Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Steganographer Detection via Multi-Scale Embedding Probability Estimation

Published: 16 December 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Steganographer detection aims to identify the guilty user who utilizes steganographic methods to hide secret information in the spread of multimedia data, especially image data, from a large amount of innocent users on social networks. A true embedding probability map illustrates the probability distribution of embedding secret information in the corresponding images by specific steganographic methods and settings, which has been successfully used as the guidance for content-adaptive steganographic and steganalytic methods. Unfortunately, in real-world situation, the detailed steganographic settings adopted by the guilty user cannot be known in advance. It thus becomes necessary to propose an automatic embedding probability estimation method. In this article, we propose a novel content-adaptive steganographer detection method via embedding probability estimation. The embedding probability estimation is first formulated as a learning-based saliency detection problem and the multi-scale estimated map is then integrated into the CNN to extract steganalytic features. Finally, the guilty user is detected via an efficient Gaussian vote method with the extracted steganalytic features. The experimental results prove that the proposed method is superior to the state-of-the-art methods in both spatial and frequency domains.

    Supplementary Material

    a103-zhong-supp.pdf (zhong.zip)
    Supplemental movie, appendix, image and software files for, Steganographer Detection via Multi-Scale Embedding Probability Estimation

    References

    [1]
    Radhakrishna Achanta, Sheila Hemami, Francisco Estrada, and Sabine Susstrunk. 2009. Frequency-tuned salient region detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1597--1604.
    [2]
    Patrick Bas, Tomáš Filler, and Tomáš Pevný. 2011. “Break our steganographic system”: The ins and outs of organizing BOSS. In Proceedings of the International Conference on Information Hiding. 59--70.
    [3]
    Ali Borji, Ming-Ming Cheng, Qibin Hou, Huaizu Jiang, and Jia Li. 2014. Salient object detection: A survey. Eprint Arxiv 16, 7 (2014), 3118.
    [4]
    Markus M. Breunig. 2000. LOF: Identifying density-based local outliers. In Proceedings of the ACM SIGMOD International Conference on Management of Data. 93--104.
    [5]
    Matthias Carnein, Schöttle Pascal, and Böhme Rainer. 2014. Predictable rain?: Steganalysis of public-key steganography using wet paper codes. In Proceedings of the 2nd ACM Information Hiding 8 Workshop. 97--108.
    [6]
    Rémi Cogranne and Florent Retraint. 2013. Application of hypothesis testing theory for optimal detection of LSB matching data hiding. Sign. Process. 93, 7 (2013), 1724--1737.
    [7]
    Tomas Denemark, Mehdi Boroumand, and Jessica Fridrich. 2017. Steganalysis features for content-adaptive JPEG steganography. IEEE Trans. Inf. Forens. Secur. 11, 8 (2017), 1736--1746.
    [8]
    Tomas Denemark, Vahid Sedighi, Vojtech Holub, Remi Cogranne, and Jessica Fridrich. 2014. Selection-channel-aware rich model for steganalysis of digital images. In Proceedings of the IEEE International Workshop on Information Forensics and Security. 48--53.
    [9]
    Lionel Fillatre. 2012. Adaptive steganalysis of least significant bit replacement in grayscale natural images. IEEE Trans. Sign. Process. 60, 2 (2012), 556--569.
    [10]
    Tomáš Filler and Jessica Fridrich. 2010. Gibbs construction in steganography. IEEE Trans. Inf. Forens. Secur. 5, 4 (2010), 705--720.
    [11]
    Jessica Fridrich and Tomas Filler. 2007. Practical methods for minimizing embedding impact in steganography. In Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505. 650502.
    [12]
    Jessica Fridrich, Miroslav Goljan, and David Soukal. 2005. Efficient wet paper codes. In Proceedings of the International Workshop on Information Hiding. 204--218.
    [13]
    Jessica Fridrich and Jan Kodovsky. 2012. Rich models for steganalysis of digital images. IEEE Trans. Inf. Forens. Secur. 7, 3 (2012), 868--882.
    [14]
    Vojtech Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In Proceedings of the IEEE International Workshop on Information Forensics and Security. 234--239.
    [15]
    Vojtěch Holub, Jessica Fridrich, and Tomáš Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. Eurasip J. Inf. Secur. 2014, 1 (2014), 1--13.
    [16]
    A. Hornung, Y. Pritch, P. Krahenbuhl, and F. Perazzi. 2012. Saliency filters: Contrast based filtering for salient region detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 733--740.
    [17]
    Qibin Hou, Ming Ming Cheng, Xiaowei Hu, Ali Borji, Zhuowen Tu, and Philip Torr. 2016. Deeply supervised salient object detection with short connections. IEEE Trans. Pattern Anal. Mach. Intell. 41, 4 (2019), 815--828.
    [18]
    Donghui Hu, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, and Lina Wang. 2017. Adaptive steganalysis based on selection region and combined convolutional neural networks. Secur. Commun. Netw. 2017, 4 (2017), 1--9.
    [19]
    Ping Hu, Bing Shuai, Jun Liu, and Gang Wang. 2017. Deep level sets for salient object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 540--549.
    [20]
    Andrew D. Ker. 2006. Batch steganography and pooled steganalysis. In Proceedings of the International Conference on Information Hiding. Springer, 265--281.
    [21]
    Andrew D. Ker. 2007. Batch steganography and the threshold game. In Security, Steganography, and Watermarking of Multimedia Contents IX. SPIE, 401--413.
    [22]
    Andrew David Ker and Tomáš Pevný. 2012. Batch steganography in the real world. In Proceedings of the 14th ACM Workshop Multimedia Security (MM&Sec’’12). 1--10.
    [23]
    Andrew D. Ker and Tomáš Pevný. 2012. Identifying a steganographer in realistic and heterogeneous data sets. In Proceedings of the SPIE, Media Watermark., Security, Forensics XIV. 265--298.
    [24]
    Andrew D. Ker and Tomáš Pevný. 2012. A new paradigm for steganalysis via clustering. Proc. SPIE 7880, 2 (2012), 87--95.
    [25]
    Andrew D. Ker and Tomáš Pevný. 2014. The steganographer is the outlier: Realistic large-scale steganalysis. IEEE Trans. Inf. Forens. Secur. 9, 9 (2014), 1424--1435.
    [26]
    Onkar Krishna and Kiyoharu Aizawa. 2018. Billboard saliency detection in street videos for adults and elderly. In Proceedings of the IEEE International Conference on Image Processing. 2326--2330.
    [27]
    Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceedings of the International Conference on Neural Information Processing Systems. 1097--1105.
    [28]
    Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2015. A new cost function for spatial image steganography. In Proceedings of the IEEE International Conference on Image Processing. 4206--4210.
    [29]
    Fengyong Li, Mi Wen, Jingsheng Lei, and Yanli Ren. 2017. Efficient steganographer detection over social networks with sampling reconstruction. Peer Peer Netw. Appl. 7 (2017), 1--16.
    [30]
    Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Zhongqin Bi, and Chunhua Gu. 2017. Steganalysis over large-scale social networks with high-order joint features and clustering ensembles. IEEE Trans. Inf. Forens. Secur. 11, 2 (2017), 344--357.
    [31]
    Guanbin Li and Yizhou Yu. 2015. Visual saliency based on multiscale deep features. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5455--5463.
    [32]
    Li Li, Weiming Zhang, Kejiang Chen, Hongyue Zha, and Nenghai Yu. 2018. Side channel steganalysis: When behavior is considered in steganographer detection. Multimedia Tools and Applications (2018), 1--15.
    [33]
    Xin Liao, Guoyong Chen, and Jiaojiao Yin. 2016. Content-adaptive steganalysis for color images. Secur. Commun. Netw. 9, 18 (2016), 5756--5763.
    [34]
    Guo Shiang Lin, Yi Ting Chang, and Wen Nung Lie. 2010. A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans. Multimedia 12, 5 (2010), 345--357.
    [35]
    Tie Liu, Zejian Yuan, Jian Sun, Jingdong Wang, Nanning Zheng, Xiaoou Tang, and Heung Yeung Shum. 2011. Learning to detect a salient object. IEEE Trans. Pattern Anal. Mach. Intel. 33, 2 (2011), 353--367.
    [36]
    Weiqi Luo, Haodong Li, Qi Yan, Rui Yang, and Jiwu Huang. 2018. Improved audio steganalytic feature and its applications in audio forensics. ACM Trans. Multimedia Comput. Commun. Appl. 14, 2 (2018), 43:1--43:14.
    [37]
    Zhiming Luo, Akshaya Mishra, Andrew Achkar, Justin Eichel, Shaozi Li, and Pierre Marc Jodoin. 2017. Non-local deep features for salient object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 6593--6601.
    [38]
    David R. Martin, Charless Fowlkes, Doron Tal, and Jitendra Malik. 2001. A database of human segmented natural images and its application to. IEEE Int. Conf. Comput. Vis. 2, 11 (2001), 416--423.
    [39]
    N. N. A. Molok, S. Chang, and A. Ahmad. 2013. Disclosure of organizational information on social media: Perspectives from security managers. Nat. Protocols 4, 1 (2013), 102--106.
    [40]
    Tomas Pevny and Jessica Fridrich. 2008. Multiclass detector of current steganographic methods for JPEG format. IEEE Trans. Inf. Forens. Secur. 3, 4 (2008), 635--650.
    [41]
    Lionel Pibre, Jérôme Pasquet, Dino Ienco, and Marc Chaumont. 2016. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch. Electr. Imag. 4, 8 (2016), 1--11.
    [42]
    Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2015. Deep learning for steganalysis via convolutional neural networks. In Media Watermarking, Security, and Forensics 2015, Vol. 9409. 94090J.
    [43]
    Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2017. Feature learning for steganalysis using convolutional neural networks. Multimedia Tools Appl. 77, 15 (2018), 19633--19657.
    [44]
    Bernhard Schölkopf, John Platt, and Thomas Hofmann. 2007. A kernel method for the two-sample-problem. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 513--520.
    [45]
    Vahid Sedighi, Rémi Cogranne, and Jessica Fridrich. 2015. Content-adaptive steganography by minimizing statistical detectability. IEEE Trans. Inf. Forens. Secur. 11, 2 (2015), 221--234.
    [46]
    Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, and Pradeep K Atrey. 2017. Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Appl. 13, 3 (2017), 23.
    [47]
    Weixuan Tang, Haodong Li, Weiqi Luo, and Jiwu Huang. 2014. Adaptive steganalysis against WOW embedding algorithm. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 91--96.
    [48]
    Weixuan Tang, Haodong Li, Weiqi Luo, and Jiwu Huang. 2016. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans. Inf. Forens. Secur. 11, 4 (2016), 734--745.
    [49]
    Weixuan Tang, Shunquan Tan, Bin Li, and Jiwu Huang. 2017. Automatic steganographic distortion learning using a generative adversarial network. IEEE Sign. Process. Lett. 24, 10 (2017), 1547--1551.
    [50]
    Songtao Wu, Shenghua Zhong, and Yan Liu. 2017. Deep residual learning for image steganalysis. Multimedia Tools Appl. (2017), 1--17.
    [51]
    Songtao Wu, Shenghua Zhong, and Yan Liu. 2018. Deep residual learning for image steganalysis. Multimedia Tools Appl. 77, 9 (2018), 10437--10453.
    [52]
    Zhihua Xia, Xinhui Wang, Xingming Sun, Quansheng Liu, and Naixue Xiong. 2016. Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75, 4 (2016), 1947--1962.
    [53]
    Guanshuo Xu, Han Zhou Wu, and Yun Qing Shi. 2016. Structural design of convolutional neural networks for steganalysis. IEEE Sign. Process. Lett. 23, 5 (2016), 708--712.
    [54]
    Jianhua Yang, Kai Liu, Xiangui Kang, Edward Wong, and Yunqing Shi. 2017. Steganalysis based on awareness of selection-channel and deep learning. In Proceedings of the International Workshop on Digital Watermarking. 263--272.
    [55]
    Xiaoshan Yang, Tianzhu Zhang, and Changsheng Xu. 2015. Cross-domain feature learning in multimedia. IEEE Trans. Multimedia 17, 1 (2015), 64--78.
    [56]
    Ying Yang and Ioannis Ivrissimtzis. 2014. Mesh discriminative features for 3D steganalysis. ACM Trans. Multimedia Comput. Commun. Appl. 10, 3 (2014), 27:1--27:13.
    [57]
    Jian Ye, Jiangqun Ni, and Yang Yi. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forens. Secur. 12, 11 (2017), 2545--2557.
    [58]
    Hao Yin, Wen Hui, Hongzhi Li, Chuang Lin, and Wenwu Zhu. 2012. A novel large-scale digital forensics service platform for internet videos. IEEE Trans Multimedia 14, 1 (2012), 178--186.
    [59]
    Peng Zhang, Tao Zhuo, Wei Huang, Kangli Chen, and Mohan Kankanhalli. 2017. Online object tracking based on CNN with spatial-temporal saliency guided sampling. Neurocomputing 257, 1 (2017), 115--127.
    [60]
    Xiang Zhang, Fei Peng, and Min Long. 2018. Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimedia 20, 12 (2018), 3223--3238.
    [61]
    Mingjie Zheng, Sheng-hua Zhong, Songtao Wu, and Jianmin Jiang. 2017. Steganographer detection via deep residual network. In Proceedings of the IEEE International Conference on Multimedia and Expo. 235--240.
    [62]
    Mingjie Zheng, Sheng-hua Zhong, Songtao Wu, and Jianmin Jiang. 2018. Steganographer detection based on multiclass dilated residual networks. In Proceedings of the ACM International Conference on Multimedia Retrieval. 300--308.
    [63]
    Hang Zhou, Kejiang Chen, Weiming Zhang, and Nenghai Yu. 2017. Comments on “steganography using reversible texture synthesis.” IEEE Trans. Image Process. 26, 4 (2017), 1623.

    Cited By

    View all
    • (2022)LogoDet-3K: A Large-scale Image Dataset for Logo DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/346678018:1(1-19)Online publication date: 27-Jan-2022
    • (2021)MSCNN: Steganographer Detection Based on Multi-Scale Convolutional Neural NetworksWireless Algorithms, Systems, and Applications10.1007/978-3-030-85928-2_17(215-226)Online publication date: 25-Jun-2021
    • (2020)ISC : Steganographer Detection Based on Internal Spectral Clustering2020 IEEE International Conference on Progress in Informatics and Computing (PIC)10.1109/PIC50277.2020.9350836(346-351)Online publication date: 18-Dec-2020

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 15, Issue 4
    November 2019
    322 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3376119
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 December 2019
    Accepted: 01 July 2019
    Revised: 01 March 2019
    Received: 01 October 2018
    Published in TOMM Volume 15, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Gaussian vote
    2. Steganographer detection
    3. embedding probability estimation
    4. multimedia security
    5. steganalytic feature extraction

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • the Science, Technology and Innovation Commission of Shenzhen Municipality
    • the Collaborative Innovation Center of Novel Software Technology and Industrialization
    • the Natural Science Foundation of Guangdong Province
    • the Shenzhen high-level overseas talents program
    • the National Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)LogoDet-3K: A Large-scale Image Dataset for Logo DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/346678018:1(1-19)Online publication date: 27-Jan-2022
    • (2021)MSCNN: Steganographer Detection Based on Multi-Scale Convolutional Neural NetworksWireless Algorithms, Systems, and Applications10.1007/978-3-030-85928-2_17(215-226)Online publication date: 25-Jun-2021
    • (2020)ISC : Steganographer Detection Based on Internal Spectral Clustering2020 IEEE International Conference on Progress in Informatics and Computing (PIC)10.1109/PIC50277.2020.9350836(346-351)Online publication date: 18-Dec-2020

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media