Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (18)

Search Parameters:
Keywords = steganalysis detection accuracy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 443 KB  
Article
Frame-Wise Steganalysis Based on Mask-Gating Attention and Deep Residual Bilinear Interaction Mechanisms for Low-Bit-Rate Speech Streams
by Congcong Sun, Azizol Abdullah, Normalia Samian and Nuur Alifah Roslan
J. Cybersecur. Priv. 2025, 5(3), 54; https://doi.org/10.3390/jcp5030054 - 4 Aug 2025
Viewed by 314
Abstract
Frame-wise steganalysis is a crucial task in low-bit-rate speech streams that can achieve active defense. However, there is no common theory on how to extract steganalysis features for frame-wise steganalysis. Moreover, existing frame-wise steganalysis methods cannot extract fine-grained steganalysis features. Therefore, in this [...] Read more.
Frame-wise steganalysis is a crucial task in low-bit-rate speech streams that can achieve active defense. However, there is no common theory on how to extract steganalysis features for frame-wise steganalysis. Moreover, existing frame-wise steganalysis methods cannot extract fine-grained steganalysis features. Therefore, in this paper, we propose a frame-wise steganalysis method based on mask-gating attention and bilinear codeword feature interaction mechanisms. First, this paper utilizes the mask-gating attention mechanism to dynamically learn the importance of the codewords. Second, the bilinear codeword feature interaction mechanism is used to capture an informative second-order codeword feature interaction pattern in a fine-grained way. Finally, multiple fully connected layers with a residual structure are utilized to capture higher-order codeword interaction features while preserving lower-order interaction features. The experimental results show that the performance of our method is better than that of the state-of-the-art frame-wise steganalysis method on large steganography datasets. The detection accuracy of our method is 74.46% on 1000K testing samples, whereas the detection accuracy of the state-of-the-art method is 72.32%. Full article
(This article belongs to the Special Issue Multimedia Security and Privacy)
Show Figures

Figure 1

20 pages, 2026 KB  
Article
Synonym Substitution Steganalysis Based on Heterogeneous Feature Extraction and Hard Sample Mining Re-Perception
by Jingang Wang, Hui Du and Peng Liu
Big Data Cogn. Comput. 2025, 9(8), 192; https://doi.org/10.3390/bdcc9080192 - 22 Jul 2025
Viewed by 466
Abstract
Linguistic steganography can be utilized to establish covert communication channels on social media platforms, thus facilitating the dissemination of illegal messages, seriously compromising cyberspace security. Synonym substitution-based linguistic steganography methods have garnered considerable attention due to their simplicity and strong imperceptibility. Existing linguistic [...] Read more.
Linguistic steganography can be utilized to establish covert communication channels on social media platforms, thus facilitating the dissemination of illegal messages, seriously compromising cyberspace security. Synonym substitution-based linguistic steganography methods have garnered considerable attention due to their simplicity and strong imperceptibility. Existing linguistic steganalysis methods have not achieved excellent detection performance for the aforementioned type of linguistic steganography. In this paper, based on the idea of focusing on accumulated differences, we propose a two-stage synonym substitution-based linguistic steganalysis method that does not require a synonym database and can effectively detect texts with very low embedding rates. Experimental results demonstrate that this method achieves an average detection accuracy 2.4% higher than the comparative method. Full article
Show Figures

Figure 1

33 pages, 20540 KB  
Article
SG-ResNet: Spatially Adaptive Gabor Residual Networks with Density-Peak Guidance for Joint Image Steganalysis and Payload Location
by Zhengliang Lai, Chenyi Wu, Xishun Zhu, Jianhua Wu and Guiqin Duan
Mathematics 2025, 13(9), 1460; https://doi.org/10.3390/math13091460 - 29 Apr 2025
Viewed by 539
Abstract
Image steganalysis detects hidden information in digital images by identifying statistical anomalies, serving as a forensic tool to reveal potential covert communication. The field of deep learning-based image steganography has relatively scarce effective steganalysis methods, particularly those designed to extract hidden information. This [...] Read more.
Image steganalysis detects hidden information in digital images by identifying statistical anomalies, serving as a forensic tool to reveal potential covert communication. The field of deep learning-based image steganography has relatively scarce effective steganalysis methods, particularly those designed to extract hidden information. This paper introduces an innovative image steganalysis method based on generative adaptive Gabor residual networks with density-peak guidance (SG-ResNet). SG-ResNet employs a dual-stream collaborative architecture to achieve precise detection and reconstruction of steganographic information. The classification subnet utilizes dual-frequency adaptive Gabor convolutional kernels to decouple high-frequency texture and low-frequency contour components in images. It combines a density peak clustering with three quantization and transformation-enhanced convolutional blocks to generate steganographic covariance matrices, enhancing the weak steganographic signals. The reconstruction subnet synchronously constructs multi-scale features, preserves steganographic spatial fingerprints with channel-separated residual spatial rich model and pixel reorganization operators, and achieves sub-pixel-level steganographic localization via iterative optimization mechanism of feedback residual modules. Experimental results obtained with datasets generated by several public steganography algorithms demonstrate that SG-ResNet achieves State-of-the-Art results in terms of detection accuracy, with 0.94, and with a PSNR of 29 between reconstructed and original secret images. Full article
(This article belongs to the Special Issue New Solutions for Multimedia and Artificial Intelligence Security)
Show Figures

Figure 1

19 pages, 2033 KB  
Article
DeepStego: Privacy-Preserving Natural Language Steganography Using Large Language Models and Advanced Neural Architectures
by Oleksandr Kuznetsov, Kyrylo Chernov, Aigul Shaikhanova, Kainizhamal Iklassova and Dinara Kozhakhmetova
Computers 2025, 14(5), 165; https://doi.org/10.3390/computers14050165 - 29 Apr 2025
Cited by 2 | Viewed by 1024
Abstract
Modern linguistic steganography faces the fundamental challenge of balancing embedding capacity with detection resistance, particularly against advanced AI-based steganalysis. This paper presents DeepStego, a novel steganographic system leveraging GPT-4-omni’s language modeling capabilities for secure information hiding in text. Our approach combines dynamic synonym [...] Read more.
Modern linguistic steganography faces the fundamental challenge of balancing embedding capacity with detection resistance, particularly against advanced AI-based steganalysis. This paper presents DeepStego, a novel steganographic system leveraging GPT-4-omni’s language modeling capabilities for secure information hiding in text. Our approach combines dynamic synonym generation with semantic-aware embedding to achieve superior detection resistance while maintaining text naturalness. Through comprehensive experimentation, DeepStego demonstrates significantly lower detection rates compared to existing methods across multiple state-of-the-art steganalysis techniques. DeepStego supports higher embedding capacities while maintaining strong detection resistance and semantic coherence. The system shows superior scalability compared to existing methods. Our evaluation demonstrates perfect message recovery accuracy and significant improvements in text quality preservation compared to competing approaches. These results establish DeepStego as a significant advancement in practical steganographic applications, particularly suitable for scenarios requiring secure covert communication with high embedding capacity. Full article
(This article belongs to the Special Issue Natural Language Processing (NLP) and Large Language Modelling)
Show Figures

Figure 1

19 pages, 2919 KB  
Article
Optimization Strategies Applied to Deep Learning Models for Image Steganalysis: Application of Pruning, Quantization and Weight Clustering
by Gabriel Ferreira, Manoel Henrique da Nóbrega Marinho, Verusca Severo and Francisco Madeiro
Appl. Sci. 2025, 15(9), 4632; https://doi.org/10.3390/app15094632 - 22 Apr 2025
Viewed by 778
Abstract
Image steganalysis methods aim at detecting whether there exist hidden messages in images. Deep learning (DL) models have been proposed to enhance steganography detection. These models occupy a large amount of memory and, for this reason, should be optimized when the scenario involves [...] Read more.
Image steganalysis methods aim at detecting whether there exist hidden messages in images. Deep learning (DL) models have been proposed to enhance steganography detection. These models occupy a large amount of memory and, for this reason, should be optimized when the scenario involves resource-limited devices and systems. This work addresses different deep learning model optimization strategies, namely model pruning, quantization and weight clustering, applied to a deep learning model that presents competitive accuracy results in image steganalysis and belongs to the family of DL models with smaller memory requirements. The results show that the use of optimization schemes can lead to similar or even better accuracy compared to the original model (without the use of optimization schemes), while requiring less memory to store the model. Different scenarios are simulated for each optimization technique, and, finally, quantization is combined with pruning. For dynamic range quantization (DRQ), we achieve models that can save approximately 72% of storage. For FP16 quantization, we obtain better accuracy results and a model with approximately 50% less memory consumption. By applying weight clustering, we also achieve compressed models that can save more than 72% of storage space and lead to better accuracy for some scenarios. Using the combination of pruning and quantization, smaller models in terms of memory requirements are obtained. Full article
Show Figures

Figure 1

23 pages, 2354 KB  
Article
A Generic Image Steganography Recognition Scheme with Big Data Matching and an Improved ResNet50 Deep Learning Network
by Xuefeng Gao, Junkai Yi, Lin Liu and Lingling Tan
Electronics 2025, 14(8), 1610; https://doi.org/10.3390/electronics14081610 - 16 Apr 2025
Cited by 1 | Viewed by 817
Abstract
Image steganalysis has been a key technology in information security in recent years. However, existing methods are mostly limited to the binary classification for detecting steganographic images used in digital watermarking, privacy protection, illicit data concealment, and security images, such as unaltered cover [...] Read more.
Image steganalysis has been a key technology in information security in recent years. However, existing methods are mostly limited to the binary classification for detecting steganographic images used in digital watermarking, privacy protection, illicit data concealment, and security images, such as unaltered cover images or surveillance images. They cannot identify the steganography algorithms used in steganographic images, which restricts their practicality. To solve this problem, this paper proposes a general steganography algorithms recognition scheme based on image big data matching with improved ResNet50. The scheme first intercepts the image region with the highest complexity and focuses on the key features to improve the analysis efficiency; subsequently, the original image of the image to be detected is accurately located by the image big data matching technique and the steganographic difference feature image is generated; finally, the ResNet50 is improved by combining the pyramid attention mechanism and the joint loss function, which achieves the efficient recognition of the steganography algorithm. To verify the feasibility and effectiveness of the scheme, three experiments are designed in this paper: verification of the selection of the core analysis region, verification of the image similarity evaluation based on Peak Signal-to-Noise Ratio (PSNR), and performance verification of the improved ResNet50 model. The experimental results show that the scheme proposed in this paper outperforms the existing mainstream steganalysis models, such as ZhuNet and YeNet, with a detection accuracy of 96.11%, supports the recognition of six adaptive steganography algorithms, and adapts to the needs of analysis of multiple sizes and image formats, demonstrating excellent versatility and application value. Full article
(This article belongs to the Special Issue AI-Based Solutions for Cybersecurity)
Show Figures

Graphical abstract

27 pages, 9334 KB  
Article
AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography
by Haiju Fan, Changyuan Jin and Ming Li
Entropy 2025, 27(3), 282; https://doi.org/10.3390/e27030282 - 9 Mar 2025
Cited by 1 | Viewed by 1290
Abstract
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant threat to traditional steganography. To address this, we propose [...] Read more.
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant threat to traditional steganography. To address this, we propose AGASI, a GAN-based approach for strengthening adversarial image steganography. This method employs an encoder as the generator in conjunction with a discriminator to form a generative adversarial network (GAN), thereby enhancing the robustness of stego-images against steganalysis tools. Additionally, the GAN framework reduces the gap between the original secret image and the extracted image, while the decoder effectively extracts the secret image from the stego-image, achieving the goal of image privacy protection. Experimental results demonstrate that the AGASI method not only ensures high-quality secret images but also effectively reduces the accuracy of neural network classifiers, inducing misclassifications and significantly increasing the embedding capacity of the steganography system. For instance, under PGD attack, the adversarial stego-images generated by the GAN, at higher disturbance levels, successfully maintain the quality of the secret image while achieving an 84.73% misclassification rate in neural network detection. Compared to images with the same visual quality, our method increased the misclassification rate by 23.31%. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

23 pages, 5047 KB  
Article
Generative Steganography Based on the Construction of Chinese Chess Record
by Yi Cao, Youwei Du, Wentao Ge, Yanshu Huang, Chengsheng Yuan and Quan Wang
Electronics 2025, 14(3), 451; https://doi.org/10.3390/electronics14030451 - 23 Jan 2025
Viewed by 1155
Abstract
Steganography is a technique for hiding secret information in imperceptible carriers and transmitting it. Unlike traditional embedding-based steganography, generative steganography can generate stego-carriers directly from secret messages, thus avoiding modifications to natural carriers that steganalysis can detect. As a branch of generative steganography, [...] Read more.
Steganography is a technique for hiding secret information in imperceptible carriers and transmitting it. Unlike traditional embedding-based steganography, generative steganography can generate stego-carriers directly from secret messages, thus avoiding modifications to natural carriers that steganalysis can detect. As a branch of generative steganography, game-behavior-based steganography transmits secret information by encoding game behavior. It can naturally integrate with real interaction scenarios, exhibiting strong concealment and undetectability. To this end, this paper proposes a generative steganography based on Chinese Chess record construction. Firstly, an AlphaZero model was trained to achieve a high level in Chinese Chess, then transmit secret information by encoding chess behavior. Specifically, in each chess step, the model generates all the current feasible moves and encodes the moves that meet the threshold strategy according to probability. Then, the appropriate move will be selected according to the secret information. To ensure the reasonableness of the generated chess records, this paper controlled the game process and designed a database of fixed opening chess records. The proposed method can hide an average of 413 bits of information for each carrier and effectively resist common image attacks. Regarding anti-steganalysis, the proposed method achieved accuracy rates of 0.498 and 0.497 on XuNet and YeNet, respectively, outperforming other behavior-based steganography techniques. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

14 pages, 5970 KB  
Article
Universal Image Vaccine Against Steganography
by Shiyu Wei, Zichi Wang and Xinpeng Zhang
Symmetry 2025, 17(1), 66; https://doi.org/10.3390/sym17010066 - 2 Jan 2025
Viewed by 1056
Abstract
In the past decade, the diversification of steganographic techniques has posed significant threats to information security, necessitating effective countermeasures. Current defenses, mainly reliant on steganalysis, struggle with detection accuracy. While “image vaccines” have been proposed, they often target specific methodologies. This paper introduces [...] Read more.
In the past decade, the diversification of steganographic techniques has posed significant threats to information security, necessitating effective countermeasures. Current defenses, mainly reliant on steganalysis, struggle with detection accuracy. While “image vaccines” have been proposed, they often target specific methodologies. This paper introduces a universal steganographic vaccine to enhance steganalysis accuracy. Our symmetric approach integrates with existing methods to protect images before online dissemination using the Contrast Limited Adaptive Histogram Equalization (CLAHE) algorithm. Experimental results show significant accuracy improvements across traditional and deep learning-based steganalysis, especially at medium-to-high payloads. Specifically, for payloads of 0.1–0.5 bpp, the original detection error rate was reduced from 0.3429 to 0.2346, achieving an overall average reduction of 31.57% for traditional algorithms, while the detection success rate of deep learning-based algorithms can reach 100%. Overall, integrating CLAHE as a universal vaccine significantly advances steganalysis. Full article
Show Figures

Figure 1

13 pages, 8080 KB  
Article
Linguistic Secret Sharing via Ambiguous Token Selection for IoT Security
by Kai Gao, Ji-Hwei Horng, Ching-Chun Chang and Chin-Chen Chang
Electronics 2024, 13(21), 4216; https://doi.org/10.3390/electronics13214216 - 27 Oct 2024
Cited by 2 | Viewed by 1214
Abstract
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to [...] Read more.
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, including weak authentication, insufficient data protection, and firmware vulnerabilities. To address these issues, we propose a linguistic secret sharing scheme tailored for IoT applications. This scheme leverages neural networks to embed private data within texts transmitted by IoT devices, using an ambiguous token selection algorithm that maintains the textual integrity of the cover messages. Our approach eliminates the need to share additional information for accurate data extraction while also enhancing security through a secret sharing mechanism. Experimental results demonstrate that the proposed scheme achieves approximately 50% accuracy in detecting steganographic text across two steganalysis networks. Additionally, the generated steganographic text preserves the semantic information of the cover text, evidenced by a BERT score of 0.948. This indicates that the proposed scheme performs well in terms of security. Full article
(This article belongs to the Special Issue IoT Security in the Age of AI: Innovative Approaches and Technologies)
Show Figures

Figure 1

20 pages, 6594 KB  
Article
IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography
by Chunying Zhang, Xinkai Gao, Xiaoxiao Liu, Wei Hou, Guanghui Yang, Tao Xue, Liya Wang and Lu Liu
Electronics 2023, 12(13), 2881; https://doi.org/10.3390/electronics12132881 - 29 Jun 2023
Cited by 10 | Viewed by 2591
Abstract
Traditional image steganography techniques complete the steganography process by embedding secret information into cover images, but steganalysis tools can easily detect detectable pixel changes that lead to the leakage of confidential information. The use of a generative adversarial network (GAN) makes it possible [...] Read more.
Traditional image steganography techniques complete the steganography process by embedding secret information into cover images, but steganalysis tools can easily detect detectable pixel changes that lead to the leakage of confidential information. The use of a generative adversarial network (GAN) makes it possible to embed information using a combination of information and noise in generating images to achieve steganography. However, this approach is usually accompanied by issues such as poor image quality and low steganography capacity. To address these challenges, we propose a steganography model based on a novel information-driven generative adversarial network (IDGAN), which fuses a GAN, attention mechanisms, and image interpolation techniques. We introduced an attention mechanism on top of the original GAN model to improve image accuracy. In the generation model, we replaced some transposed convolution operations with image interpolation for better quality of dense images. In contrast to traditional steganographic methods, the IDGAN generates images containing confidential information without using cover images and utilizes GANs for information embedding, thus having better anti-detection capability. Moreover, the IDGAN uses an attention mechanism to improve the image details and clarity and optimizes the steganography effect through an image interpolation algorithm. Experimental results demonstrate that the IDGAN achieves an accuracy of 99.4%, 95.4%, 93.2%, and 100% on the MNIST, Intel Image Classification, Flowers, and Face datasets, respectively, with an embedding rate of 0.17 bpp. The model effectively protects confidential information while maintaining high image quality. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

12 pages, 464 KB  
Communication
FedSpy: A Secure Collaborative Speech Steganalysis Framework Based on Federated Learning
by Hui Tian, Huidong Wang, Hanyu Quan, Wojciech Mazurczyk and Chin-Chen Chang
Electronics 2023, 12(13), 2854; https://doi.org/10.3390/electronics12132854 - 28 Jun 2023
Viewed by 2113
Abstract
Deep learning brings the opportunity to achieve effective speech steganalysis in speech signals. However, the speech samples used to train speech steganalysis models (i.e., steganalyzers) are usually sensitive and distributed among different agencies, making it impractical to train an effective centralized steganalyzer. Therefore, [...] Read more.
Deep learning brings the opportunity to achieve effective speech steganalysis in speech signals. However, the speech samples used to train speech steganalysis models (i.e., steganalyzers) are usually sensitive and distributed among different agencies, making it impractical to train an effective centralized steganalyzer. Therefore, in this paper, we present an effective framework, named FedSpy, using federated learning, which enables multiple agencies to securely and jointly train the speech steganalysis models without sharing their speech samples. FedSpy is a flexible and extensible framework that can work effectively in conjunction with various deep-learning-based speech steganalysis methods. We evaluate the performance of FedSpy by detecting the most widely used Quantization Index Modulation-based speech steganography with three state-of-the-art deep-learning-based steganalysis methods representatively. The results show that FedSpy significantly outperforms the local steganalyzers and achieves good detection accuracy comparable to the centralized steganalyzer. Full article
(This article belongs to the Special Issue Novel Technologies for Systems and Network Security)
Show Figures

Figure 1

12 pages, 1926 KB  
Article
Image Steganalysis of Low Embedding Rate Based on the Attention Mechanism and Transfer Learning
by Shouyue Liu, Chunying Zhang, Liya Wang, Pengchao Yang, Shaona Hua and Tong Zhang
Electronics 2023, 12(4), 969; https://doi.org/10.3390/electronics12040969 - 15 Feb 2023
Cited by 9 | Viewed by 2562
Abstract
In recent years, some research results have been achieved in the field of image steganalysis. However, there are still problems of difficulty in extracting steganographic features from images with low embedding rates and unsatisfactory detection performance of steganalysis. In this paper, we propose [...] Read more.
In recent years, some research results have been achieved in the field of image steganalysis. However, there are still problems of difficulty in extracting steganographic features from images with low embedding rates and unsatisfactory detection performance of steganalysis. In this paper, we propose an image steganalysis method based on the attention mechanism and transfer learning. The method constructs a network model based on a convolutional neural network, including a preprocessing layer, a transposed convolutional layer, an ordinary convolutional layer, and a fully connected layer. We introduce the efficient channel attention module after the ordinary convolutional layer to focus on the steganographic region of the image, capture the local cross-channel interaction information, realize the adaptive adjustment of feature weights, and enhance the ability to extract steganographic features. Meanwhile, we apply the transfer learning method to use the training model parameters of high embedding rate images as the initialization parameters of the training model of the low embedding rate to achieve feature migration and further improve the steganalysis performance of the low embedding rate. The experimental results show that compared to the typical Xu-Net and Yedroudj-Net models, the detection accuracy of the proposed method is improved by 16.36% to 30.66% and by 35.59 to 37.83% for the embedding rates of 0.05 bpp, 0.1 bpp, and 0.2 bpp, respectively. Compared to the state-of-the-art Shen-Net model with low embedding rates, the detection accuracy is improved by 3.43% to 6.41%. This demonstrates the higher detection performance of the proposed method for steganalysis of low embedding rate images. Full article
(This article belongs to the Special Issue Intelligent Analysis and Security Calculation of Multisource Data)
Show Figures

Figure 1

18 pages, 569 KB  
Article
Gain-Loss Evaluation-Based Generic Selection for Steganalysis Feature
by Ruixia Jin, Yihao Wang, Yuanyuan Ma, Tao Li and Xintao Duan
Symmetry 2021, 13(10), 1775; https://doi.org/10.3390/sym13101775 - 24 Sep 2021
Cited by 1 | Viewed by 1930
Abstract
Fewer contribution feature components in the image high-dimensional steganalysis feature are able to increase the spatio-temporal complexity of detecting the stego images, and even reduce the detection accuracy. In order to maintain or even improve the detection accuracy while effectively reducing the dimension [...] Read more.
Fewer contribution feature components in the image high-dimensional steganalysis feature are able to increase the spatio-temporal complexity of detecting the stego images, and even reduce the detection accuracy. In order to maintain or even improve the detection accuracy while effectively reducing the dimension of the DCTR steganalysis feature, this paper proposes a new selection approach for DCTR feature. First, the asymmetric distortion factor and information gain ratio of each feature component are improved to measure the difference between the symmetric cover and stego features, which provides the theoretical basis for selecting the feature components that contribute to a great degree to detecting the stego images. Additionally, the feature components are arranged in descending order rely on the two measurement criteria, which provides the basis for deleting the components. Based on the above, removing feature components that are ranked larger differently according to two criteria. Ultimately, the preserved feature components are used as the final selected feature for training and detection. Comparison experiments with existing classical approaches indicate that this approach can effectively reduce the feature dimension while maintaining or even improving the detection accuracy. At the same time, it can reduce the detection spatio-temporal complexity of the stego images. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

20 pages, 4754 KB  
Article
A Fast Selection Based on Similar Cross-Entropy for Steganalytic Feature
by Ruixia Jin, Xinquan Yu, Yuanyuan Ma, Shuang Yin and Lige Xu
Symmetry 2021, 13(9), 1564; https://doi.org/10.3390/sym13091564 - 25 Aug 2021
Viewed by 2262
Abstract
The mutual confrontation between image steganography and steganalysis causes both to iterate continuously, and as a result, the dimensionality of the steganalytic features continues to increase, leading to an increasing spatio-temporal overhead. To this end, this paper proposes a fast steganalytic feature selection [...] Read more.
The mutual confrontation between image steganography and steganalysis causes both to iterate continuously, and as a result, the dimensionality of the steganalytic features continues to increase, leading to an increasing spatio-temporal overhead. To this end, this paper proposes a fast steganalytic feature selection method based on a similar cross-entropy. Firstly, the properties of cross-entropy are investigated, through the discussion of different models, and the intra-class similarity criterion and inter-class similarity criterion based on cross-entropy are presented for the first time. Then, referring to the design principles of Fisher’s criterion, the criterion of feature contribution degree is further proposed. Secondly, the variation of the cross-entropy function of a univariate variable is analyzed in principle, thus determining the normalized range and simplifying the subsequent analysis. Then, within the normalized range, the variation of the cross-entropy function of a binary variable is investigated and the setting of important parameters is determined. Thirdly, the concept of similar cross-entropy is further presented by analyzing the changes in the value of the feature contribution measure under different circumstances, and based on this, the criterion for the feature contribution measure is updated to decrease the complexity of the calculation. Remarkably, the contribution measure criterion devised in this paper is a symmetrical structure, which equitably measures the contribution of features in different situations. Fourth, the feature component with the highest contribution is selected as the final selected feature based on the result of the feature metric. Finally, based on the Bossbase 1.01 image base that is a unique standard and recognized base in steganalysis, the feature selection on 8 kinds of low and high-dimensional steganalytic features is carried out. Through extensive experiments, comparison with several classic and state-of-the-art methods, the method designed in this paper attains competitive or even better performance in detection accuracy, calculation cost, storage cost and versatility. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

Back to TopTop