2022
DOI: 10.1007/s11042-021-11862-4
|View full text |Cite
|
Sign up to set email alerts
|

Image steganalysis based on attention augmented convolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 33 publications
0
0
0
Order By: Relevance
“…Moreover, several other researchers proposed methods to combine the CNNs with other approaches [16], [17] that preprocess the images used in the binary classification to improve the results in steganalysis tasks. However, the proposed methods exhibit certain drawbacks regarding classification accuracy due to several problems, which include the lack of quality dataset and extensive training dataset, the inconsistency of the feature learning process, and the use of low payload by steganography practitioners, showing the need for further enhancement to effectively mitigate the risk of undetected secret communication, which could potentially have detrimental implications for companies, governmental institutions, and the community in general.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, several other researchers proposed methods to combine the CNNs with other approaches [16], [17] that preprocess the images used in the binary classification to improve the results in steganalysis tasks. However, the proposed methods exhibit certain drawbacks regarding classification accuracy due to several problems, which include the lack of quality dataset and extensive training dataset, the inconsistency of the feature learning process, and the use of low payload by steganography practitioners, showing the need for further enhancement to effectively mitigate the risk of undetected secret communication, which could potentially have detrimental implications for companies, governmental institutions, and the community in general.…”
Section: Introductionmentioning
confidence: 99%
“…One of the main characteristics is in the case of stego-images must look as like the cover images, in addition to the fact that stego-images must be considered to approve steganalysis techniques such as chi-square, RS and PVo, among others [11]- [14]. A steganography system is a quintuple 𝛿 = 𝐢, 𝑀, 𝐾, 𝐷 π‘˜ , 𝐸 π‘˜ , where 𝐢 is the set of all cover images, 𝑀 is the messages to hide, 𝐾 is the set of secret keys, 𝐸 π‘˜ ∢ 𝐢 Γ— 𝑀 Γ— 𝐾 β†’ 𝐢, and 𝐷 π‘˜ : 𝐢 Γ— 𝐾 β†’ 𝑀 [15] are two functions, the first is the embedding and the second is the extraction function, such that 𝐷 π‘˜ (𝐸 π‘˜ (𝑐, π‘š, π‘˜) π‘˜ = π‘š [16].…”
Section: Introductionmentioning
confidence: 99%
“…Various means are used to enhance the detection accuracy of deep learning for steganography. These means include transfer learning [14,15], residual architecture [16,17], absolute values [18], channel selection [19], diverse activation [20], attention augmentation [21], feature-guided adaptation [22], etc. Deep learning is a promising framework providing state-of-the-art performance for steganalysis; however, it is generally difficult to obtain all the signals about steganographic algorithms from an adversary.…”
Section: Introductionmentioning
confidence: 99%