All Projects → jiangszzzzz → CAECNNcode

jiangszzzzz / CAECNNcode

Licence: other
some code for deep steganalysis

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to CAECNNcode

7uring
An advanced cryptography tool for hashing, encrypting, encoding, steganography and more.
Stars: ✭ 15 (+Infinity%)
Mutual labels:  steganalysis
awesome-Steganalysis-project
🍿️some awesome Steganalysis
Stars: ✭ 25 (+Infinity%)
Mutual labels:  steganalysis
AperiSolve
Steganalysis web platform
Stars: ✭ 268 (+Infinity%)
Mutual labels:  steganalysis
IStego100K
IStego100K: Large-scale Image Steganalysis Dataset
Stars: ✭ 42 (+Infinity%)
Mutual labels:  steganalysis

Deeplearning for Steganalysis


Steganography and Steganalysis

Steganography is the science to conceal secrect messages in the images though slightly modifying the pixel values. Content-adaptive steganographic schemes tend to embed the messages in complex regions to escape from detection are the most secure method in nowadays. Examples in spatial domain include HUGO, WOW, S-UNIWARD.
Corresponding to steganography, steganalysis is the art of detecting hidden data in images. Usually, this task is formulated as a binary classification problem to distinguish between cover and stego.

LSB steganography cover and stego

  • 1: cover(left) and stego(right)
  • 2: the subtraction result of cover and stego(small payload)

J-UNIWARD steganography cat cover and stego

  • 3: the subtraction result of cover and stego(payload = 0.3 )

deeplearning for steganalysis


Different from traditional computer vision task, the goal of image steganalysis is to find embedding operation which may be extremely low noise to the cover. So there's no maxpooling layer in my network which could destory small imformations or features caused by Steganography.

some results

  • 3: The training process,the net begins to converge at 50,000 step(5 epoch) Training process

  • 4: WOW0.5random_CNN training and validation accurcy. It can be seen from the validation loss value that the model is not overfitted. Amazing fitting ability.


reference

http://www.ws.binghamton.edu/fridrich/publications.html

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].