Abstract
Methods for early detection of sensitive information leakage by data transmission in open (public) communication systems have been of special interest. Reliable detection of modified (stego) cover files, like digital images, requires usage of computation-intensive methods of statistical steganalysis, namely covering rich models and deep convolutional neural networks. Necessity of fine- tuning parameters of such methods to minimize detection accuracy for each embedding methods has made fast re- train of stegdetectors in real cases impossible. Therefore, development of low-complexity methods for detection of weak alterations of cover image parameters under limited prior information about used embedding methods has been required. For solving this task, we have proposed to use special architectures of artificial neural networks, such as denoising autoencoder. Ability of such networks to estimate parameters of original (cover) image from the noisy ones under limited prior information about introduced alterations has made them an attractive alternative to state- of-the-art solutions. The results of performance evaluation for shallow denoising autoencoders showed increasing of detection accuracy (up to 0.1 for Matthews correlation coefficient) in comparison with the state-of-the-art stegdetectors by preserving low-computation complexity of network retraining.
Publisher
Lviv Polytechnic National University
Reference32 articles.
1. J.-P. A. Yaacoub, O. Salman, H. N. Noura, N. Kaaniche, A. Chehab, M. Malli. "Cyber-physical systems security: Limitations, issues and future trends", Microprocessors and Microsystems, vol. 77, 2020. [Online]. DOI: 10.1016/j.micpro.2020.103201
2. D. Legezo. "MontysThree: Industrial espionage with steganography and a Russian accent on both sides", SecureList. Available at:: https://securelist.com/montysthree-industrial- espionage/98972/ (Accessed 2022-March-30).
3. V. Kopeytsev. "Steganograph in attacks on industrial enterprises". Kaspersky Inc., Tech. Rep, 2020. [Online] Available at:https://ics-cert.kaspersky.com/media/KASPER- SKY_Steganography_in_targeted_attacks_EN.pdf (Accessed: 10 November 2021)
4. J. Fridrich, J. Kodovsky. "Rich models for steganalysis of digital images", IEEE Transactions on Information Forensics and Security, vol. 7, iss. 3, 2012, pp. 868-882, DOI 10.1109/TIFS.2012.2190402.
5. M. Boroumand, M. Chen, J. Fridrich. "Deep Residual Network for Steganalysis of Digital Images", IEEE Transactions on Information Forensics and Security, vol. 14, iss. 5, 2018, pp. 1181-1193. DOI: 10.1109/TIFS.2018.2871749.