Performance Analysis Of Stego Image Calibration With Usage Of Denoising Autoencoders

Author:

Progonov Dmytro,

Abstract

Methods for early detection of sensitive information leakage by data transmission in open (public) communication systems have been of special interest. Reliable detection of modified (stego) cover files, like digital images, requires usage of computation-intensive methods of statistical steganalysis, namely covering rich models and deep convolutional neural networks. Necessity of fine- tuning parameters of such methods to minimize detection accuracy for each embedding methods has made fast re- train of stegdetectors in real cases impossible. Therefore, development of low-complexity methods for detection of weak alterations of cover image parameters under limited prior information about used embedding methods has been required. For solving this task, we have proposed to use special architectures of artificial neural networks, such as denoising autoencoder. Ability of such networks to estimate parameters of original (cover) image from the noisy ones under limited prior information about introduced alterations has made them an attractive alternative to state- of-the-art solutions. The results of performance evaluation for shallow denoising autoencoders showed increasing of detection accuracy (up to 0.1 for Matthews correlation coefficient) in comparison with the state-of-the-art stegdetectors by preserving low-computation complexity of network retraining.

Publisher

Lviv Polytechnic National University

Subject

General Medicine

Reference32 articles.

1. J.-P. A. Yaacoub, O. Salman, H. N. Noura, N. Kaaniche, A. Chehab, M. Malli. "Cyber-physical systems security: Limitations, issues and future trends", Microprocessors and Microsystems, vol. 77, 2020. [Online]. DOI: 10.1016/j.micpro.2020.103201

2. D. Legezo. "MontysThree: Industrial espionage with steganography and a Russian accent on both sides", SecureList. Available at:: https://securelist.com/montysthree-industrial- espionage/98972/ (Accessed 2022-March-30).

3. V. Kopeytsev. "Steganograph in attacks on industrial enterprises". Kaspersky Inc., Tech. Rep, 2020. [Online] Available at:https://ics-cert.kaspersky.com/media/KASPER- SKY_Steganography_in_targeted_attacks_EN.pdf (Accessed: 10 November 2021)

4. J. Fridrich, J. Kodovsky. "Rich models for steganalysis of digital images", IEEE Transactions on Information Forensics and Security, vol. 7, iss. 3, 2012, pp. 868-882, DOI 10.1109/TIFS.2012.2190402.

5. M. Boroumand, M. Chen, J. Fridrich. "Deep Residual Network for Steganalysis of Digital Images", IEEE Transactions on Information Forensics and Security, vol. 14, iss. 5, 2018, pp. 1181-1193. DOI: 10.1109/TIFS.2018.2871749.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3