Steganalysis Network for Weak Steganographic Signal Extraction and Enhancement
Abstract
1. Introduction
- We design a learnable preprocessing structure with high-pass prior constraints. This structure initializes the parameters of the filtering kernel randomly while introducing high-pass prior knowledge through the addition of a high-pass constraint branch. This allows the new network to automatically search for optimal parameters during training while focusing on the complex areas of secret message embedding in images through high-pass prior constraints.
- We introduce a novel auxiliary branch for extracting second-order signals to capture different-order signals, effectively enhancing the features of weak steganographic embedding signals. By utilizing the second-order signal extraction auxiliary branch at multiple levels, we can strengthen the intensity of weak signals, thereby alleviating the suppression of weak signals by convolution. Moreover, these second-order signal auxiliary branches can be removed during inference to avoid complex computations and save time.
- We employ the SoftPool pooling method [27] and extend it to a new global soft pooling (GSP) method. SoftPool pooling can utilize all elements in the kernel neighborhood while assigning greater weights to representative elements, thereby preventing excessive weakening of features of weak embedding signals during pooling. GSP can diversify the compression of features extracted by convolutional layers, better capturing information from feature maps.
- Experimental results demonstrate that WSERNet outperforms the state-of-the-art spatial domain image steganalysis networks in terms of performance and exhibits superior generalization performance across different steganography techniques.
2. Related Works
3. Materials and Methods
3.1. Overview of Method
3.2. The LFCHP Module: Learnable Filters with High-Pass Prior Constraint
3.3. Feature Enhancement Module
3.4. SoftPool and Global SoftPool (GSP)
4. Experimental Results and Analysis
4.1. Dataset and Environment Settings
4.2. Ablation Study of LFCHP
4.3. Ablation Study for the SSAB and the Pooling Layer
4.4. Comparison of Generalization Performance Across Different Steganography Techniques
4.5. Performance Comparison
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| LFCHP | learnable filter constrained by high-pass prior |
| SSAB | second-order signal auxiliary branch |
| CNN | convolutional neural network |
| GNCNN | Gaussian-Neuron CNN |
| TLU | truncated linear unit |
| CPSN | Covariance Pooling Steganalysis Network |
| HPCB | high-pass prior constraint branch |
| LFB | learnable filter bank |
| FEM | feature enhancement module |
| BN | batch normalization |
| FC | fully connected |
| TanH | hyperbolic tangent function |
| GSP | global Soft Pooling |
| GCP | global covariance pooling |
| GAP | global average pooling |
| GMP | global max pooling |
References
- Xiang, S.; Luo, X. Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key Cryptosystem. J. Softw. 2016, 27, 1592. [Google Scholar] [CrossRef]
- Wani, M.A.; Sultan, B. Deep learning based image steganography: A review. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2023, 13, e1481. [Google Scholar] [CrossRef]
- Kombrink, M.H.; Geradts, Z.J.M.H.; Worring, M. Image Steganography Approaches and Their Detection Strategies: A Survey. ACM Comput. Surv. 2024, 57, 1–40. [Google Scholar] [CrossRef]
- Chen, F.; Fu, Z.; Zhang, W.; Cheng, X.; Sun, X. Review of image steganalysis based on deep learning. Ruan Jian Xue Bao 2021, 32, 551–578. [Google Scholar] [CrossRef]
- Gao, S.; Zhang, Z.; Li, Q.; Ding, S.; Iu, H.H.C.; Cao, Y.; Xu, X.; Wang, C.; Mou, J. Encrypt a Story: A Video Segment Encryption Method Based on the Discrete Sinusoidal Memristive Rulkov Neuron. IEEE Trans. Dependable Secur. Comput. 2025, 22, 8011–8024. [Google Scholar] [CrossRef]
- Pevný, T.; Filler, T.; Bas, P. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In Proceedings of the Information Hiding; Böhme, R., Fong, P.W.L., Safavi-Naini, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 161–177. [Google Scholar]
- Cheng, X.; Wang, H.; Luo, X.; Guan, Q.; Ma, B.; Wang, J. Re-cropping Framework: A Grid Recovery Method for Quantization Step Estimation in Non-aligned Recompressed Images. IEEE Trans. Circuits Syst. Video Technol. 2025, early access. [Google Scholar] [CrossRef]
- Pevný, T.; Bas, P.; Fridrich, J. Steganalysis by Subtractive Pixel Adjacency Matrix. In MM&Sec ’09: Proceedings of the 11th ACM Workshop on Multimedia and Security; ACM Digital Library: New York, NY, USA, 2009; pp. 75–84. [Google Scholar] [CrossRef]
- Fridrich, J.; Kodovsky, J. Rich Models for Steganalysis of Digital Images. IEEE Trans. Inf. Forensic Secur. 2012, 7, 868–882. [Google Scholar] [CrossRef]
- Holub, V.; Fridrich, J. Random Projections of Residuals for Digital Image Steganalysis. IEEE Trans. Inf. Forensic Secur. 2013, 8, 1996–2006. [Google Scholar] [CrossRef]
- Holub, V.; Fridrich, J. Designing steganographic distortion using directional filters. In Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security (WIFS); IEEE: New York, NY, USA, 2012; pp. 234–239. [Google Scholar] [CrossRef]
- Li, B.; Wang, M.; Huang, J.; Li, X. A new cost function for spatial image steganography. In Proceedings of the 2014 IEEE International Conference on Image Processing (ICIP); IEEE: New York, NY, USA, 2014; pp. 4206–4210. [Google Scholar] [CrossRef]
- Zhang, L.; Lu, Y.; Li, T.; Lu, G. Joint adjustment image steganography networks. Signal Process. Image Commun. 2023, 118, 117022. [Google Scholar] [CrossRef]
- Wang, T.; Cheng, H.; Liu, X.; Xu, Y.; Chen, F.; Wang, M.; Chen, J. Lossless image steganography: Regard steganography as super-resolution. Inf. Process. Manag. 2024, 61, 103719. [Google Scholar] [CrossRef]
- Tan, S.; Li, B. Stacked convolutional auto-encoders for steganalysis of digital images. In Proceedings of the Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific; IEEE: New York, NY, USA, 2014; pp. 1–4. [Google Scholar] [CrossRef]
- Qian, Y.; Dong, J.; Wang, W.; Tan, T. Deep learning for steganalysis via convolutional neural networks. In Proceedings of the Media Watermarking, Security, and Forensics 2015; Alattar, A.M., Memon, N.D., Heitzenrater, C.D., Eds.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2015; Volume 9409, p. 94090J. [Google Scholar] [CrossRef]
- Xu, G.S.; Wu, H.Z.; Shi, Y.Q. Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Process. Lett. 2016, 23, 708–712. [Google Scholar] [CrossRef]
- Ye, J.; Ni, J.; Yi, Y. Deep Learning Hierarchical Representations for Image Steganalysis. IEEE Trans. Inf. Forensic Secur. 2017, 12, 2545–2557. [Google Scholar] [CrossRef]
- Deng, X.; Chen, B.; Luo, W.; Luo, D. Fast and Effective Global Covariance Pooling Network for Image Steganalysis. In IH&MMSec’19: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security; ACM Digital Library: New York, NY, USA, 2019; pp. 230–234. [Google Scholar] [CrossRef]
- Boroumand, M.; Chen, M.; Fridrich, J. Deep Residual Network for Steganalysis of Digital Images. IEEE Trans. Inf. Forensic Secur. 2019, 14, 1181–1193. [Google Scholar] [CrossRef]
- Zhang, R.; Zhu, F.; Liu, J.; Liu, G. Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. IEEE Trans. Inf. Forensic Secur. 2020, 15, 1138–1150. [Google Scholar] [CrossRef]
- Liu, J.; Jiao, G.; Sun, X. Feature Passing Learning for Image Steganalysis. IEEE Signal Process. Lett. 2022, 29, 2233–2237. [Google Scholar] [CrossRef]
- Fu, T.; Chen, L.; Fu, Z.; Yu, K.; Wang, Y. CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis. J. Vis. Commun. Image Represent. 2022, 88, 103633. [Google Scholar] [CrossRef]
- Boureau, Y.L.; Ponce, J.; LeCun, Y. A theoretical analysis of feature pooling in visual recognition. In Proceedings of the 27th International Conference on Machine Learning (ICML-10); ACM Digital Library: New York, NY, USA, 2010; pp. 111–118. [Google Scholar]
- Zhang, Q.; Cui, Z.; Niu, X.; Geng, S.; Qiao, Y. Image segmentation with pyramid dilated convolution based on ResNet and U-Net. In Proceedings of the Neural Information Processing: 24th International Conference, ICONIP 2017, Guangzhou, China, 14-18 November 2017; Proceedings, Part II 24; Springer: Cham, Switzerland, 2017; pp. 364–372. [Google Scholar]
- Wu, T.; Ren, W.; Li, D.; Wang, L.; Jia, J. JPEG steganalysis based on denoising network and attention module. Int. J. Intell. Syst. 2022, 37, 5011–5030. [Google Scholar] [CrossRef]
- Stergiou, A.; Poppe, R.; Kalliatakis, G. Refining activation downsampling with SoftPool. In Proceedings of the IEEE/CVF International Conference on Computer Vision; IEEE: New York, NY, USA, 2021; pp. 10357–10366. [Google Scholar]
- Xu, X.; Song, X.; Zhao, R. Selection-Channel-Aware Scale Co-occurrence Matrix Feature to Detect Content-Adaptive JPEG Steganography. In Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence; ACM Digital Library: New York, NY, USA, 2018; pp. 375–379. [Google Scholar]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2015, 37, 1904–1916. [Google Scholar] [CrossRef]
- Li, P.; Xie, J.; Wang, Q.; Gao, Z. Towards faster training of global covariance pooling networks by iterative matrix square root normalization. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition; IEEE: New York, NY, USA, 2018; pp. 947–955. [Google Scholar]
- You, W.; Zhang, H.; Zhao, X. A Siamese CNN for Image Steganalysis. IEEE Trans. Inf. Forensic Secur. 2021, 16, 291–306. [Google Scholar] [CrossRef]
- Chopra, S.; Hadsell, R.; LeCun, Y. Learning a similarity metric discriminatively, with application to face verification. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05); IEEE: New York, NY, USA, 2005; Volume 1, pp. 539–546. [Google Scholar]
- Hadsell, R.; Chopra, S.; LeCun, Y. Dimensionality reduction by learning an invariant mapping. In Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06); IEEE: New York, NY, USA, 2006; Volume 2, pp. 1735–1742. [Google Scholar]
- Weng, S.; Chen, M.; Yu, L.; Sun, S. Lightweight and Effective Deep Image Steganalysis Network. IEEE Signal Process. Lett. 2022, 29, 1888–1892. [Google Scholar] [CrossRef]
- Lin, Z.; Gao, Y.; Sang, J. Investigating and Explaining the Frequency Bias in Image Classification. arXiv 2022, arXiv:2205.03154. [Google Scholar] [CrossRef]
- Li, L.; Xie, J.; Li, P.; Zhang, L. Detachable second-order pooling: Toward high-performance first-order networks. IEEE Trans. Neural Networks Learn. Syst. 2021, 33, 3400–3414. [Google Scholar] [CrossRef]
- Bas, P.; Filler, T.; Pevnỳ, T. “Break our steganographic system”: The ins and outs of organizing BOSS. In Proceedings of the International Workshop on Information Hiding; Springer: Berlin/Heidelberg, Germany, 2011; pp. 59–70. [Google Scholar]
- Furon, P. BOWS-2. 2007. Available online: http://bows2.ec-lille.fr (accessed on 1 December 2025).
- Holub, V.; Fridrich, J.; Denemark, T. Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 2014, 1. [Google Scholar] [CrossRef]





| λ | 0.07 | 0.08 | 0.09 | 0.1 | 0.2 | 0.3 | 0.4 |
| Acc | 85.07 | 84.87 | 85.20 | 85.25 | 85.10 | 85.14 | 85.02 |
| Preprocessing | HILL (0.2 bpp) | HILL (0.4 bpp) |
|---|---|---|
| HPF | 73.40 | 83.25 |
| HPF+2conv | 73.49 | 83.43 |
| LFCHP | 75.37 | 85.25 |
| Network | HILL (0.2 bpp) | HILL (0.4 bpp) |
|---|---|---|
| WSERNet without SSAB | 74.16 | 84.13 |
| WSERNet with SSAB | 75.37 | 85.25 |
| Pooling+Global Pooling | Accuracy | Number of Classifier Parameters |
|---|---|---|
| MaxPool+GAP | 82.78 | 514 |
| AvgPool+GAP | 84.31 | 514 |
| SoftPool+GAP | 84.70 | 514 |
| AvgPool+GSP | 84.89 | 2050 |
| SoftPool+GSP | 85.25 | 2050 |
| Network | Train Method | Test Method | ||
|---|---|---|---|---|
| WOW | S-UNIWARD | HILL | ||
| SRNet | WOW | 87.41 | 78.39 | 65.88 |
| S-UNIWARD | 84.12 | 85.19 | 73.41 | |
| HILL | 81.83 | 73.43 | 81.59 | |
| Zhu-Net | WOW | 85.74 | 76.27 | 63.82 |
| S-UNIWARD | 81.76 | 82.53 | 67.42 | |
| HILL | 80.11 | 72.84 | 79.26 | |
| CPSN | WOW | 89.51 | 82.44 | 65.42 |
| S-UNIWARD | 88.84 | 88.39 | 73.18 | |
| HILL | 84.10 | 76.72 | 83.34 | |
| FPNet | WOW | 88.12 | 75.30 | 62.51 |
| S-UNIWARD | 83.48 | 86.17 | 67.79 | |
| HILL | 81.18 | 73.60 | 80.09 | |
| LWENet | WOW | 89.83 | 81.10 | 64.62 |
| S-UNIWARD | 88.73 | 88.56 | 71.98 | |
| HILL | 83.97 | 77.11 | 83.58 | |
| ours | WOW | 91.43 | 84.72 | 67.47 |
| S-UNIWARD | 90.41 | 89.90 | 73.67 | |
| HILL | 86.02 | 80.41 | 85.25 | |
| Network | WOW | S-UNIWARD | HILL | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0.1 | 0.2 | 0.3 | 0.4 | 0.1 | 0.2 | 0.3 | 0.4 | 0.1 | 0.2 | 0.3 | 0.4 | |
| SRNet [20] | 73.67 | 82.91 | 87.41 | 90.08 | 68.20 | 78.88 | 84.86 | 88.43 | 66.34 | 74.49 | 80.31 | 83.78 |
| Zhu-Net [21] | 71.34 | 81.10 | 86.25 | 88.69 | 62.43 | 71.58 | 78.44 | 84.63 | 62.46 | 70.59 | 76.20 | 81.10 |
| CPSN [19] | 74.04 | 83.37 | 88.07 | 91.25 | 68.52 | 79.26 | 85.25 | 89.85 | 67.20 | 75.88 | 81.22 | 85.25 |
| FPNet [22] | 74.63 | 83.09 | 87.95 | 90.76 | 67.14 | 76.88 | 84.50 | 87.36 | 66.75 | 74.07 | 79.47 | 82.96 |
| LWENet [34] | 76.16 | 84.14 | 88.23 | 92.06 | 69.03 | 79.72 | 85.66 | 89.78 | 67.87 | 75.27 | 81.34 | 85.59 |
| Ours | 78.18 | 87.10 | 90.47 | 93.14 | 72.06 | 81.33 | 87.35 | 91.63 | 69.79 | 77.14 | 83.35 | 87.32 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Liang, W.; Li, Q. Steganalysis Network for Weak Steganographic Signal Extraction and Enhancement. Sensors 2026, 26, 1329. https://doi.org/10.3390/s26041329
Liang W, Li Q. Steganalysis Network for Weak Steganographic Signal Extraction and Enhancement. Sensors. 2026; 26(4):1329. https://doi.org/10.3390/s26041329
Chicago/Turabian StyleLiang, Weilin, and Qingguang Li. 2026. "Steganalysis Network for Weak Steganographic Signal Extraction and Enhancement" Sensors 26, no. 4: 1329. https://doi.org/10.3390/s26041329
APA StyleLiang, W., & Li, Q. (2026). Steganalysis Network for Weak Steganographic Signal Extraction and Enhancement. Sensors, 26(4), 1329. https://doi.org/10.3390/s26041329

