{"title":"利用熵驱动深度神经网络进行数字图像隐写分析","authors":"Saurabh Agarwal , Ki-Hyun Jung","doi":"10.1016/j.jisa.2024.103799","DOIUrl":null,"url":null,"abstract":"<div><p>Context-aware steganography techniques are quite popular due to their robustness. However, steganography techniques are misused to hide inappropriate information in some occurrences. In this paper, a new entropy-driven convolutional neural network is proposed to detect a stego-image. The proposed steganalysis method divides images into multiple sub-regions, and the highest entropy sub-regions are utilized for training the network. Small block size is used to eliminate the requirement of a pooling layer and to intact the flow of information content between the layers. A pooling layer is commonly used between the layers to reduce the size of the block at the cost of some information loss. The proposed method uses only sixteen non-trainable 3 × 3 size kernels, rather than thirty 3 × 3 and 5 × 5 size kernels used in the previous networks. In the proposed method, one global average pooling layer is considered to boost the performance at the last part of the network. The proposed method reduces the computational cost and improves detection accuracy. The proposed scheme is verified in the experimental analysis on the content-aware steganography algorithms, i.e., WOW, S-UNIWARD, and HILL, with multiple payloads. Two publicly available databases, i.e., BOWS2 and BOSSBase, are used to create numerous test scenarios.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103799"},"PeriodicalIF":3.8000,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Digital image steganalysis using entropy driven deep neural network\",\"authors\":\"Saurabh Agarwal , Ki-Hyun Jung\",\"doi\":\"10.1016/j.jisa.2024.103799\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Context-aware steganography techniques are quite popular due to their robustness. However, steganography techniques are misused to hide inappropriate information in some occurrences. In this paper, a new entropy-driven convolutional neural network is proposed to detect a stego-image. The proposed steganalysis method divides images into multiple sub-regions, and the highest entropy sub-regions are utilized for training the network. Small block size is used to eliminate the requirement of a pooling layer and to intact the flow of information content between the layers. A pooling layer is commonly used between the layers to reduce the size of the block at the cost of some information loss. The proposed method uses only sixteen non-trainable 3 × 3 size kernels, rather than thirty 3 × 3 and 5 × 5 size kernels used in the previous networks. In the proposed method, one global average pooling layer is considered to boost the performance at the last part of the network. The proposed method reduces the computational cost and improves detection accuracy. The proposed scheme is verified in the experimental analysis on the content-aware steganography algorithms, i.e., WOW, S-UNIWARD, and HILL, with multiple payloads. Two publicly available databases, i.e., BOWS2 and BOSSBase, are used to create numerous test scenarios.</p></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"84 \",\"pages\":\"Article 103799\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2024-06-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212624001029\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624001029","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Digital image steganalysis using entropy driven deep neural network
Context-aware steganography techniques are quite popular due to their robustness. However, steganography techniques are misused to hide inappropriate information in some occurrences. In this paper, a new entropy-driven convolutional neural network is proposed to detect a stego-image. The proposed steganalysis method divides images into multiple sub-regions, and the highest entropy sub-regions are utilized for training the network. Small block size is used to eliminate the requirement of a pooling layer and to intact the flow of information content between the layers. A pooling layer is commonly used between the layers to reduce the size of the block at the cost of some information loss. The proposed method uses only sixteen non-trainable 3 × 3 size kernels, rather than thirty 3 × 3 and 5 × 5 size kernels used in the previous networks. In the proposed method, one global average pooling layer is considered to boost the performance at the last part of the network. The proposed method reduces the computational cost and improves detection accuracy. The proposed scheme is verified in the experimental analysis on the content-aware steganography algorithms, i.e., WOW, S-UNIWARD, and HILL, with multiple payloads. Two publicly available databases, i.e., BOWS2 and BOSSBase, are used to create numerous test scenarios.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.