期刊文献+

基于CNN和LSTM的图像隐写分析 被引量:3

Image steganalysis based on CNN and LSTM
下载PDF
导出
摘要 为了进一步降低隐写分析算法的检测错误率,文章提出一种基于卷积神经网络(convolutional neural network,CNN)和长短期记忆网络(long short-term memory,LSTM)的隐写分析算法。该算法利用CNN捕获载体图像的结构特征,同时利用LSTM捕获图像的前后时序特征。为了验证混合神经网络的有效性,该算法以XuNet和SRNet为基准隐写分析网络,探讨CNN与LSTM的有效组合方式。实验结果表明,所提方法可以有效提高隐写分析算法的检测能力。 To further improve the detection performance of the steganalysis algorithm,this paper proposes a steganalysis algorithm based on convolutional neural network(CNN)and long short-term memory(LSTM).The CNN is used to capture the structural features of cover images,while the LSTM is employed to capture the longer-term temporal feature relations of images in the proposed method.To verify the effectiveness of the hybrid neural network,the proposed method uses XuNet and SRNet as the benchmark steganalysis networks and explores the effective combination of CNN and LSTM.Experimental results show that when combining correctly,the hybrid networks of CNN and LSTM can improve the detection ability compared with the original steganalysis networks.
作者 凌宝红 郑钢 胡敏 彭银银 胡东辉 LING Baohong;ZHENG Gang;HU Min;PENG Yinyin;HU Donghui(School of Computer Science and Information Engineering,Hefei University of Technology,Hefei 230601,China;School of Information Engineering,Anhui Broadcasting Movie and Television College,Hefei 230011,China)
出处 《合肥工业大学学报(自然科学版)》 CAS 北大核心 2023年第3期320-325,391,共7页 Journal of Hefei University of Technology:Natural Science
基金 国家自然科学基金资助项目(U1836102) 安徽省科技重大专项资助项目(201903a05020016) 安徽省科研编制计划资助项目(2022AH053074) 高校优秀青年骨干教师国内访问研修资助项目(gxgnfx2020132) 高等学校省级质量工程软件技术专业教学团队资助项目(2021jxtd051)。
关键词 图像隐写分析 卷积神经网络(CNN) 长短期记忆网络(LSTM) image steganalysis convolutional neural network(CNN) long short-term memory(LSTM)
  • 相关文献

参考文献1

二级参考文献14

  • 1Westfeld A, Pfitzmann A. Attacks on steganographic systems [ A]. Proceedings of Third lmemational Workshop, Information Hiding[ C]. Berlin: Springer-Verlag, 2000.61 - 76.
  • 2Filler T, Fridrich J. Fisher information determines capacity of e- secure steganography [ A ]. Proceedings of l lth International Workshop, Information Hiding[ C]. Germany: Darmstadt, 2009. 31 - 47.
  • 3Goljan M, Fridrich J, Holotyak T. New blind steganalysis and its implications [ A ]. Proceedings of SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents Ⅷ [C] .San Jose,CA: SPIE,2006.1 - 13.
  • 4Harmsen J J, Pearlnlan W A. Steganalysis of additive-noise modelable information hiding[ A]. Proceedings of SPIE 5020, Security and Watermarking of Multimedia Contents V [ C ]. Santa Clara,CA: SPIE,2003. 131 - 142.
  • 5Cancelli G, Doerr G, Cox I J, et al. Dection of ± 1 LSB steganography based on the amplitude of histogram local extrema [ A ]. Proceedings of 15th IEEF, International Conference. Image Processing[C] .San Diego,CA: IEEE,2008.1288 - 1291.
  • 6Pevny T, Bas P, Fridrich J. Steganalysis by subtractive pixel ad- jacency matrix[ J]. IEEE Transactions on Information Forensics and Security,2010,5(2) :215 - 224.
  • 7Mielikainen J. LSB matching revisited [ J]. IEEE Signal Pro- cessing Letters,2006, 13(5) :285 - 287.
  • 8Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[ J]. IEEE Transactions on In- formation Forensics and Security,2010,5(2):201 -214.
  • 9Tan S, Li B. Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B- Spline titling[ J]. IEEE Signal Processing Letters, 2012, 19 (6) :336 - 339.
  • 10Omoomi M, Samavi S, Dumitrescu S. An efficient high pay- load ± 1 data embedding scheme[ J ]. Multimedia Tools and Applications, 2011,54 ( 2 ) : 201 - 218.

共引文献4

同被引文献24

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部