Citation: | Hao LI, Yi ZHANG, Jinwei WANG, et al., “Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer,” Chinese Journal of Electronics, vol. 33, no. 4, pp. 965–978, 2024 doi: 10.23919/cje.2022.00.452 |
[1] |
J. Wen, Y. Q. Deng, W. L. Peng, et al., “Linguistic steganalysis via fusing multi-granularity attentional text features,” Chinese Journal of Electronics, vol. 32, no. 1, pp. 76–84, 2023. doi: 10.23919/cje.2022.00.009
|
[2] |
J. W. Luo, M. J. Yu, X. L. Yin, et al., “Binary image steganalysis based on symmetrical local residual patterns,” Chinese Journal of Electronics, vol. 31, no. 4, pp. 752–763, 2022. doi: 10.1049/cje.2020.00.414
|
[3] |
A. Westfeld and A. Pfitzmann, “Attacks on steganographic systems,” in Proceedings of 3rd International Workshop on Information Hiding, Dresden, Germany, pp. 61–76, 2000.
|
[4] |
S. Dumitrescu, X. L. Wu, and Z. Wang, “Detection of LSB steganography via sample pair analysis,” IEEE Transactions on Signal Processing, vol. 51, no. 7, pp. 1995–2007, 2023. doi: 10.1109/TSP.2003.812753
|
[5] |
K. Sullivan, U. Madhow, S. Chandrasekaran, et al., “Steganalysis for Markov cover data with applications to images,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 275–287, 2006. doi: 10.1109/TIFS.2006.873595
|
[6] |
Q. Z. Liu, A. H. Sung, and M. Y. Qiao, “Neighboring joint density-based jpeg steganalysis,” ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 2, article no. 16, 2011. doi: 10.1145/1899412.1899420
|
[7] |
J. Fridrich and J. Kodovsky, “Rich models for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868–882, 2012. doi: 10.1109/TIFS.2012.2190402
|
[8] |
T. Denemark, V. Sedighi, V. Holub, et al., “Selection-channel-aware rich model for steganalysis of digital images,” in 2014 IEEE International Workshop on Information Forensics and Security, Atlanta, GA, USA, pp. 48–53, 2014.
|
[9] |
T. Denemark, J. Fridrich, and P. Comesaña-Alfaro, “Improving selection-channel-aware steganalysis features,” Electronic Imaging, vol. 28, no. 8, article no. art00016, 2016. doi: 10.2352/ISSN.2470-1173.2016.8.MWSF-080
|
[10] |
W. X. Tang, H. D. Li, W. Q. Luo, et al., “Adaptive steganalysis based on embedding probabilities of pixels,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 4, pp. 734–745, 2016. doi: 10.1109/TIFS.2015.2507159
|
[11] |
Y. Y. Ma, X. Y. Luo, X. L. Li, et al., “Selection of rich model steganalysis features based on decision rough set α-positive region reduction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 29, no. 2, pp. 336–350, 2019. doi: 10.1109/TCSVT.2018.2799243
|
[12] |
K. Simonyan and A. Zisserman, “Very deep convolutional networks for large-scale image recognition,” arXiv preprint, arXiv: 1409.1556, 2015.
|
[13] |
K. M. He, X. Y. Zhang, S. Q. Ren, et al., “Deep residual learning for image recognition,” in Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, pp. 770–778, 2016.
|
[14] |
M. X. Tan and Q. Le, “Efficientnetv2: Smaller models and faster training,” in Proceedings of the 38th International Conference on Machine Learning, Virtual Event, pp. 10096–10106, 2021.
|
[15] |
Y. L. Qian, J. Dong, W. Wang, et al., “Learning and transferring representations for image steganalysis using convolutional neural network,” in Proceedings of the 2016 IEEE International Conference on Image Processing, Phoenix, AZ, USA, pp. 2752–2756, 2016.
|
[16] |
G. S. Xu, H. Z. Wu, and Y. Q. Shi, “Structural design of convolutional neural networks for steganalysis,” IEEE Signal Processing Letters, vol. 23, no. 5, pp. 708–712, 2016. doi: 10.1109/LSP.2016.2548421
|
[17] |
G. S. Xu, “Deep convolutional neural network to detect J-UNIWARD,” in Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA, pp. 67–73, 2017.
|
[18] |
M. Chen, V. Sedighi, M. Boroumand, et al., “JPEG-phase-aware convolutional neural network for steganalysis of JPEG images,” in Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia, PA, USA, pp. 75–84, 2017.
|
[19] |
J. Ye, J. Q. Ni, and Y. Yi, “Deep learning hierarchical representations for image steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2545–2557, 2017. doi: 10.1109/TIFS.2017.2710946
|
[20] |
M. Yedroudj, F. Comby, and M. Chaumont, “Yedroudj-Net: An efficient CNN for spatial steganalysis,” in Proceedings of the 2018 IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, AB, Canada, pp. 2092–2096, 2018.
|
[21] |
C. F. Tsang and J. Fridrich, “Steganalyzing images of arbitrary size with CNNs,” Electronic Imaging, vol. 30, no. 7, article no. art00005, 2018. doi: 10.2352/ISSN.2470-1173.2018.07.MWSF-121
|
[22] |
M. Boroumand, M. Chen, and J. Fridrich, “Deep residual network for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181–1193, 2019. doi: 10.1109/TIFS.2018.2871749
|
[23] |
R. Zhang, F. Zhu, J. Y. Liu, et al., “Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1138–1150, 2020.
|
[24] |
W. K. You, H. Zhang, and X. F. Zhao, “A Siamese CNN for image steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 291–306, 2021. doi: 10.1109/TIFS.2020.3013204
|
[25] |
A. T. Su, X. F. Zhao, and X. L. He, “Arbitrary-sized JPEG steganalysis based on fully convolutional network,” in Proceedings of 20th International Workshop on Digital Watermarking, Beijing, China, pp. 197–211, 2021.
|
[26] |
Q. L. Liu, J. Q. Ni, and M. X. Jian, “Effective JPEG steganalysis using non-linear pre-processing and residual channel-spatial attention,” in Proceedings of the 2022 IEEE International Conference on Multimedia and Expo, Taipei, China, pp. 1–6, 2022.
|
[27] |
S. W. Weng, M. F. Chen, L. F. Yu, et al., “Lightweight and effective deep image steganalysis network,” IEEE Signal Processing Letters, vol. 29, pp. 1888–1892, 2022. doi: 10.1109/LSP.2022.3201727
|
[28] |
H. Li, J. W. Wang, N. Xiong, et al., “A Siamese inverted residuals network image steganalysis scheme based on deep learning,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 19, no. 6, pp. 1–23, 2023. doi: 10.1145/3579166
|
[29] |
Y. T. Chen, R. L. Xia, K. Zou, et al., “FFTI: Image inpainting algorithm via features fusion and two-steps inpainting,” Journal of Visual Communication and Image Representation, vol. 91, article no. 103776, 2023. doi: 10.1016/j.jvcir.2023.103776
|
[30] |
Y. T. Chen, R. L. Xia, K. Yang, et al., “MFFN: Image super-resolution via multi-level features fusion network,” The Visual Computer, vol. 10, no. 2, pp. 489–504, 2024. doi: 10.1007/s00371-023-02795-0
|
[31] |
Y. T. Chen, R. L. Xia, K. Yang, et al., “DGCA: High resolution image inpainting via DR-GAN and contextual attention,” Multimedia Tools and Applications, vol. 82, no. 30, pp. 47751–47771, 2023. doi: 10.1007/s11042-023-15313-0
|
[32] |
Y. T. Chen, R. L. Xia, K. Yang, et al., “DARGS: Image inpainting algorithm via deep attention residuals group and semantics,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 6, article no. 101567, 2023. doi: 10.1016/j.jksuci.2023.101567
|
[33] |
V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, Costa Adeje, Spain, pp. 234–239, 2012.
|
[34] |
V. Holub and J. Fridrich, “Digital image steganography using universal distortion,” in Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, Montpellier, France, pp. 59–68, 2013.
|
[35] |
B. Li, M. Wang, J. W. Huang, et al., “A new cost function for spatial image steganography,” in Proceedings of the 2014 IEEE International Conference on Image Processing, Paris, France, pp. 4206–4210, 2014.
|
[36] |
L. Abrahamyan, V. Ziatchin, Y. M. Chen, et al., “Bias loss for mobile neural networks,” in Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, Montreal, QC, Canada, pp. 6536–6546, 2021.
|
[37] |
R. R. Selvaraju, M. Cogswell, A. Das, et al., “Grad-CAM: Visual explanations from deep networks via gradient-based localization,” in Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy, pp. 618–626, 2017.
|
[38] |
P. Bas, T. Filler, and T. Pevný, ““Break our steganographic system”: The ins and outs of organizing boss,” in Proceedings of 13th International Workshop on Information Hiding, Prague, Czech Republic, pp. 59–70, 2011.
|
[39] |
R. Cogranne, Q. Giboulot, and P. Bas, “The ALASKA steganalysis challenge: A first step towards steganalysis,” in Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, France, pp. 125–137, 2019.
|
[40] |
D. P. Kingma and J. L. Ba, “Adam: A method for stochastic optimization,” in Proceedings of 3rd International Conference on Learning Representations, San Diego, CA, USA, pp. 1–15, 2015.
|