Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3577163.3595100acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
short-paper

Calibration-based Steganalysis for Neural Network Steganography

Published:28 June 2023Publication History

ABSTRACT

Recent research has shown that neural network models can be used to steal sensitive data or embed malware. Therefore, steganalysis for neural networks is urgently needed. However, existing neural network steganalysis methods do not perform well under small embedding rates. In addition, because of the large number of parameters, the neural network steganography method under a small embedding rate can embed enough information into the model for malicious purposes. To address this problem, this paper proposes a calibration-based steganalysis method, which fine-tunes the original neural network model without implicit constraints to obtain a reference model, then extracts and fuses statistical moments from the parameter distributions of the original model and its reference model, and finally trains a logistic regressor for detection. Extensive experiments show that the proposed method has superior performance in detecting steganographic neural network models under small embedding rates.

References

  1. Tom Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared D Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, et al. 2020. Language models are few-shot learners. Advances in neural information processing systems, Vol. 33 (2020), 1877--1901.Google ScholarGoogle Scholar
  2. Kyunghyun Cho, Bart Van Merriënboer, Caglar Gulcehre, Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078 (2014).Google ScholarGoogle Scholar
  3. Jessica Fridrich. 2005. Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. In Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada, May 23--25, 2004, Revised Selected Papers 6. Springer, 67--81.Google ScholarGoogle ScholarCross RefCross Ref
  4. Jessica Fridrich, Miroslav Goljan, and Dorin Hogea. 2003 a. Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding: 5th International Workshop, IH 2002 Noordwijkerhout, The Netherlands, October 7-9, 2002 Revised Papers 5. Springer, 310--323.Google ScholarGoogle ScholarCross RefCross Ref
  5. Jessica Fridrich, Miroslav Goljan, Dorin Hogea, and David Soukal. 2003 b. Quantitative steganalysis of digital images: estimating the secret message length. Multimedia systems, Vol. 9 (2003), 288--302.Google ScholarGoogle Scholar
  6. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.Google ScholarGoogle ScholarCross RefCross Ref
  7. Jan Kodovskỳ and Jessica Fridrich. 2009. Calibration revisited. In Proceedings of the 11th ACM workshop on Multimedia and security. 63--74.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Alex Krizhevsky, Geoffrey Hinton, et al. 2009. Learning multiple layers of features from tiny images. (2009).Google ScholarGoogle Scholar
  9. Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, and Ming Li. 2020. StegoNet: Turn deep neural network into a stegomalware. In Annual Computer Security Applications Conference. 928--938.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, and Min Yang. 2022. Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model. arXiv preprint arXiv:2206.14371 (2022).Google ScholarGoogle Scholar
  11. Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. Journal of machine learning research, Vol. 12, Oct (2011), 2825--2830.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Tomas Pevny and Jessica Fridrich. 2007. Merging Markov and DCT features for multi-class JPEG steganalysis. In Security, steganography, and watermarking of multimedia contents IX, Vol. 6505. SPIE, 28--40.Google ScholarGoogle Scholar
  13. Herbert Robbins and Sutton Monro. 1951. A stochastic approximation method. The annals of mathematical statistics (1951), 400--407.Google ScholarGoogle Scholar
  14. Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014).Google ScholarGoogle Scholar
  15. Congzheng Song, Thomas Ristenpart, and Vitaly Shmatikov. 2017. Machine learning models that remember too much. In Proceedings of the 2017 ACM SIGSAC Conference on computer and communications security. 587--601.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Zhi Wang, Chaoge Liu, and Xiang Cui. 2021. Evilmodel: hiding malware inside of neural network models. In 2021 IEEE Symposium on Computers and Communications (ISCC). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  17. Yi Yin, Weiming Zhang, Nenghai Yu, and Kejiang Chen. 2021. Steganalysis of neural networks based on parameter statistical bias. Journal of University of Science and Technology of China (2021).Google ScholarGoogle Scholar
  18. Chiyuan Zhang, Samy Bengio, Moritz Hardt, Benjamin Recht, and Oriol Vinyals. 2021. Understanding deep learning (still) requires rethinking generalization. Commun. ACM, Vol. 64, 3 (2021), 107--115. ioGoogle ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Calibration-based Steganalysis for Neural Network Steganography

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '23: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security
      June 2023
      190 pages
      ISBN:9798400700545
      DOI:10.1145/3577163

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 June 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%
    • Article Metrics

      • Downloads (Last 12 months)142
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader