Browse > Article
http://dx.doi.org/10.3837/tiis.2020.03.017

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis  

Hussain, Israr (Shenzhen Key Laboratory of Media Security, College of Electronic & Information Engineering, Shenzhen University)
Zeng, Jishen (Shenzhen Key Laboratory of Media Security, College of Electronic & Information Engineering, Shenzhen University)
Qin, Xinhong (Shenzhen Key Laboratory of Media Security, College of Electronic & Information Engineering, Shenzhen University)
Tan, Shunquan (Shenzhen Key Laboratory of Media Security, College of Electronic & Information Engineering, Shenzhen University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.3, 2020 , pp. 1228-1248 More about this Journal
Abstract
Steganalysis & steganography have witnessed immense progress over the past few years by the advancement of deep convolutional neural networks (DCNN). In this paper, we analyzed current research states from the latest image steganography and steganalysis frameworks based on deep learning. Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques. The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis. Finally, technical challenges of current methods and several promising directions on deep learning steganography and steganalysis are suggested to illustrate how these challenges can be transferred into prolific future research avenues.
Keywords
Steganalysis; Steganography; Deep learning; Convolutional Neural Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Laszka and D. Szeszle, "Hide and seek in digital communication: the steganography game," in Proc. of the 9th Hungarian-Japanese Symposium on Discrete Mathematics and Its Applications, Fukuoka Japan, June 2-5, 2015
2 Y.Qian, J. Dong, W. Wang, "Deep learning for steganalysis via convolutional neural networks," in Proc. of Media Watermarking, Security, and Forensics International Society for Optics and Photonics, vol. 9409, pp. 94090J, 2015.
3 X. Xu, Y.Sun, G. Tang, S. Chen, & J. Zhao, "Deep learning on spatial rich model for steganalysis," in Proc. of International Workshop on Digital Watermarking. Springer, pp. 564-577, 2016.
4 J. Zeng, S. Tan, B. Li, and J. Huang, "Large-scale JPEG image steganalysis using hybrid deep-learning framework," IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1200-1214, 2018.   DOI
5 M. Boroumand, M. Chen, and J. Fridrich, "Deep residual network for steganalysis of digital images," IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181-1193, 2019.   DOI
6 J. Fridrich and D. Soukal, "Matrix embedding for large payloads," SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006.
7 R. Zhang, F. Zhu, J. Liu, and G. Liu, "Efficient feature learning and multi-size image steganalysis based on CNN," Multimedia, Jul 2018.
8 J. Zeng, S. Tan, B. Li, and J. Huang, "Pre-training via fitting deep neural network to rich-model features extraction procedure and its effect on deep learning for steganalysis," Electronic Imaging, vol. 2017, no. 7, pp. 44-49, 2017.
9 M. Zheng, S.-h. Zhong, S. Wu, and J. Jiang, "Steganographer detection via deep residual network," in Proc. of 2017 IEEE International Conference on Multimedia and Expo (ICME). IEEE, pp. 235-240, 2017.
10 K. Zhong, G. Feng, "Deep learning for steganalysis based on filter diversity selection," Science China Information Sciences, vol. 61, p. 129105, 2018.   DOI
11 C. F. Tsang and J. Fridrich, "Steganalyzing images of arbitrary size with CNNs," Electronic Imaging, vol. 2018, no. 7, pp. 121-1-121-8(8), pp. 1-8, 2018.
12 X. Zhang, "Efficient steganographic embedding by exploiting modification direction," IEEE Communications Letters, vol. 10, pp. 781-783, 2006.   DOI
13 D. Volkhonskiy, B. Borisenko, and E. Burnaev, "Generative adversarial networks for image steganography," ICLR, 2017.
14 X. Duan, K. Jia, B. Li, D. Guo, E. Zhang, "Reversible image steganography scheme based on a u-net structure," IEEE Access, vol. 7, pp. 9314-9323, 2019.   DOI
15 K. A. Zhang, A. Cuesta-Infante, and K.Veeramachaneni, "Steganogan: Pushing the limits of image steganography," January 2019.
16 A. Saleema, "A new steganography algorithm using hybrid fuzzy neural networks," Procedia Technology, vol. 24, pp. 1566-1574, 2016.   DOI
17 D. Volkhonskiy, I. Nazarov, B. Borisenko, and E. Burnaev, "Steganographic generative adversarial networks,"Multimedia, 2017.
18 N. Papernot, P. McDaniel, I. Goodfellow, "Practical black-box attacks against machine learning," in Proc. of Asia conference on computer and communications security. ACM, pp. 506-519, 2017.
19 V. Holub and J. Fridrich, "Designing steganographic distortion using directional filters," in Proc. of 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, pp. 234-239. 2012.
20 B. Li, M. Wang, J. Huang, and X. Li, "A new cost function for spatial image steganography," in Proc. of IEEE International Conference on Image Processing (ICIP), pp. 4206-4210, 2014.
21 Z. Wang, X. Zhang, and Z. Yin, "Hybrid distortion function for JPEG steganography," Journal of Electronic Imaging, vol. 25, no. 5, p. 050501, 2016.   DOI
22 T. Pevny, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. of International Workshop on Information Hiding. Springer, pp. 161-177, 2010.
23 V. Holub and J. Fridrich, "Digital image steganography using universal distortion," in Proc. of the first ACM workshop on Information hiding and multimedia security. ACM, pp. 59-68, 2013.
24 L. Guo, J. Ni, and Y. Q. Shi, "Uniform embedding for efficient JPEG steganography," IEEE transactions on Information Forensics and Security, vol. 9, no. 5, pp. 814-825, 2014.   DOI
25 V. Holub, "Universal distortion function for steganography in an arbitrary domain," Eurasip Journal on Information Security, vol. 2014, p. 1, 2014.   DOI
26 C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus, "Intriguing properties of neural networks," 2013.
27 I. J. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and harnessing adversarial examples," ICLR, 2015.
28 Y. Zhang, W. Zhang, K. Chen, J. Liu, Y. Liu, and N. Yu, "Adversarial examples against deep neural network based steganalysis," in Proc. of the 6th ACM Workshop on Information Hiding and Multimedia Security, pp. 67-72, 2018.
29 S. Baluja and I. Fischer, "Adversarial transformation networks: Learning to generate adversarial examples," arXiv preprint arXiv:1703.09387,2017.
30 J. Kos, I. Fischer, and D. Song, "Adversarial examples for generative models," in Proc. of 2018 IEEE Security and Privacy Workshops. IEEE, pp. 36-42, 2018.
31 W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, "CNN based adversarial embedding with minimum alteration for image steganography, IEEE Trans. Inf. Forensics Secur," 2018.
32 J. Zhu, R. Kaplan, "Hidden: Hiding data with deep networks," in Proc. of the European Conference on Computer Vision, pp. 682-697, 2018.
33 J. Hayes, "Generating steganographic images via adversarial training," Advances in Neural Information Processing Systems, pp.1954-1963, 2017.
34 S. Ma, Q. Guan, X. Zhao, and Y. Liu, "Adaptive spatial steganography based on probability-controlled adversarial examples," 2018.
35 W. Tang, S. Tan, B. Li, and J. Huang, "Automatic steganographic distortion learning using a generative adversarial network," IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547-1551, 2017.   DOI
36 S. Tan and B. Li, "Stacked convolutional auto-encoders for steganalysis of digital images," in Proc. of Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific. IEEE, pp. 1-4, 2014.
37 G. Xu, "Deep convolutional neural network to detect J-UNIWARD," in Proc. of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM, pp. 67-73, 2017.
38 G. Xu, H.-Z. Wu, and Y. Q. Shi, "Ensemble of CNNs for steganalysis: An empirical study," in Proc. of the 4th ACM Workshop on Information Hiding and Multimedia Security. ACM, pp.103- 107, 2016.
39 W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, "CNN-based adversarial embedding for image steganography," IEEE Transactions on Information Forensics and Security, 2019.
40 M. Abadi and D. G. Andersen, "Learning to protect communications with adversarial neural cryptography," in Proc. of ICLR, 2017.
41 J. Yang, K. Liu, X. Kang, E. K. Wong, and Y.Q. Shi, "Spatial image steganography based on generative adversarial network," 2018.
42 Meng, Ruohan, Steven G. Rice, "A fusion steganographic algorithm based on faster R-CNN," Computers, Materials & Continua, vol. 55, no. 1, 2018.
43 M. Yedroudj, F. Comby, and M. Chaumont, "Yedroudj-Net: An efficient CNN for spatial steganalysis," in Proc. of 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp. 2092-2096, 2018.
44 J. Fridrich and J. Kodovsky, "Rich models for steganalysis of digital images," IEEE Transactions on information Forensics and Security, vol. 7, no. 3, pp. 868-882, 2012.   DOI
45 D. Hu, S. Zhou, Q. Shen, S. Zheng, "Digital image steganalysis based on visual attention and deep reinforcement learning," IEEE Access, 2019.
46 W. Huang, X.-F. Zhao, D.-G. Feng, and R.-N. Sheng, "Jpeg steganalysis based on feature fusion by principal component analysis," Ruanjian Xuebao/Journal of Software, vol. 23, no. 7, pp. 1869-1879, 2012.
47 Y. Ke, M. Zhang, J. Liu, and X. Yang, "Generative steganography with kerckhoffs' principle based on generative adversarial networks," Multimedia, 2017.
48 Z. Zhang, G. Fu, J. Liu, and W. Fu, "Generative information hiding method based on adversarial networks," in Proc. of International Conference on Computer Engineering and Networks. Springer, pp. 261-270, 2018.
49 Israr Hussain, Qianhua He, & Zhuliang Chen, "Automatic Fruit Recognition Based on DCNN for Commercial Source Trace System," International Journal on Computational Science & Applicatons (IJCSA), vol. 8, no. 2/3, pp. 1-14, 2018.
50 V. Holub and J. Fridrich, "Random projections of residuals for digital image steganalysis," IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1996-2006, 2013.   DOI
51 J. Ye, J. Ni, and Y. Yi, "Deep learning hierarchical representations for image steganalysis," IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2545-2557, 2017.   DOI
52 Jung, Ki-Hyun, "A Study on Machine Learning for Steganalysis," in Proc. of the 3rd International Conference on Machine Learning and Soft Computing. ACM, pp. 12-15, 2019.
53 J. Yang, K. Liu, X. Kang, E. Wong, and Y. Shi, "Steganalysis based on awareness of selection-channel & deep learning," in Proc. of International Workshop on Digital Watermarking. Springer, pp. 263-272, 2017.
54 D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, "A novel image steganography method via deep convolutional generative adversarial networks," IEEE Access, vol. 6, pp. 38 303-38 314, 2018.   DOI
55 P. Wu, Y. Yang, and X. Li, "StegNet: Mega image steganography capacity with deep convolutional network," Future Internet, vol. 10 , p. 54, 2018.   DOI
56 Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C. and Yu, P.S, "A comprehensive survey on graph neural networks," Journal of Latex Class Files, 2019.
57 J. Qin, X. Sun, X. Xiang, "Principal feature selection and fusion method for image steganalysis," Journal of Electronic Imaging, vol. 18(3), 033009, 2009.   DOI
58 T. Denemark, J. Fridrich, "Improving selection-channel-aware steganalysis features," Electronic Imaging, vol. 2016, no. 8, pp. 1-8, 2016.   DOI
59 T.Denemark,V.Sedighi, V.Holub, R.Cogranne, and J. Fridrich, "Selection-channel-aware rich model for steganalysis of digital images," in Proc. of 2014 IEEE International Workshop on Information Forensics and Security. IEEE, pp. 48-53, 2014.
60 Odena, A., Olah, C. and Shlens, "Conditional image synthesis with auxiliary classifier gans," in Proc. of ICML, Volume 70 , pp. 2642-2651, August 2017.
61 Liu, Wei, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, "SSD: Single shot multibox detector," in Proc. of European conference on computer vision, pp. 21-37, 2016.
62 V. Holub and J. Fridrich, "Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT," IEEE Transactions on Information Forensics and Security, vol. 10, no. 2, pp. 219-228, Feb. 2015.   DOI
63 H. Shi, J. Dong, W. Wang, Y. Qian, and X. Zhang, "SSGAN: secure steganography based on generative adversarial networks," in Proc. of Pacific Rim Conference on Multimedia. Springer, pp. 534-544, 2017.
64 G. Xu, H.-Z. Wu, "Structural design of convolutional neural networks for steganalysis," IEEE Signal Processing Letters, vol. 23, pp.708-712, 2016.   DOI
65 M. Chen, M. Boroumand, and J. Fridrich, "Deep learning regressors for quantitative steganalysis," Electronic Imaging, vol. 2018, pp. 160-1-160-7(7), 2018.
66 Ren, Shaoqing, Kaiming He, Ross Girshick, and Jian Sun. "Faster R-CNN: Towards real-time object detection with region proposal networks," Advances in neural information processing systems, pp. 91-99. 2015.
67 L. Pibre, J. Pasquet, D. Ienco, and M. Chaumont, "Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch," Electronic Imaging, vol. 2016, no. 8, pp.1-11, 2016.
68 M. Salomon, R. Couturier, C. Guyeux, "Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key: A deep learning approach for telemedicine," European Research in Telemedicine/La Recherche, vol. 6, no. 2, pp. 79-92, 2017.   DOI
69 S. Wu, S.-h. Zhong, and Y. Liu, "A novel convolutional neural network for image steganalysis with shared normalization," IEEE Transactions on Multimedia, vol. 22, no. 1, pp. 256-270, 2019.   DOI
70 S. Baluja, "Hiding images in plain sight: Deep steganography," Advances in Neural Information Processing Systems, pp. 2069- 2079, 2017.
71 J. Lu, G. Zhou, C. Yang, Z. Li, "Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection," IEEE Access, vol. 7, pp. 21 702-21711, 2019.   DOI
72 A. Kokaj, "Cyber war and terrorism in kosovo," Academic Journal of Business, Administration, Law and Social Sciences, 2019.
73 B. Li, J. He, J. Huang, and Y. Q. Shi, "A survey on image steganography and steganalysis," Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142-172, 2011.
74 J. Fridrich, Steganography in digital media: principles, algorithms, and applications, Cambridge University Press, 2009.
75 B. Li, W. Wei, A. Ferreira, and S. Tan, "Rest-Net: Diverse activation modules and parallel subnets-based CNN for spatial image steganalysis," IEEE Signal Processing Letters, vol. 25, no. 5, pp. 650-654, 2018.   DOI
76 V. Sedighi and J. Fridrich, "Histogram layer, moving convolutional neural networks towards feature-based steganalysis," Electronic Imaging, vol. 2017, no. 7, pp. 50-55.
77 J. Zeng, S. Tan, G. Liu, B. Li, and J. Huang, "WISERNET: Wider separate-then-reunion network for steganalysis of color images," IEEE Transactions on Information Forensics and Security, 2019.
78 M. Chen, V. Sedighi, M. Boroumand, and J. Fridrich, "Jpeg-phase- aware convolutional neural network for steganalysis of jpeg images," in Proc. of the 5th ACM Workshop on Information Hiding and Multimedia Security. ACM, pp. 75-84, 2017.
79 J. Yang, Y.-Q. Shi, E. K. Wong, and X. Kang, "JPEG steganalysis based on Dense-Net," Multimeida, ArXiv abs/1711.09335, 2017
80 S. Wu, S. Zhong, "Deep residual learning for image steganalysis," Multimedia tools & Applications, vol. 77, no. 9, pp.10 437-10 453, 2018.   DOI
81 J. Tian and Y. Li, "Convolutional neural networks for steganalysis via transfer learning," International Journal of Pattern Recognition and Artificial Intelligence, vol. 33, no. 02, p. 1959006, 2019.   DOI
82 Dai, Jifeng, Yi Li, Kaiming He, and Jian Sun, "R-FCN: Object detection via region-based fully convolutional networks," Advances in neural information processing systems, pp. 379-387, 2016.