2016
DOI: 10.2352/issn.2470-1173.2016.8.mwsf-078
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch

Abstract: Since the BOSS competition, in 2010, most steganalysis approaches use a learning methodology involving two steps: feature extraction, such as the Rich Models (RM), for the image representation, and use of the Ensemble Classifier (EC) for the learning step. In 2015, Qian et al. have shown that the use of a deep learning approach that jointly learns and computes the features, was very promising for the steganalysis.In this paper, we follow-up the study of Qian et al., and show that in the scenario where the steg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 131 publications
(82 citation statements)
references
References 35 publications
0
82
0
Order By: Relevance
“…The pre-processed image then feeds the network. Previous studies [2,3] observed that without this preliminary high-pass filter the CNN converges more slowly. This pre-processing largely suppresses the image content, narrows the dynamic range, and thus increases the signal-to-noise ratio between the weak stego signal (if present) and the image signal.…”
Section: Yedroudj-netmentioning
confidence: 90%
See 2 more Smart Citations
“…The pre-processed image then feeds the network. Previous studies [2,3] observed that without this preliminary high-pass filter the CNN converges more slowly. This pre-processing largely suppresses the image content, narrows the dynamic range, and thus increases the signal-to-noise ratio between the weak stego signal (if present) and the image signal.…”
Section: Yedroudj-netmentioning
confidence: 90%
“…Inspired by the benefit of diversity [12], and similarly to [17], we use the 30-basic high-pass filters from SRM [12], instead of using only one filter such as [2,3,5], in order to pre-process the input image. Note that the filters kernel values of the preprocessing block, i.e.…”
Section: Yedroudj-netmentioning
confidence: 99%
See 1 more Smart Citation
“…Up to now we used double-compressed images in the experiments. As reported by Pibre et al [23], CNN based steganalyzers can take advantage of seemingly irrelevant subtle patterns to boost their performance. We must eliminate the possibility that our proposed framework makes use of the double compression artifacts to dispel the doubts of the colleagues.…”
Section: Performance With Mismatched Targets Altered Blocking Artmentioning
confidence: 93%
“…As a result, even filtered by state-of-the-art steganalytic kernels (e.g. KV kernel used in [21], [23], [24]) the magnitudes of most of the filtered residual elements are still much larger than the corresponding stego noises.…”
Section: Appendix a Theoretical Reflectionmentioning
confidence: 99%