Deep Learning for Steganalysis of Diverse Data Types: A review of
methods, taxonomy, challenges and future directions
- URL: http://arxiv.org/abs/2308.04522v3
- Date: Tue, 12 Mar 2024 00:16:38 GMT
- Title: Deep Learning for Steganalysis of Diverse Data Types: A review of
methods, taxonomy, challenges and future directions
- Authors: Hamza Kheddar, Mustapha Hemis, Yassine Himeur, David Meg\'ias, Abbes
Amira
- Abstract summary: Steganography and steganalysis have attracted a great deal of interest, particularly from law enforcement.
This review paper provides a comprehensive overview of deep learning-based steganalysis techniques.
- Score: 3.2007743266566617
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Steganography and steganalysis are two interrelated aspects of the field of
information security. Steganography seeks to conceal communications, whereas
steganalysis is aimed to either find them or even, if possible, recover the
data they contain. Steganography and steganalysis have attracted a great deal
of interest, particularly from law enforcement. Steganography is often used by
cybercriminals and even terrorists to avoid being captured while in possession
of incriminating evidence, even encrypted, since cryptography is prohibited or
restricted in many countries. Therefore, knowledge of cutting-edge techniques
to uncover concealed information is crucial in exposing illegal acts. Over the
last few years, a number of strong and reliable steganography and steganalysis
techniques have been introduced in the literature. This review paper provides a
comprehensive overview of deep learning-based steganalysis techniques used to
detect hidden information within digital media. The paper covers all types of
cover in steganalysis, including image, audio, and video, and discusses the
most commonly used deep learning techniques. In addition, the paper explores
the use of more advanced deep learning techniques, such as deep transfer
learning (DTL) and deep reinforcement learning (DRL), to enhance the
performance of steganalysis systems. The paper provides a systematic review of
recent research in the field, including data sets and evaluation metrics used
in recent studies. It also presents a detailed analysis of DTL-based
steganalysis approaches and their performance on different data sets. The
review concludes with a discussion on the current state of deep learning-based
steganalysis, challenges, and future research directions.
Related papers
- Combining Different Existing Methods for Describing Steganography Hiding Methods [33.986313771360095]
This paper aims to provide an introduction to the concept of descriptive methods for steganography.<n>The main goal of the paper is to explain how existing descriptions and taxonomy objects can be combined to achieve a detailed categorization and description of hiding methods.
arXiv Detail & Related papers (2025-06-02T14:02:54Z) - Understanding Audiovisual Deepfake Detection: Techniques, Challenges, Human Factors and Perceptual Insights [49.81915942821647]
Deep Learning has been successfully applied in diverse fields, and its impact on deepfake detection is no exception.
Deepfakes are fake yet realistic synthetic content that can be used deceitfully for political impersonation, phishing, slandering, or spreading misinformation.
This paper aims to improve the effectiveness of deepfake detection strategies and guide future research in cybersecurity and media integrity.
arXiv Detail & Related papers (2024-11-12T09:02:11Z) - Natias: Neuron Attribution based Transferable Image Adversarial Steganography [62.906821876314275]
adversarial steganography has garnered considerable attention due to its ability to effectively deceive deep-learning-based steganalysis.
We propose a novel adversarial steganographic scheme named Natias.
Our proposed method can be seamlessly integrated with existing adversarial steganography frameworks.
arXiv Detail & Related papers (2024-09-08T04:09:51Z) - Datasets, Clues and State-of-the-Arts for Multimedia Forensics: An
Extensive Review [19.30075248247771]
This survey focusses on approaches for tampering detection in multimedia data using deep learning models.
It presents a detailed analysis of benchmark datasets for malicious manipulation detection that are publicly available.
It also offers a comprehensive list of tampering clues and commonly used deep learning architectures.
arXiv Detail & Related papers (2024-01-13T07:03:58Z) - SUDS: Sanitizing Universal and Dependent Steganography [4.067706508297839]
Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication.
Current protection mechanisms rely upon steganalysis, but these approaches are dependent upon prior knowledge.
This work focuses on a deep learning sanitization technique called SUDS that is able to sanitize universal and dependent steganography.
arXiv Detail & Related papers (2023-09-23T19:39:44Z) - A Review on Deep-Learning Algorithms for Fetal Ultrasound-Image Analysis [5.512295869673148]
This paper surveys the most recent work in the field, with a total of 145 research papers published after 2017.
We categorized the papers in (i) fetal standard-plane detection, (ii) anatomical-structure analysis, and (iii) biometry parameter estimation.
This paper ends with a critical summary of the current state of the art on DL algorithms for fetal US image analysis.
arXiv Detail & Related papers (2022-01-28T17:22:44Z) - Human-in-the-Loop Disinformation Detection: Stance, Sentiment, or
Something Else? [93.91375268580806]
Both politics and pandemics have recently provided ample motivation for the development of machine learning-enabled disinformation (a.k.a. fake news) detection algorithms.
Existing literature has focused primarily on the fully-automated case, but the resulting techniques cannot reliably detect disinformation on the varied topics, sources, and time scales required for military applications.
By leveraging an already-available analyst as a human-in-the-loop, canonical machine learning techniques of sentiment analysis, aspect-based sentiment analysis, and stance detection become plausible methods to use for a partially-automated disinformation detection system.
arXiv Detail & Related papers (2021-11-09T13:30:34Z) - A Brief Survey on Deep Learning Based Data Hiding, Steganography and
Watermarking [98.1953404873897]
We conduct a brief yet comprehensive review of existing literature and outline three meta-architectures.
Based on this, we summarize specific strategies for various applications of deep hiding, including steganography, light field messaging and watermarking.
arXiv Detail & Related papers (2021-03-02T10:01:03Z) - Visual Exploration and Knowledge Discovery from Biomedical Dark Data [0.0]
We employ a natural language processing based pipeline to discover knowledge out of the biomedical dark data.
We aim to proffer a potential solution to overcome the problem of analyzing overwhelming amounts of information.
arXiv Detail & Related papers (2020-09-28T04:27:05Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z) - Opportunities and Challenges of Deep Learning Methods for
Electrocardiogram Data: A Systematic Review [62.490310870300746]
The electrocardiogram (ECG) is one of the most commonly used diagnostic tools in medicine and healthcare.
Deep learning methods have achieved promising results on predictive healthcare tasks using ECG signals.
This paper presents a systematic review of deep learning methods for ECG data from both modeling and application perspectives.
arXiv Detail & Related papers (2019-12-28T02:44:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.