FADG:频域感知的自适应中间域生成方法用于载体源失配的隐写分析
FADG: Frequency-Aware Adaptive Domain Generation for Cover Source Mismatch in Steganalysis
摘要: 随着数字媒体的广泛应用,信息隐藏技术在保密通信中扮演着重要角色,但同时也被恶意利用进行非法信息传播,对网络安全构成严重威胁。隐写分析作为检测和识别隐蔽信息的关键技术,在维护信息安全方面具有重要价值。近年来,深度学习的引入显著提升了隐写分析的检测性能,众多基于卷积神经网络的隐写分析模型取得了优异成果。然而,这些隐写分析模型面临一个严峻的挑战:当训练数据(源域)与实际检测数据(目标域)来源不一致时,模型性能急剧下降,这一现象被称为载体源失配(Cover Source Mismatch, CSM)问题。CSM问题严重制约了深度隐写分析模型的实用化进程。本文围绕CSM问题展开研究,提出了一种有效的跨域隐写分析方法,频域感知自适应中间域生成方法(Frequency-Aware Adaptive Domain Generation, FADG)。FADG通过光谱残差理论识别图像中频域能量波动大的区域,进而计算源域和目标域图像的频域隐写嵌入概率图,接着利用源域和目标域的嵌入概率图得到混合权重图用于生成中间域,从而实现从源域到目标域的平滑过渡。通过这种自适应生成中间域的方法,从而有效缓解了跨域隐写检测性能下降的问题。
Abstract: With the widespread application of digital media, information hiding technology plays an important role in secure communication, but it is also maliciously exploited for illegal information dissemination, posing serious threats to network security. Steganalysis, as a key technology for detecting and identifying covert information, holds significant value in maintaining information security. In recent years, the introduction of deep learning has significantly improved the detection performance of steganalysis, with numerous steganalysis models based on convolutional neural networks achieving excellent results. However, these steganalysis models face a severe challenge: when the training data (source domain) and the actual detection data (target domain) originate from different sources, model performance drops sharply, a phenomenon known as the Cover Source Mismatch (CSM) problem. The CSM problem severely restricts the practical application of deep steganalysis models. This paper focuses on the CSM problem and proposes an effective cross-domain steganalysis method, Frequency-Aware Adaptive Domain Generation (FADG). FADG identifies regions with large frequency-domain energy fluctuations in images through spectral residual theory, then calculates frequency-domain steganographic embedding probability maps for both source and target domain images. Subsequently, it utilizes the embedding probability maps of the source and target domains to obtain blending weight maps for generating intermediate domains, thereby achieving a smooth transition from the source domain to the target domain. Through this adaptive intermediate domain generation method, the problem of performance degradation in cross-domain steganalysis detection is effectively alleviated.
文章引用:郑涵. FADG:频域感知的自适应中间域生成方法用于载体源失配的隐写分析[J]. 人工智能与机器人研究, 2026, 15(2): 420-428. https://doi.org/10.12677/airr.2026.152041

参考文献

[1] Zhong, N., Qian, Z., Wang, Z., Zhang, X. and Li, X. (2021) Batch Steganography via Generative Network. IEEE Transactions on Circuits and Systems for Video Technology, 31, 88-97. [Google Scholar] [CrossRef
[2] Verma, V., Muttoo, S.K. and Singh, V.B. (2022) Detecting Stegomalware: Malicious Image Steganography and Its Intrusion in Windows. In: Rao, U.P., Patel, S.J., Raj, P. and Visconti, A., Eds., Security, Privacy and Data Analytics, Springer, 103-116. [Google Scholar] [CrossRef
[3] Tan, S. and Li, B. (2014) Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images. Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, Siem Reap, 9-12 December 2014, 1-4. [Google Scholar] [CrossRef
[4] Qian, Y., Dong, J., Wang, W. and Tan, T. (2015) Deep Learning for Steganalysis via Convolutional Neural Networks. SPIE Proceedings, 9409, Article ID: 94090J. [Google Scholar] [CrossRef
[5] Xu, G., Wu, H. and Shi, Y. (2016) Structural Design of Convolutional Neural Networks for Steganalysis. IEEE Signal Processing Letters, 23, 708-712. [Google Scholar] [CrossRef
[6] Ye, J., Ni, J. and Yi, Y. (2017) Deep Learning Hierarchical Representations for Image Steganalysis. IEEE Transactions on Information Forensics and Security, 12, 2545-2557. [Google Scholar] [CrossRef
[7] Yedroudj, M., Comby, F. and Chaumont, M. (2018) Yedroudj-Net: An Efficient CNN for Spatial Steganalysis. 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Calgary, 15-20 April 2018, 2092-2096. [Google Scholar] [CrossRef
[8] Boroumand, M., Chen, M. and Fridrich, J. (2019) Deep Residual Network for Steganalysis of Digital Images. IEEE Transactions on Information Forensics and Security, 14, 1181-1193. [Google Scholar] [CrossRef
[9] Cancelli, G., Doerr, G., Barni, M. and Cox, I.J. (2008) A Comparative Study of ± Steganalyzers. 2008 IEEE 10th Workshop on Multimedia Signal Processing, Cairns, 8-10 October 2008, 791-796. [Google Scholar] [CrossRef
[10] Kodovský, J., Sedighi, V. and Fridrich, J. (2014) Study of Cover Source Mismatch in Steganalysis and Ways to Mitigate Its Impact. SPIE Proceedings, 9028, Article ID: 90280J. [Google Scholar] [CrossRef
[11] Pan, S.J. and Yang, Q. (2010) A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering, 22, 1345-1359. [Google Scholar] [CrossRef
[12] Zhang, X., Kong, X., Wang, P. and Wang, B. (2020) Cover-Source Mismatch in Deep Spatial Steganalysis. In: Wang, H., Zhao, X., Shi, Y., Kim, H. and Piva, A., Eds., Digital Forensics and Watermarking, Springer, 71-83. [Google Scholar] [CrossRef
[13] Yu, L., Weng, S., Chen, M. and Wei, Y. (2024) RCDD: Contrastive Domain Discrepancy with Reliable Steganalysis Labeling for Cover Source Mismatch. Expert Systems with Applications, 237, Article ID: 121543. [Google Scholar] [CrossRef
[14] Weng, S., Zhang, Z., Yu, L., Cao, P. and Cao, G. (2024) Universal Mismatched Steganalysis Equipped with Progressive Intermediate Domains. IEEE Signal Processing Letters, 31, 800-804. [Google Scholar] [CrossRef
[15] Li, Y., Yu, L., Weng, S., Tian, H. and Cao, G. (2023) Discriminability-Aware Intermediate Domains for Mismatched Steganalysis. Journal of LaTeX Class Files, 14, 1-8.
[16] Cogranne, R., Giboulot, Q. and Bas, P. (2019) The ALASKA Steganalysis Challenge: A First Step towards Steganalysis. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, Paris, 3-5 July 2019, 125-137. [Google Scholar] [CrossRef
[17] Bas, P., Filler, T. and Pevný, T. (2011) “Break Our Steganographic System”: The Ins and Outs of Organizing Boss. In: Filler, T., Pevný, T., Craver, S. and Ker, A., Eds., Information Hiding, Springer, 59-70. [Google Scholar] [CrossRef
[18] Huiskes, M.J. and Lew, M.S. (2008) The MIR Flickr Retrieval Evaluation. Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval, Vancouver, 30-31 October 2008, 39-43. [Google Scholar] [CrossRef
[19] Holub, V., Fridrich, J. and Denemark, T. (2014) Universal Distortion Function for Steganography in an Arbitrary Domain. EURASIP Journal on Information Security, 2014, Article No. 1. [Google Scholar] [CrossRef
[20] Li, B., Wang, M., Huang, J. and Li, X. (2014) A New Cost Function for Spatial Image Steganography. 2014 IEEE International Conference on Image Processing (ICIP), Paris, 27-30 October 2014, 4206-4210. [Google Scholar] [CrossRef
[21] Sedighi, V., Cogranne, R. and Fridrich, J. (2016) Content-adaptive Steganography by Minimizing Statistical Detectability. IEEE Transactions on Information Forensics and Security, 11, 221-234. [Google Scholar] [CrossRef
[22] Holub, V. and Fridrich, J. (2012) Designing Steganographic Distortion Using Directional Filters. 2012 IEEE International Workshop on Information Forensics and Security (WIFS), Costa Adeje, 2-5 December 2012, 234-239. [Google Scholar] [CrossRef
[23] Golner, M.A., Mikhael, W.B., Krishnan, V. and Ramaswamy, A. (2000) Region Based Variable Quantization for JPEG Image Compression. Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems (Cat.No.CH37144), Lansing, 8-11 August 2000, 604-607. [Google Scholar] [CrossRef
[24] Guo, L., Ni, J., Su, W., Tang, C. and Shi, Y. (2015) Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited. IEEE Transactions on Information Forensics and Security, 10, 2669-2680. [Google Scholar] [CrossRef
[25] Xue, Y., Yang, L., Wen, J., Niu, S. and Zhong, P. (2018) A Subspace Learning-Based Method for JPEG Mismatched Steganalysis. Multimedia Tools and Applications, 78, 8151-8166. [Google Scholar] [CrossRef