2019
DOI: 10.48550/arxiv.1904.01444
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Deep Learning in steganography and steganalysis from 2015 to 2018

Abstract: For almost 10 years, the detection of a hidden message in an image has been mainly carried out by the computation of Rich Models (RM), followed by classification using an Ensemble Classifier (EC). In 2015, the first study using a convolutional neural network (CNN) obtained the first results of steganalysis by Deep Learning approaching the performances of the two-step approach (EC + RM). Between 2015-2018, numerous publications have shown that it is possible to obtain improved performances, notably in spatial s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 95 publications
0
3
0
Order By: Relevance
“…[10]. The automatic network architecture search technique proposed in the literature [11] has shown significant results in reducing model dimensionality and maintaining performance. Also, model pruning is an effective tool and is easy to operate and implement [12].…”
Section: Model Compressionmentioning
confidence: 99%
“…[10]. The automatic network architecture search technique proposed in the literature [11] has shown significant results in reducing model dimensionality and maintaining performance. Also, model pruning is an effective tool and is easy to operate and implement [12].…”
Section: Model Compressionmentioning
confidence: 99%
“…The adversarial game is the essential nature between steganography and steganalysis. Due to the good performance of deep learning in steganalysis [15] and many other tasks, it is rational to incorporate deep neural networks into steganography to defeat these state-ofthe-art steganalysis methods. There are mainly two strategies, i.e., learning the steganographic scheme based on Generative adversarial networks(GANs) [16]- [20] or fooling a pretrained CNN-based steganalyser by the adversarial attack [21]- [23].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the advanced methods use deep neural networks (DNNs) to learn the modification probabilities of cover elements so that a cost function can be determined, allowing us to embed secret data with the minimized distortion. A survey can be found in [5]. It is true that these arts have moved data hiding ahead rapidly.…”
Section: Introductionmentioning
confidence: 99%