Abstract
In recent times, deep learning-based steganalysis classifiers have become popular due to their state-of-the-art performance. Most deep steganalysis classifiers usually extract noise residuals using high-pass filters as preprocessing steps and feed them to their deep model for classification. It is observed that recent steganographic embedding does not always restrict their embedding in the high-frequency zone; instead, they distribute it as per embedding policy. Therefore, besides noise residual, learning the embedding zone is another challenging task. In this work, unlike the conventional approaches, the proposed model first extracts the noise residual using learned denoising kernels to boost the signal-to-noise ratio. After preprocessing, the sparse noise residuals are fed to a novel Multi-Contextual Convolutional Neural Network (M-CNET) that uses heterogeneous context size to learn the sparse and low-amplitude representation of noise residuals. The model performance is further improved by incorporating the Self-Attention module to focus on the areas prone to steganalytic embedding. A set of comprehensive experiments is performed to show the proposed scheme’s efficacy over the prior arts. Besides, an ablation study is given to justify the contribution of various modules of the proposed architecture.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18545-w/MediaObjects/11042_2024_18545_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18545-w/MediaObjects/11042_2024_18545_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18545-w/MediaObjects/11042_2024_18545_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18545-w/MediaObjects/11042_2024_18545_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18545-w/MediaObjects/11042_2024_18545_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-024-18545-w/MediaObjects/11042_2024_18545_Fig6_HTML.png)
Similar content being viewed by others
Notes
The code for steganography algorithms are downloaded from http://dde.binghamton.edu/download/stego_algorithms/
code to compute WAUC is downloaded from: https://www.kaggle.com/c/alaska2-image-steganalysis/overview/evaluation
Imagenet images are first converted to grayscale using rgb2gray and then resized to \(256\times 256\) using imresize function of Matlab before the embedding.
References
Bas P, Filler T, Pevnỳ T (2011) “break our steganographic system”: the ins and outs of organizing boss. In: International workshop on information hiding. Springer, pp 59–70
Bas P, Furon T (2007) Bows-2 (2007). Software available from:\(\{\)http://bows2. gipsa-lab. inpg. fr\(\}\)
Bengio Y (2012) Deep learning of representations for unsupervised and transfer learning. In: Proceedings of ICML workshop on unsupervised and transfer learning. pp 17–36
Bengio Y, Lamblin P, Popovici D, Larochelle H (2007) Greedy layer-wise training of deep networks. In: Advances in neural information processing systems. pp 153–160
Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensic Secur 14(5):1181–1193
Cogranne R, Giboulot Q, Bas P (2020) ALASKA-2: challenging academic research on steganalysis with realistic images. In: IEEE international workshop on information forensics and security
Deng J, Dong W, Socher R, Li LJ, Li K, Fei-Fei L (2009) ImageNet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 248–255
Drucker H, Burges CJ, Kaufman L, Smola AJ, Vapnik V (1997) Support vector regression machines. In: Advances in neural information processing systems. pp 155–161
Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensic Secur 5(4):705–720
Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensic Secur 6(3):920–935
Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensic Secur 7(3):868–882
Fridrich J, Kodovskỳ J, Holub V, Goljan M (2011) Steganalysis of content-adaptive steganography in spatial domain. In: Information hiding 13th international conference, IH 2011, Prague, Czech Republic, pp 102–117
Geyer CJ (1992) Practical Markov chain Monte Carlo. Statistical science pp 473–483
Glorot X, Bengio Y (2010) Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the thirteenth international conference on artificial intelligence and statistics. pp 249–256
He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on ImageNet classification. In: Proceedings of the IEEE international conference on computer vision. pp 1026–1034
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 234–239
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014(1):1
Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning. PMLR, pp 448–456
Kaur M, AlZubi AA, Singh D, Kumar V, Lee HN (2023) Lightweight biomedical image encryption approach. IEEE Access 11:74048–74057. https://doi.org/10.1109/ACCESS.2023.3294570
Kaur M, AlZubi AA, Walia TS, Yadav V, Kumar N, Singh D, Lee HN (2023) EGCrypto: a low-complexity elliptic Galois cryptography model for secure data transmission in IoT. IEEE Access 11:90739–90748. https://doi.org/10.1109/ACCESS.2023.3305271
Ker AD, Pevny T (2012) Batch steganography in the real world. In: Proceedings of the on multimedia and security. pp 1–10
Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. In: International conference on learning representations
Kodovsky J, Fridrich J, Holub V (2011) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensic Secur 7(2):432–444
Larsson G, Maire M, Shakhnarovich G (2016) Fractalnet: ultra-deep neural networks without residuals. In: International conference on learning representations
Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inf Hiding Multimed Signal Proc 2(2):142–172
Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International conference on image processing (ICIP). IEEE, pp 4206–4210
Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensic Secur 10(9):1905–1917
Li B, Wei W, Ferreira A, Tan S (2018) ReST-Net: diverse activation modules and parallel subnets-based CNN for spatial image steganalysis. IEEE Signal Proc Lett 25(5):650–654
Maas AL, Hannun AY, Ng AY (2013) Rectifier nonlinearities improve neural network acoustic models. In: Proc ICML, vol 30, p 3
Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein N, Antiga L et al (2019) Pytorch: an imperative style, high-performance deep learning library. In: Advances in neural information processing systems. pp 8026–8037
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensic Secur 5(2):215–224
Pevny T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Information hiding
Pevnỳ T, Ker AD (2015) Towards dependable steganalysis. In: Media watermarking, security, and forensics 2015, vol 9409, p 94090I. International Society for Optics and Photonics
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32–44
Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Media watermarking, security, and forensics 2015, vol 9409, p 94090J. International Society for Optics and Photonics (2015)
Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE international conference on image processing (ICIP). IEEE, pp 2752–2756
Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensic Secur 11(2):221–234
Singh B, Chhajed M, Sur A, Mitra P (2020) Steganalysis using learned denoising kernels. Multimed Tool Appl pp 1–15
Singh B, Sharma PK, Saxena R, Sur A, Mitra P (2019) A new steganalysis method using densely connected convnets. In: International conference on pattern recognition and machine intelligence. Springer, pp 277–285
Singh B, Sur A, Mitra P (2021) Steganalysis of digital images using deep fractal network. IEEE Trans Comput Social Syst 8(3):599–606
Song X, Liu F, Yang C, Luo X, Zhang Y (2015) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM workshop on information hiding and multimedia security. pp 15–23
Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific. IEEE, pp 1–4
Tang W, Li B, Luo W, Huang J (2015) Clustering steganographic modification directions for color components. IEEE Signal Proc Lett 23(2):197–201
Wang X, Chen Y, Zhu W (2021) A survey on curriculum learning. IEEE Trans Pattern Anal Mach Intell 44(9):4555–4576
Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Proc Lett 23(5):708–712
Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensic Secur 12(11):2545–2557
Yedroudj M, Comby F, Chaumont M (2018) Yedroudj-net: an efficient CNN for spatial steganalysis. In: 2018 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2092–2096
You W, Zhang H, Zhao X (2020) A Siamese CNN for image steganalysis. IEEE Trans Inf Forensic Secur 16:291–306
Zhang H, Goodfellow I, Metaxas D, Odena A (2019) Self-attention generative adversarial networks. In: International conference on machine learning. PMLR, pp 7354–7363
Funding
This work is supported by the Ministry of Human Resource Development, Govt. of India. We also acknowledge the Department of Biotechnology, Govt. of India for the financial support for the project BT/COE/34/SP28408/2018.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Singh, B., Sur, A. & Mitra, P. Multi-contextual design of convolutional neural network for steganalysis. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18545-w
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11042-024-18545-w