the 46th IEEE Conference on Image Process, Paris, France, 2014:4206-4210.
[6] Lecun Y, Boser B, Dener J S, Henderson D, Howard R, Hubbard W, Jackel L. Handwritten digit recognition with a back propagation neural network[C]//Advances in Neural Information Processing Systems, 1990:396-404.
[7] Krizhevsky A, Sutskever I, Hinton G. Image net classifcation with deep convolutional neural networks[C]//International Conference on Neural Information Processing, 2012:1106-1114.
[8] He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition[C]//IEEE Conference on Computer Vision and Pattern Recognition, 2016:770-778.
[9] Tan S, Li B. Stacked convolutional auto-encoders for steganalysis of digital images[C]//Proceedings of Signal and Information Processing Association Annual Summit and Conference, Siem Reap, Cambodia, 2014:1-4.
[10] Qian Y, Dong J, Wang W, Tan T. Deep learning for steganalysis via convolutional neural networks[C]//Proceedings of Media Water-marking Security and Forensics, 2015:94090J.
[11] Xu G, Wu H, Shi Y. Structural design of convolutional neural networks for steganalysis[J]. IEEE Signal Processing Letters, 2016, 23(5):708-712.
[12] Ioffe S, Szegedy C. Batch normalization:accelerating deep network training by reducing internal covariate shift[C]//International Conference on Machine Learning, 2015:448-456.
[13] Ye J, Ni J, Yi Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11):2545-2557.
[14] Bas P, Filler T, Pevný T. Break our steganographic system-the ins and outs of organizing BOSS[C]//Proceedings of IEEE Conference on Information Hiding, 2011:59-70.
[15] Clevert D, Unterthiner A, Hochreiter S. Fast and accurate deep network learning by exponential linear units[C]//ICLR2016, 2015, arXiv:1511.07289.
[16] Krizhevsky A, Sutskever I, Hinton G. Imagenet classifcation with deep convolutional neural networks[C]//Advances in Neural In formation Processing Systems, 2015:1097-1105.
[17] Li B, Li Z, Zhou S, Tan S, Zhang X. New steganalytic features for spatial image steganography based on derivative flters and threshold LBP operator[J]. IEEE Transactions on Information Forensics and Security, DOI:10.1109/TIFS.2017.2780805.
[18] Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain[J]. Journal on Information Security, 2014(1):1.
[19] Holub V, Fridrich J. Designing steganographic distortion using directional flters[C]//Proceedings of the IEEE International Workshop on Information Forensics and Security, 2012:234-239.
[20] Srivastava N, Hinton G, Krizhevsky A, Sutskever I, Salakhutdinov R. Dropout:a simple way to prevent neural networks from overftting[J]. Journal of Machine Learning Research, 2014, 15(1):1929-1958.

文章导航

/