Abstract
Steganographer detection aims to identify the guilty user who utilizes steganographic methods to hide secret information in the spread of multimedia data, especially image data, from a large amount of innocent users on social networks. A true embedding probability map illustrates the probability distribution of embedding secret information in the corresponding images by specific steganographic methods and settings, which has been successfully used as the guidance for content-adaptive steganographic and steganalytic methods. Unfortunately, in real-world situation, the detailed steganographic settings adopted by the guilty user cannot be known in advance. It thus becomes necessary to propose an automatic embedding probability estimation method. In this article, we propose a novel content-adaptive steganographer detection method via embedding probability estimation. The embedding probability estimation is first formulated as a learning-based saliency detection problem and the multi-scale estimated map is then integrated into the CNN to extract steganalytic features. Finally, the guilty user is detected via an efficient Gaussian vote method with the extracted steganalytic features. The experimental results prove that the proposed method is superior to the state-of-the-art methods in both spatial and frequency domains.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, Steganographer Detection via Multi-Scale Embedding Probability Estimation
- Radhakrishna Achanta, Sheila Hemami, Francisco Estrada, and Sabine Susstrunk. 2009. Frequency-tuned salient region detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1597--1604.Google Scholar
Cross Ref
- Patrick Bas, Tomáš Filler, and Tomáš Pevný. 2011. “Break our steganographic system”: The ins and outs of organizing BOSS. In Proceedings of the International Conference on Information Hiding. 59--70.Google Scholar
Cross Ref
- Ali Borji, Ming-Ming Cheng, Qibin Hou, Huaizu Jiang, and Jia Li. 2014. Salient object detection: A survey. Eprint Arxiv 16, 7 (2014), 3118.Google Scholar
- Markus M. Breunig. 2000. LOF: Identifying density-based local outliers. In Proceedings of the ACM SIGMOD International Conference on Management of Data. 93--104.Google Scholar
Digital Library
- Matthias Carnein, Schöttle Pascal, and Böhme Rainer. 2014. Predictable rain?: Steganalysis of public-key steganography using wet paper codes. In Proceedings of the 2nd ACM Information Hiding 8 Workshop. 97--108.Google Scholar
Digital Library
- Rémi Cogranne and Florent Retraint. 2013. Application of hypothesis testing theory for optimal detection of LSB matching data hiding. Sign. Process. 93, 7 (2013), 1724--1737.Google Scholar
Digital Library
- Tomas Denemark, Mehdi Boroumand, and Jessica Fridrich. 2017. Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forens. Secur. 11, 8 (2017), 1736--1746.Google Scholar
Digital Library
- Tomas Denemark, Vahid Sedighi, Vojtech Holub, Remi Cogranne, and Jessica Fridrich. 2014. Selection-channel-aware rich model for steganalysis of digital images. In Proceedings of the IEEE International Workshop on Information Forensics and Security. 48--53.Google Scholar
Cross Ref
- Lionel Fillatre. 2012. Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Sign. Process. 60, 2 (2012), 556--569.Google Scholar
Digital Library
- Tomáš Filler and Jessica Fridrich. 2010. Gibbs construction in steganography. IEEE Trans. Inf. Forens. Secur. 5, 4 (2010), 705--720.Google Scholar
Digital Library
- Jessica Fridrich and Tomas Filler. 2007. Practical methods for minimizing embedding impact in steganography. In Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505. 650502.Google Scholar
Cross Ref
- Jessica Fridrich, Miroslav Goljan, and David Soukal. 2005. Efficient wet paper codes. In Proceedings of the International Workshop on Information Hiding. 204--218.Google Scholar
Digital Library
- Jessica Fridrich and Jan Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7, 3 (2012), 868--882.Google Scholar
Digital Library
- Vojtech Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In Proceedings of the IEEE International Workshop on Information Forensics and Security. 234--239.Google Scholar
Cross Ref
- Vojtěch Holub, Jessica Fridrich, and Tomáš Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. Eurasip J. Inf. Secur. 2014, 1 (2014), 1--13.Google Scholar
Cross Ref
- A. Hornung, Y. Pritch, P. Krahenbuhl, and F. Perazzi. 2012. Saliency filters: Contrast based filtering for salient region detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 733--740.Google Scholar
Digital Library
- Qibin Hou, Ming Ming Cheng, Xiaowei Hu, Ali Borji, Zhuowen Tu, and Philip Torr. 2016. Deeply supervised salient object detection with short connections. IEEE Trans. Pattern Anal. Mach. Intell. 41, 4 (2019), 815--828.Google Scholar
Digital Library
- Donghui Hu, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, and Lina Wang. 2017. Adaptive steganalysis based on selection region and combined convolutional neural networks. Secur. Commun. Netw. 2017, 4 (2017), 1--9.Google Scholar
Digital Library
- Ping Hu, Bing Shuai, Jun Liu, and Gang Wang. 2017. Deep level sets for salient object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 540--549.Google Scholar
Cross Ref
- Andrew D. Ker. 2006. Batch steganography and pooled steganalysis. In Proceedings of the International Conference on Information Hiding. Springer, 265--281.Google Scholar
- Andrew D. Ker. 2007. Batch steganography and the threshold game. In Security, Steganography, and Watermarking of Multimedia Contents IX. SPIE, 401--413.Google Scholar
- Andrew David Ker and Tomáš Pevný. 2012. Batch steganography in the real world. In Proceedings of the 14th ACM Workshop Multimedia Security (MM&Sec’’12). 1--10.Google Scholar
Digital Library
- Andrew D. Ker and Tomáš Pevný. 2012. Identifying a steganographer in realistic and heterogeneous data sets. In Proceedings of the SPIE, Media Watermark., Security, Forensics XIV. 265--298.Google Scholar
- Andrew D. Ker and Tomáš Pevný. 2012. A new paradigm for steganalysis via clustering. Proc. SPIE 7880, 2 (2012), 87--95.Google Scholar
- Andrew D. Ker and Tomáš Pevný. 2014. The steganographer is the outlier: Realistic large-scale steganalysis. IEEE Trans. Inf. Forens. Secur. 9, 9 (2014), 1424--1435.Google Scholar
Digital Library
- Onkar Krishna and Kiyoharu Aizawa. 2018. Billboard saliency detection in street videos for adults and elderly. In Proceedings of the IEEE International Conference on Image Processing. 2326--2330.Google Scholar
Cross Ref
- Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceedings of the International Conference on Neural Information Processing Systems. 1097--1105.Google Scholar
Digital Library
- Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2015. A new cost function for spatial image steganography. In Proceedings of the IEEE International Conference on Image Processing. 4206--4210.Google Scholar
- Fengyong Li, Mi Wen, Jingsheng Lei, and Yanli Ren. 2017. Efficient steganographer detection over social networks with sampling reconstruction. Peer Peer Netw. Appl. 7 (2017), 1--16.Google Scholar
- Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Zhongqin Bi, and Chunhua Gu. 2017. Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans. Inf. Forens. Secur. 11, 2 (2017), 344--357.Google Scholar
Digital Library
- Guanbin Li and Yizhou Yu. 2015. Visual saliency based on multiscale deep features. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5455--5463.Google Scholar
- Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha, and Nenghai Yu. 2018. Side channel steganalysis: When behavior is considered in steganographer detection. Multimedia Tools and Applications (2018), 1--15.Google Scholar
- Xin Liao, Guoyong Chen, and Jiaojiao Yin. 2016. Content-adaptive steganalysis for color images. Secur. Commun. Netw. 9, 18 (2016), 5756--5763.Google Scholar
Cross Ref
- Guo Shiang Lin, Yi Ting Chang, and Wen Nung Lie. 2010. A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans. Multimedia 12, 5 (2010), 345--357.Google Scholar
Digital Library
- Tie Liu, Zejian Yuan, Jian Sun, Jingdong Wang, Nanning Zheng, Xiaoou Tang, and Heung Yeung Shum. 2011. Learning to detect a salient object. IEEE Trans. Pattern Anal. Mach. Intel. 33, 2 (2011), 353--367.Google Scholar
Digital Library
- Weiqi Luo, Haodong Li, Qi Yan, Rui Yang, and Jiwu Huang. 2018. Improved audio steganalytic feature and its applications in audio forensics. ACM Trans. Multimedia Comput. Commun. Appl. 14, 2 (2018), 43:1--43:14.Google Scholar
Digital Library
- Zhiming Luo, Akshaya Mishra, Andrew Achkar, Justin Eichel, Shaozi Li, and Pierre Marc Jodoin. 2017. Non-local deep features for salient object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 6593--6601.Google Scholar
Cross Ref
- David R. Martin, Charless Fowlkes, Doron Tal, and Jitendra Malik. 2001. A database of human segmented natural images and its application to. IEEE Int. Conf. Comput. Vis. 2, 11 (2001), 416--423.Google Scholar
- N. N. A. Molok, S. Chang, and A. Ahmad. 2013. Disclosure of organizational information on social media: Perspectives from security managers. Nat. Protocols 4, 1 (2013), 102--106.Google Scholar
- Tomas Pevny and Jessica Fridrich. 2008. Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forens. Secur. 3, 4 (2008), 635--650.Google Scholar
Digital Library
- Lionel Pibre, Jérôme Pasquet, Dino Ienco, and Marc Chaumont. 2016. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch. Electr. Imag. 4, 8 (2016), 1--11.Google Scholar
Cross Ref
- Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. 94090J.Google Scholar
- Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2017. Feature learning for steganalysis using convolutional neural networks. Multimedia Tools Appl. 77, 15 (2018), 19633--19657.Google Scholar
Digital Library
- Bernhard Schölkopf, John Platt, and Thomas Hofmann. 2007. A kernel method for the two-sample-problem. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 513--520.Google Scholar
Cross Ref
- Vahid Sedighi, Rémi Cogranne, and Jessica Fridrich. 2015. Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forens. Secur. 11, 2 (2015), 221--234.Google Scholar
Digital Library
- Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, and Pradeep K Atrey. 2017. Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Appl. 13, 3 (2017), 23.Google Scholar
Digital Library
- Weixuan Tang, Haodong Li, Weiqi Luo, and Jiwu Huang. 2014. Adaptive steganalysis against WOW embedding algorithm. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 91--96.Google Scholar
Digital Library
- Weixuan Tang, Haodong Li, Weiqi Luo, and Jiwu Huang. 2016. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans. Inf. Forens. Secur. 11, 4 (2016), 734--745.Google Scholar
Digital Library
- Weixuan Tang, Shunquan Tan, Bin Li, and Jiwu Huang. 2017. Automatic steganographic distortion learning using a generative adversarial network. IEEE Sign. Process. Lett. 24, 10 (2017), 1547--1551.Google Scholar
Cross Ref
- Songtao Wu, Shenghua Zhong, and Yan Liu. 2017. Deep residual learning for image steganalysis. Multimedia Tools Appl. (2017), 1--17. DOI:https://doi.org/10.1007/s11042-017-4440-4Google Scholar
Digital Library
- Songtao Wu, Shenghua Zhong, and Yan Liu. 2018. Deep residual learning for image steganalysis. Multimedia Tools Appl. 77, 9 (2018), 10437--10453.Google Scholar
Digital Library
- Zhihua Xia, Xinhui Wang, Xingming Sun, Quansheng Liu, and Naixue Xiong. 2016. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75, 4 (2016), 1947--1962.Google Scholar
Digital Library
- Guanshuo Xu, Han Zhou Wu, and Yun Qing Shi. 2016. Structural design of convolutional neural networks for steganalysis. IEEE Sign. Process. Lett. 23, 5 (2016), 708--712.Google Scholar
Cross Ref
- Jianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, and Yunqing Shi. 2017. Steganalysis based on awareness of selection-channel and deep learning. In Proceedings of the International Workshop on Digital Watermarking. 263--272.Google Scholar
Cross Ref
- Xiaoshan Yang, Tianzhu Zhang, and Changsheng Xu. 2015. Cross-domain feature learning in multimedia. IEEE Trans. Multimedia 17, 1 (2015), 64--78.Google Scholar
Cross Ref
- Ying Yang and Ioannis Ivrissimtzis. 2014. Mesh discriminative features for 3D steganalysis. ACM Trans. Multimedia Comput. Commun. Appl. 10, 3 (2014), 27:1--27:13.Google Scholar
Digital Library
- Jian Ye, Jiangqun Ni, and Yang Yi. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forens. Secur. 12, 11 (2017), 2545--2557.Google Scholar
Digital Library
- Hao Yin, Wen Hui, Hongzhi Li, Chuang Lin, and Wenwu Zhu. 2012. A novel large-scale digital forensics service platform for internet videos. IEEE Trans Multimedia 14, 1 (2012), 178--186.Google Scholar
Digital Library
- Peng Zhang, Tao Zhuo, Wei Huang, Kangli Chen, and Mohan Kankanhalli. 2017. Online object tracking based on CNN with spatial-temporal saliency guided sampling. Neurocomputing 257, 1 (2017), 115--127.Google Scholar
Cross Ref
- Xiang Zhang, Fei Peng, and Min Long. 2018. Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimedia 20, 12 (2018), 3223--3238.Google Scholar
Digital Library
- Mingjie Zheng, Sheng-hua Zhong, Songtao Wu, and Jianmin Jiang. 2017. Steganographer detection via deep residual network. In Proceedings of the IEEE International Conference on Multimedia and Expo. 235--240.Google Scholar
Cross Ref
- Mingjie Zheng, Sheng-hua Zhong, Songtao Wu, and Jianmin Jiang. 2018. Steganographer detection based on multiclass dilated residual networks. In Proceedings of the ACM International Conference on Multimedia Retrieval. 300--308.Google Scholar
Digital Library
- Hang Zhou, Kejiang Chen, Weiming Zhang, and Nenghai Yu. 2017. Comments on “steganography using reversible texture synthesis.” IEEE Trans. Image Process. 26, 4 (2017), 1623.Google Scholar
Digital Library
Index Terms
Steganographer Detection via Multi-Scale Embedding Probability Estimation
Recommendations
Steganographer Detection based on Multiclass Dilated Residual Networks
ICMR '18: Proceedings of the 2018 ACM on International Conference on Multimedia RetrievalSteganographer detection task is to identify criminal users, who attempt to conceal confidential information by steganography methods, among a large number of innocent users. The significant challenge of the task is how to collect the evidences to ...
Content-adaptive selective steganographer detection via embedding probability estimation deep networks
AbstractSteganographer detection is to detect culprit users, who attempt to hide confidential information with steganography, among many innocent users. By incorporating the knowledge of true embedding probability map that illustrates the ...
MSCNN: Steganographer Detection Based on Multi-Scale Convolutional Neural Networks
Wireless Algorithms, Systems, and ApplicationsAbstractSteganographer detection aims to find guilty user who spread images containing secret information among many innocent users. Feature extraction is an important step in steganographer detection. The challenge is that the existing steganalytic ...






Comments