메뉴 건너뛰기




Volumn 23, Issue 5, 2016, Pages 708-712

Structural design of convolutional neural networks for steganalysis

Author keywords

Convolutional neural networks (CNN); deep learning; forensics; steganalysis

Indexed keywords

COMPUTER VISION; CONVOLUTION; NEURAL NETWORKS; STEGANOGRAPHY; STRUCTURAL DESIGN;

EID: 84964992861     PISSN: 10709908     EISSN: None     Source Type: Journal    
DOI: 10.1109/LSP.2016.2548421     Document Type: Article
Times cited : (687)

References (37)
  • 1
    • 34247562352 scopus 로고    scopus 로고
    • Steganalysis based on Markov Model of thresholded prediction-error image
    • Toronto, ON, Canada, Jul. 9-12
    • D. Zou, Y. Q. Shi, W. Su, and G. Xuan, "Steganalysis based on Markov Model of thresholded prediction-error image," in Proc. IEEE Int. Conf. Multimedia Expo, Toronto, ON, Canada, Jul. 9-12, 2006, pp. 1365-1368.
    • (2006) Proc. IEEE Int. Conf. Multimedia Expo , pp. 1365-1368
    • Zou, D.1    Shi, Y.Q.2    Su, W.3    Xuan, G.4
  • 2
    • 84874405772 scopus 로고    scopus 로고
    • Textural features for steganalysis
    • Berkeley, CA, USA, May
    • Y. Q. Shi, P. Sutthiwan, and L. Chen, "Textural features for steganalysis," in Proc. 14th Int. Conf. Inf. Hiding, Berkeley, CA, USA, May 2012, vol. 7692, pp. 63-77.
    • (2012) Proc. 14th Int. Conf. Inf. Hiding , vol.7692 , pp. 63-77
    • Shi, Y.Q.1    Sutthiwan, P.2    Chen, L.3
  • 3
    • 84860434682 scopus 로고    scopus 로고
    • Rich models for steganalysis of digital images
    • Jun.
    • J. Fridrich and J. Kodovský, "Rich models for steganalysis of digital images," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 868-882, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 868-882
    • Fridrich, J.1    Kodovský, J.2
  • 4
    • 77952641834 scopus 로고    scopus 로고
    • Steganalysis by subtractive pixel adjacency matrix
    • Jun.
    • T. Pevný, P. Bas, and J. Fridrich, "Steganalysis by subtractive pixel adjacency matrix," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 215-224, Jun. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.2 , pp. 215-224
    • Pevný, T.1    Bas, P.2    Fridrich, J.3
  • 5
    • 84888323613 scopus 로고    scopus 로고
    • Random projections of residuals for digital image steg analysis
    • Dec.
    • V. Holub and J. Fridrich, "Random projections of residuals for digital image steg analysis," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1996-2006, Dec. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.12 , pp. 1996-2006
    • Holub, V.1    Fridrich, J.2
  • 6
    • 84983591266 scopus 로고    scopus 로고
    • Variable multi-dimensional co-occurrence histogram for steganalysis
    • Oct.
    • L. Chen, Y. Q. Shi, and P. Sutthiwan, "Variable multi-dimensional co-occurrence histogram for steganalysis," in Proc. IWDW, Oct. 2014, vol. 9023, pp. 559-573.
    • (2014) Proc. IWDW , vol.9023 , pp. 559-573
    • Chen, L.1    Shi, Y.Q.2    Sutthiwan, P.3
  • 7
    • 78549231320 scopus 로고    scopus 로고
    • Using high-dimensional image models to perform highly undetectable steganography
    • New York, NY, USA: Springer-Verlag, Jun. 28-30
    • T. Pevný, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," in Proc. 12th Int. Workshop Inf. Hiding, New York, NY, USA: Springer-Verlag, Jun. 28-30, 2010, vol. 6387, pp. 161-177.
    • (2010) Proc. 12th Int. Workshop Inf. Hiding , vol.6387 , pp. 161-177
    • Pevný, T.1    Filler, T.2    Bas, P.3
  • 9
    • 84894039003 scopus 로고    scopus 로고
    • Universal distortion function for steganography in an arbitrary domain
    • V. Holub, J. Fridrich, and T. Denemark, "Universal distortion function for steganography in an arbitrary domain," EURASIP J. Inf. Secur., vol. 2014, no. 1, pp. 1-13, 2014.
    • (2014) EURASIP J. Inf. Secur. , vol.2014 , Issue.1 , pp. 1-13
    • Holub, V.1    Fridrich, J.2    Denemark, T.3
  • 10
    • 85015091451 scopus 로고    scopus 로고
    • Content-adaptive steganography by minimizing statistical detectability
    • Feb.
    • V. Sedighi, R. Cogranne, and J. Fridrich, "Content-adaptive steganography by minimizing statistical detectability," IEEE Trans. Inf. Forensics Security, vol. 11, no. 2, pp. 221-234, Feb. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.2 , pp. 221-234
    • Sedighi, V.1    Cogranne, R.2    Fridrich, J.3
  • 11
    • 84983146156 scopus 로고    scopus 로고
    • A new cost function for spatial image steganography
    • Paris, France, Oct.
    • B. Li, M. Wang, J. Huang, and X. Li, "A new cost function for spatial image steganography," in Proc. IEEE Int. Conf. Image Process. (ICIP), Paris, France, Oct. 2014, pp. 4206-4210.
    • (2014) Proc. IEEE Int. Conf. Image Process. (ICIP) , pp. 4206-4210
    • Li, B.1    Wang, M.2    Huang, J.3    Li, X.4
  • 12
    • 84904685564 scopus 로고    scopus 로고
    • Investigation on cost assignment in spatial image steganography
    • Aug.
    • B. Li, S. Tan, M. Wang, and J. Huang, "Investigation on cost assignment in spatial image steganography," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1264-1277, Aug. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.8 , pp. 1264-1277
    • Li, B.1    Tan, S.2    Wang, M.3    Huang, J.4
  • 13
    • 0000494467 scopus 로고
    • Handwritten digit recognition with a backpropagation neural network
    • D. S. Touretzky, Ed. San Mateo, CA, USA: Morgan Kaufmann
    • Y. Le Cun et al., "Handwritten digit recognition with a backpropagation neural network," in Advances in Neural Information Processing Systems 2, D. S. Touretzky, Ed. San Mateo, CA, USA: Morgan Kaufmann, 1990, pp. 396-404.
    • (1990) Advances in Neural Information Processing Systems 2 , pp. 396-404
    • Le Cun, Y.1
  • 15
    • 84947041871 scopus 로고    scopus 로고
    • ImageNet large scale visual recognition challenge
    • O. Russakovsky et al., "ImageNet large scale visual recognition challenge," Int. J. Comput. Vis., vol. 115, pp. 211-252, 2015.
    • (2015) Int. J. Comput. Vis. , vol.115 , pp. 211-252
    • Russakovsky, O.1
  • 19
    • 84933053045 scopus 로고    scopus 로고
    • Median filtering forensics based on convolutional neural networks
    • Nov.
    • J. Chen, X. Kang, Y. Liu, and Z. J. Wang, "Median filtering forensics based on convolutional neural networks," IEEE Signal Process. Lett., vol. 22, no. 11, pp. 1849-1853, Nov. 2015.
    • (2015) IEEE Signal Process. Lett. , vol.22 , Issue.11 , pp. 1849-1853
    • Chen, J.1    Kang, X.2    Liu, Y.3    Wang, Z.J.4
  • 21
    • 84932146885 scopus 로고    scopus 로고
    • Deep learning for steganalysis via convolutional neural networks
    • Y. Qian, J. Dong, W. Wang, and T. Tan, "Deep learning for steganalysis via convolutional neural networks," in Proc. SPIE Media Watermarking Secur. Forensics, 2015, vol. 9409, pp. 94090J-94090J-10.
    • (2015) Proc. SPIE Media Watermarking Secur. Forensics , vol.9409 , pp. 94090J-94090J10
    • Qian, Y.1    Dong, J.2    Wang, W.3    Tan, T.4
  • 22
    • 80053005547 scopus 로고    scopus 로고
    • Break our steganographic system- The ins and outs of organizing BOSS
    • May
    • P. Bas, T. Filler, and T. Pevný, "Break our steganographic system- The ins and outs of organizing BOSS," in Proc. Inf. Hiding, May 2011, vol. 6958, pp. 59-70.
    • (2011) Proc. Inf. Hiding , vol.6958 , pp. 59-70
    • Bas, P.1    Filler, T.2    Pevný, T.3
  • 24
    • 77956509090 scopus 로고    scopus 로고
    • Rectified linear units improve restricted Boltzmann machines
    • V. Nair and G. E. Hinton, "Rectified linear units improve restricted Boltzmann machines," in Proc. Int. Conf. Mach. Learn., 2010, pp. 807- 814.
    • (2010) Proc. Int. Conf. Mach. Learn. , pp. 807-814
    • Nair, V.1    Hinton, G.E.2
  • 25
    • 84858263654 scopus 로고    scopus 로고
    • Ensemble classifiers for steganalysis of digital media
    • Apr.
    • J. Kodovsky, J. Fridrich, and V. Holub, "Ensemble classifiers for steganalysis of digital media," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 432-444, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 432-444
    • Kodovsky, J.1    Fridrich, J.2    Holub, V.3
  • 26
    • 84964941647 scopus 로고    scopus 로고
    • Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch
    • Feb.
    • L. Pibre, J. Pasquet, D. Ienco, and M. Chaumont, "Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch," in Proc. SPIE, Feb. 2016, pp. 14-18.
    • (2016) Proc. SPIE , pp. 14-18
    • Pibre, L.1    Pasquet, J.2    Ienco, D.3    Chaumont, M.4
  • 27
    • 84862277874 scopus 로고    scopus 로고
    • Understanding the difficulty of training deep feedforward neural networks
    • X. Glorot and Y. Bengio, "Understanding the difficulty of training deep feedforward neural networks," in Proc. Artif. Intell. Statist. (AISTATS), 2010, pp. 249-256.
    • (2010) Proc. Artif. Intell. Statist. (AISTATS) , pp. 249-256
    • Glorot, X.1    Bengio, Y.2
  • 28
    • 84913580146 scopus 로고    scopus 로고
    • Caffe: Convolutional architecture for fast feature embedding
    • Y. Jia et al., "Caffe: Convolutional architecture for fast feature embedding," in Proc. ACM Int. Conf. Multimedia, 2014, pp. 675-678.
    • (2014) Proc. ACM Int. Conf. Multimedia , pp. 675-678
    • Jia, Y.1
  • 30
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • L. Breiman, "Bagging predictors," Mach. Learn., vol. 24, no. 2, pp. 123- 140, 1996.
    • (1996) Mach. Learn. , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 33
    • 84959219306 scopus 로고    scopus 로고
    • Adaptive steganalysis based on embedding probabilities of pixels
    • Apr.
    • W. Tang, H. Li, W. Luo, and J. Huang, "Adaptive steganalysis based on embedding probabilities of pixels," IEEE Trans. Inf. Forensics Security, vol. 11, no. 4, pp. 734-745, Apr. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.4 , pp. 734-745
    • Tang, W.1    Li, H.2    Luo, W.3    Huang, J.4
  • 34
    • 84964941670 scopus 로고    scopus 로고
    • Improving selection channel- aware steganalysis features
    • Feb.
    • T. Denemark, J. Fridrich, and P. Comesaña-Alfaro, "Improving selection channel- aware steganalysis features," in Proc. SPIE, Feb. 2016, pp. 14- 18.
    • (2016) Proc. SPIE , pp. 14-18
    • Denemark, T.1    Fridrich, J.2    Comesaña-Alfaro, P.3
  • 35
    • 84920768177 scopus 로고    scopus 로고
    • Low-complexity features for JPEG steganalysis using undecimated DCT
    • Feb.
    • V. Holub and J. Fridrich, "Low-complexity features for JPEG steganalysis using undecimated DCT," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 219-228, Feb. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.2 , pp. 219-228
    • Holub, V.1    Fridrich, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.