首页 | 本学科首页   官方微博 | 高级检索  
     

基于深度学习的图像隐写分析综述
引用本文:陈君夫,付章杰,张卫明,程旭,孙星明. 基于深度学习的图像隐写分析综述[J]. 软件学报, 2021, 32(2): 551-578
作者姓名:陈君夫  付章杰  张卫明  程旭  孙星明
作者单位:南京信息工程大学计算机与软件学院,江苏南京210044;南京信息工程大学计算机与软件学院,江苏南京210044;鹏城实验室,广东深圳518055;中国科学技术大学信息科学技术学院,安徽合肥230026
基金项目:国家重点研发计划(2018YFB1003205),国家自然科学基金(U1836110,U1836208,61802058,61911530397).
摘    要:隐写术及隐写分析是信息安全领域研究热点之一.隐写术的滥用造成许多安全隐患,如非法分子利用隐写进行隐蔽通信完成恐怖袭击.传统隐写分析方法的设计需要大量先验知识,而基于深度学习的隐写分析方法利用网络强大的表征学习能力自主提取图像异常特征,大大减少了人为参与,取得了较好的研究效果.为了促进基于深度学习的隐写分析方法研究,对目...

关 键 词:隐写术  隐写分析  卷积神经网络  深度学习  对抗样本
收稿时间:2020-05-30
修稿时间:2020-07-10

Review of Image Steganalysis Based on Deep Learning
CHEN Jun-Fu,FU Zhang-Jie,ZHANG Wei-Ming,CHENG Xu,SUN Xing-Ming. Review of Image Steganalysis Based on Deep Learning[J]. Journal of Software, 2021, 32(2): 551-578
Authors:CHEN Jun-Fu  FU Zhang-Jie  ZHANG Wei-Ming  CHENG Xu  SUN Xing-Ming
Affiliation:School of Computer and Software, Nanjing University of Information Science&Technology, Nanjing 210044, China;School of Computer and Software, Nanjing University of Information Science&Technology, Nanjing 210044, China;PENG CHENG LABORATORY, Shenzhen 518066, China;School of Information Science and Technology, University of Science and Technology of China, Hefei 230026, China
Abstract:Steganography and steganalysis are one of the research hotspots in the field of information security. The abuse of steganography has caused many potential safety hazard. For example, illegal elements use steganography for covert communications to carry out terrorist attacks. The design of traditional steganalysis methods requires a large amount of prior knowledge, and the steganalysis methods based on deep learning use the powerful representation learning ability of the network to autonomously extract abnormal image features, which greatly reduces human participation and achieves good results. To promote the research of steganalysis technology based on deep learning, this paper analyzes and summarizes the main methods and work in the field of steganalysis. Firstly, this paper analyzes and compares the differences between traditional steganalysis and deep learning-based steganalysis. Furthermore, according to the different training methods, the steganalysis models based on deep learning are divided into two categories:Semi-learning steganalysis model and Full-learning steganalysis model. The network structure and detection effect of various types of steganalysis based on deep learning are introduced in detail. In addition, we analyzed and summarized the challenges that the adversarial samples pose to deep learning security, expounds the detection method of adversarial samples based on steganalysis. Finally, this paper summarizes the pros and cons of existing steganalysis models based on deep learning and discusses its development trends.
Keywords:steganography  steganalysis  convolution Neural Networks  deep learning  adversarial Examples
本文献已被 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号