skip to main content
research-article

Steganographer Detection via Multi-Scale Embedding Probability Estimation

Authors Info & Claims
Published:16 December 2019Publication History
Skip Abstract Section

Abstract

Steganographer detection aims to identify the guilty user who utilizes steganographic methods to hide secret information in the spread of multimedia data, especially image data, from a large amount of innocent users on social networks. A true embedding probability map illustrates the probability distribution of embedding secret information in the corresponding images by specific steganographic methods and settings, which has been successfully used as the guidance for content-adaptive steganographic and steganalytic methods. Unfortunately, in real-world situation, the detailed steganographic settings adopted by the guilty user cannot be known in advance. It thus becomes necessary to propose an automatic embedding probability estimation method. In this article, we propose a novel content-adaptive steganographer detection method via embedding probability estimation. The embedding probability estimation is first formulated as a learning-based saliency detection problem and the multi-scale estimated map is then integrated into the CNN to extract steganalytic features. Finally, the guilty user is detected via an efficient Gaussian vote method with the extracted steganalytic features. The experimental results prove that the proposed method is superior to the state-of-the-art methods in both spatial and frequency domains.

Skip Supplemental Material Section

Supplemental Material

References

  1. Radhakrishna Achanta, Sheila Hemami, Francisco Estrada, and Sabine Susstrunk. 2009. Frequency-tuned salient region detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1597--1604.Google ScholarGoogle ScholarCross RefCross Ref
  2. Patrick Bas, Tomáš Filler, and Tomáš Pevný. 2011. “Break our steganographic system”: The ins and outs of organizing BOSS. In Proceedings of the International Conference on Information Hiding. 59--70.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ali Borji, Ming-Ming Cheng, Qibin Hou, Huaizu Jiang, and Jia Li. 2014. Salient object detection: A survey. Eprint Arxiv 16, 7 (2014), 3118.Google ScholarGoogle Scholar
  4. Markus M. Breunig. 2000. LOF: Identifying density-based local outliers. In Proceedings of the ACM SIGMOD International Conference on Management of Data. 93--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Matthias Carnein, Schöttle Pascal, and Böhme Rainer. 2014. Predictable rain?: Steganalysis of public-key steganography using wet paper codes. In Proceedings of the 2nd ACM Information Hiding 8 Workshop. 97--108.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Rémi Cogranne and Florent Retraint. 2013. Application of hypothesis testing theory for optimal detection of LSB matching data hiding. Sign. Process. 93, 7 (2013), 1724--1737.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Tomas Denemark, Mehdi Boroumand, and Jessica Fridrich. 2017. Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forens. Secur. 11, 8 (2017), 1736--1746.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Tomas Denemark, Vahid Sedighi, Vojtech Holub, Remi Cogranne, and Jessica Fridrich. 2014. Selection-channel-aware rich model for steganalysis of digital images. In Proceedings of the IEEE International Workshop on Information Forensics and Security. 48--53.Google ScholarGoogle ScholarCross RefCross Ref
  9. Lionel Fillatre. 2012. Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Sign. Process. 60, 2 (2012), 556--569.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Tomáš Filler and Jessica Fridrich. 2010. Gibbs construction in steganography. IEEE Trans. Inf. Forens. Secur. 5, 4 (2010), 705--720.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jessica Fridrich and Tomas Filler. 2007. Practical methods for minimizing embedding impact in steganography. In Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505. 650502.Google ScholarGoogle ScholarCross RefCross Ref
  12. Jessica Fridrich, Miroslav Goljan, and David Soukal. 2005. Efficient wet paper codes. In Proceedings of the International Workshop on Information Hiding. 204--218.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jessica Fridrich and Jan Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7, 3 (2012), 868--882.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Vojtech Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In Proceedings of the IEEE International Workshop on Information Forensics and Security. 234--239.Google ScholarGoogle ScholarCross RefCross Ref
  15. Vojtěch Holub, Jessica Fridrich, and Tomáš Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. Eurasip J. Inf. Secur. 2014, 1 (2014), 1--13.Google ScholarGoogle ScholarCross RefCross Ref
  16. A. Hornung, Y. Pritch, P. Krahenbuhl, and F. Perazzi. 2012. Saliency filters: Contrast based filtering for salient region detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 733--740.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Qibin Hou, Ming Ming Cheng, Xiaowei Hu, Ali Borji, Zhuowen Tu, and Philip Torr. 2016. Deeply supervised salient object detection with short connections. IEEE Trans. Pattern Anal. Mach. Intell. 41, 4 (2019), 815--828.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Donghui Hu, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, and Lina Wang. 2017. Adaptive steganalysis based on selection region and combined convolutional neural networks. Secur. Commun. Netw. 2017, 4 (2017), 1--9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ping Hu, Bing Shuai, Jun Liu, and Gang Wang. 2017. Deep level sets for salient object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 540--549.Google ScholarGoogle ScholarCross RefCross Ref
  20. Andrew D. Ker. 2006. Batch steganography and pooled steganalysis. In Proceedings of the International Conference on Information Hiding. Springer, 265--281.Google ScholarGoogle Scholar
  21. Andrew D. Ker. 2007. Batch steganography and the threshold game. In Security, Steganography, and Watermarking of Multimedia Contents IX. SPIE, 401--413.Google ScholarGoogle Scholar
  22. Andrew David Ker and Tomáš Pevný. 2012. Batch steganography in the real world. In Proceedings of the 14th ACM Workshop Multimedia Security (MM&Sec’’12). 1--10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Andrew D. Ker and Tomáš Pevný. 2012. Identifying a steganographer in realistic and heterogeneous data sets. In Proceedings of the SPIE, Media Watermark., Security, Forensics XIV. 265--298.Google ScholarGoogle Scholar
  24. Andrew D. Ker and Tomáš Pevný. 2012. A new paradigm for steganalysis via clustering. Proc. SPIE 7880, 2 (2012), 87--95.Google ScholarGoogle Scholar
  25. Andrew D. Ker and Tomáš Pevný. 2014. The steganographer is the outlier: Realistic large-scale steganalysis. IEEE Trans. Inf. Forens. Secur. 9, 9 (2014), 1424--1435.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Onkar Krishna and Kiyoharu Aizawa. 2018. Billboard saliency detection in street videos for adults and elderly. In Proceedings of the IEEE International Conference on Image Processing. 2326--2330.Google ScholarGoogle ScholarCross RefCross Ref
  27. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceedings of the International Conference on Neural Information Processing Systems. 1097--1105.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2015. A new cost function for spatial image steganography. In Proceedings of the IEEE International Conference on Image Processing. 4206--4210.Google ScholarGoogle Scholar
  29. Fengyong Li, Mi Wen, Jingsheng Lei, and Yanli Ren. 2017. Efficient steganographer detection over social networks with sampling reconstruction. Peer Peer Netw. Appl. 7 (2017), 1--16.Google ScholarGoogle Scholar
  30. Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Zhongqin Bi, and Chunhua Gu. 2017. Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans. Inf. Forens. Secur. 11, 2 (2017), 344--357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Guanbin Li and Yizhou Yu. 2015. Visual saliency based on multiscale deep features. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5455--5463.Google ScholarGoogle Scholar
  32. Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha, and Nenghai Yu. 2018. Side channel steganalysis: When behavior is considered in steganographer detection. Multimedia Tools and Applications (2018), 1--15.Google ScholarGoogle Scholar
  33. Xin Liao, Guoyong Chen, and Jiaojiao Yin. 2016. Content-adaptive steganalysis for color images. Secur. Commun. Netw. 9, 18 (2016), 5756--5763.Google ScholarGoogle ScholarCross RefCross Ref
  34. Guo Shiang Lin, Yi Ting Chang, and Wen Nung Lie. 2010. A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans. Multimedia 12, 5 (2010), 345--357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Tie Liu, Zejian Yuan, Jian Sun, Jingdong Wang, Nanning Zheng, Xiaoou Tang, and Heung Yeung Shum. 2011. Learning to detect a salient object. IEEE Trans. Pattern Anal. Mach. Intel. 33, 2 (2011), 353--367.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Weiqi Luo, Haodong Li, Qi Yan, Rui Yang, and Jiwu Huang. 2018. Improved audio steganalytic feature and its applications in audio forensics. ACM Trans. Multimedia Comput. Commun. Appl. 14, 2 (2018), 43:1--43:14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Zhiming Luo, Akshaya Mishra, Andrew Achkar, Justin Eichel, Shaozi Li, and Pierre Marc Jodoin. 2017. Non-local deep features for salient object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 6593--6601.Google ScholarGoogle ScholarCross RefCross Ref
  38. David R. Martin, Charless Fowlkes, Doron Tal, and Jitendra Malik. 2001. A database of human segmented natural images and its application to. IEEE Int. Conf. Comput. Vis. 2, 11 (2001), 416--423.Google ScholarGoogle Scholar
  39. N. N. A. Molok, S. Chang, and A. Ahmad. 2013. Disclosure of organizational information on social media: Perspectives from security managers. Nat. Protocols 4, 1 (2013), 102--106.Google ScholarGoogle Scholar
  40. Tomas Pevny and Jessica Fridrich. 2008. Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forens. Secur. 3, 4 (2008), 635--650.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Lionel Pibre, Jérôme Pasquet, Dino Ienco, and Marc Chaumont. 2016. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch. Electr. Imag. 4, 8 (2016), 1--11.Google ScholarGoogle ScholarCross RefCross Ref
  42. Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. 94090J.Google ScholarGoogle Scholar
  43. Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2017. Feature learning for steganalysis using convolutional neural networks. Multimedia Tools Appl. 77, 15 (2018), 19633--19657.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Bernhard Schölkopf, John Platt, and Thomas Hofmann. 2007. A kernel method for the two-sample-problem. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 513--520.Google ScholarGoogle ScholarCross RefCross Ref
  45. Vahid Sedighi, Rémi Cogranne, and Jessica Fridrich. 2015. Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forens. Secur. 11, 2 (2015), 221--234.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, and Pradeep K Atrey. 2017. Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Appl. 13, 3 (2017), 23.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Weixuan Tang, Haodong Li, Weiqi Luo, and Jiwu Huang. 2014. Adaptive steganalysis against WOW embedding algorithm. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 91--96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Weixuan Tang, Haodong Li, Weiqi Luo, and Jiwu Huang. 2016. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans. Inf. Forens. Secur. 11, 4 (2016), 734--745.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Weixuan Tang, Shunquan Tan, Bin Li, and Jiwu Huang. 2017. Automatic steganographic distortion learning using a generative adversarial network. IEEE Sign. Process. Lett. 24, 10 (2017), 1547--1551.Google ScholarGoogle ScholarCross RefCross Ref
  50. Songtao Wu, Shenghua Zhong, and Yan Liu. 2017. Deep residual learning for image steganalysis. Multimedia Tools Appl. (2017), 1--17. DOI:https://doi.org/10.1007/s11042-017-4440-4Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Songtao Wu, Shenghua Zhong, and Yan Liu. 2018. Deep residual learning for image steganalysis. Multimedia Tools Appl. 77, 9 (2018), 10437--10453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Zhihua Xia, Xinhui Wang, Xingming Sun, Quansheng Liu, and Naixue Xiong. 2016. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75, 4 (2016), 1947--1962.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Guanshuo Xu, Han Zhou Wu, and Yun Qing Shi. 2016. Structural design of convolutional neural networks for steganalysis. IEEE Sign. Process. Lett. 23, 5 (2016), 708--712.Google ScholarGoogle ScholarCross RefCross Ref
  54. Jianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, and Yunqing Shi. 2017. Steganalysis based on awareness of selection-channel and deep learning. In Proceedings of the International Workshop on Digital Watermarking. 263--272.Google ScholarGoogle ScholarCross RefCross Ref
  55. Xiaoshan Yang, Tianzhu Zhang, and Changsheng Xu. 2015. Cross-domain feature learning in multimedia. IEEE Trans. Multimedia 17, 1 (2015), 64--78.Google ScholarGoogle ScholarCross RefCross Ref
  56. Ying Yang and Ioannis Ivrissimtzis. 2014. Mesh discriminative features for 3D steganalysis. ACM Trans. Multimedia Comput. Commun. Appl. 10, 3 (2014), 27:1--27:13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Jian Ye, Jiangqun Ni, and Yang Yi. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forens. Secur. 12, 11 (2017), 2545--2557.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Hao Yin, Wen Hui, Hongzhi Li, Chuang Lin, and Wenwu Zhu. 2012. A novel large-scale digital forensics service platform for internet videos. IEEE Trans Multimedia 14, 1 (2012), 178--186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Peng Zhang, Tao Zhuo, Wei Huang, Kangli Chen, and Mohan Kankanhalli. 2017. Online object tracking based on CNN with spatial-temporal saliency guided sampling. Neurocomputing 257, 1 (2017), 115--127.Google ScholarGoogle ScholarCross RefCross Ref
  60. Xiang Zhang, Fei Peng, and Min Long. 2018. Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimedia 20, 12 (2018), 3223--3238.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Mingjie Zheng, Sheng-hua Zhong, Songtao Wu, and Jianmin Jiang. 2017. Steganographer detection via deep residual network. In Proceedings of the IEEE International Conference on Multimedia and Expo. 235--240.Google ScholarGoogle ScholarCross RefCross Ref
  62. Mingjie Zheng, Sheng-hua Zhong, Songtao Wu, and Jianmin Jiang. 2018. Steganographer detection based on multiclass dilated residual networks. In Proceedings of the ACM International Conference on Multimedia Retrieval. 300--308.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Hang Zhou, Kejiang Chen, Weiming Zhang, and Nenghai Yu. 2017. Comments on “steganography using reversible texture synthesis.” IEEE Trans. Image Process. 26, 4 (2017), 1623.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Steganographer Detection via Multi-Scale Embedding Probability Estimation

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!