Calibration-based Steganalysis for Neural Network Steganography

被引:0
|
作者
Zhao, Na [1 ]
Chen, Kejiang [1 ]
Qin, Chuan [1 ]
Yin, Yi [1 ]
Zhang, Weiming [1 ]
Yu, Nenghai [1 ]
机构
[1] Univ Sci & Technol China, Sch Cyber Sci & Technol, Hefei, Peoples R China
关键词
calibration; neural network steganalysis; fine-tuning; small embedding rate; JPEG IMAGES;
D O I
10.1145/3577163.3595100
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent research has shown that neural network models can be used to steal sensitive data or embed malware. Therefore, steganalysis for neural networks is urgently needed. However, existing neural network steganalysis methods do not perform well under small embedding rates. In addition, because of the large number of parameters, the neural network steganography method under a small embedding rate can embed enough information into the model for malicious purposes. To address this problem, this paper proposes a calibration-based steganalysis method, which fine-tunes the original neural network model without implicit constraints to obtain a reference model, then extracts and fuses statistical moments from the parameter distributions of the original model and its reference model, and finally trains a logistic regressor for detection. Extensive experiments show that the proposed method has superior performance in detecting steganographic neural network models under small embedding rates.
引用
收藏
页码:91 / 96
页数:6
相关论文
共 50 条
  • [41] Steganalysis Algorithm Based on Cellular Automata Transform and Neural Network
    Bakhshandeh, Soodeh
    Bakhshande, Fateme
    Aliyari, Mahdi
    [J]. 2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
  • [42] Steganalysis on synonym substitution steganography
    Luo, Gang
    Sun, Xingming
    Xiang, Lingyun
    Liu, Yuling
    Gan, Can
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45 (10): : 1696 - 1703
  • [43] Active steganalysis of sequential steganography
    Trivedi, S
    Chandramouli, R
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 123 - 130
  • [44] Artificial neural network for steganography
    Sabah Husien
    Haitham Badi
    [J]. Neural Computing and Applications, 2015, 26 : 111 - 116
  • [45] Steganalysis of stochastic modulation steganography
    HE Junhui1
    2. Guangdong Province Key Laboratory of Information Security
    [J]. Science China(Information Sciences), 2006, (03) : 273 - 285
  • [46] Batch steganography and pooled steganalysis
    Ker, Andrew D.
    [J]. INFORMATION HIDING, 2007, 4437 : 265 - 281
  • [47] Audio Steganalysis With Convolutional Neural Network
    Chen, Bolin
    Luo, Weiqi
    Li, Haodong
    [J]. IH&MMSEC'17: PROCEEDINGS OF THE 2017 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, 2017, : 85 - 90
  • [48] Steganalysis of stochastic modulation steganography
    Junhui He
    Jiwu Huang
    [J]. Science in China Series F, 2006, 49 : 273 - 285
  • [49] JPEG Steganography and Steganalysis - A Review
    Banerjee, Siddhartha
    Ghosh, Bibek Ranjan
    Roy, Pratik
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 2, 2015, 328 : 175 - 187
  • [50] Steganography capacity: A steganalysis perspective
    Chandramouli, R
    Memon, ND
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 173 - 177