Abstract
Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-adaptive image steganography schemes. Multiple novel strategies are applied to improve detection performance. Two non-trainable convolutional layers is used to guide the proposed CNN with fixed kernels. Thirty-one kernels are used in both non-trainable layers, of which thirty are high-pass kernels and one is the neutral kernel. The layer-specific learning rate is applied for each layer. ReLU with customized thresholding is applied to achieve better performance. In the proposed method, image down-sampling is not performed; only the global average pooling layer is considered in the last part of the network. The experimental results are verified on BOWS2 and BOSSBase image sets. Content-adaptive steganography schemes, such as HILL, Mi-POD, S-UNIWARD, and WOW, are considered for generating the stego images with different payloads. In experimental analysis, the proposed scheme is compared with some of the latest schemes, where the proposed scheme outperforms other state-of-the-art techniques in the most cases.
Funder
Ministry of Science and ICT through the National Research Foundation of Korea
National Research Foundation of Korea (NRF) funded by the Ministry of Education
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference43 articles.
1. Li, B., Wang, M., Huang, J., and Li, X. (2014, January 27–30). A new cost function for spatial image steganography. Proceedings of the 2014 IEEE International Conference on Image Processing, ICIP 2014, Paris, France.
2. Content-Adaptive Steganography by Minimizing Statistical Detectability;IEEE Trans. Inf. Forensics Secur.,2016
3. Universal distortion function for steganography in an arbitrary domain;EURASIP J. Inf. Secur.,2014
4. Holub, V., and Fridrich, J. (2012, January 2–5). Designing steganographic distortion using directional filters. Proceedings of the WIFS 2012—Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Costa Adeje, Spain.
5. The USC-SIPI Image Database: Version 5;USC-SIPI Rep.,2006
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献