AI-based image steganalysis under limited computational resources
DOI:
https://doi.org/10.20535/2411-1031.2025.13.2.344716Keywords:
computer vision, steganographic algorithm, neural network model, performance evaluation, comprehensive experimentAbstract
This study addresses the challenges of modern steganalysis, which lies in the dichotomy between highly effective yet computationally expensive State-of-the-Art (SOTA) artificial intelligence models and lightweight architectures that are fast but incapable of independently detecting weak steganographic signals. The hypothesis proposed in this research suggests that combining classical feature engineering techniques – particularly the use of Spatial Rich Model (SRM) filters to enhance residual noise – with a modern self-supervised learning (SSL) approach for regularization and improved generalization capability can endow a lightweight convolutional neural network with the necessary properties for effective performance. To verify this hypothesis, a comprehensive comparative experiment was conducted involving four models: a baseline lightweight architecture, a model employing SRM filters, a heavy SOTA SRNet (Residual Network) model, and the proposed hybrid model. The experiment was carried out on a complex heterogeneous dataset comprising images processed by three distinct steganographic algorithms with two embedding rates. Performance evaluation was conducted on two datasets: a test sample from the same data domain (in-distribution) and a completely new, external dataset to assess generalization capability (out-of-distribution). The experimental results fully confirmed the main hypothesis. The hybrid model achieved the highest detection accuracy among lightweight approaches (AUC – Area Under the ROC Curve of 0.636) and, most importantly, demonstrated the greatest robustness to domain shift (AUC of 0.539 on the external dataset), showing the smallest degradation in performance. The study also revealed a counterintuitive effect: the heavy SOTA SRNet architecture exhibited a significant failure (AUC of 0.348) under heterogeneous data conditions, indicating its tendency to overfit to specific artifacts.
References
G. Xu et al, “SFRNet: Feature Extraction-Fusion Steganalysis Network”, Security and Communication Networks, vol. 2021, art. 3676720, 11 p. 2021. doi: https://doi.org/10.1155/2021/3676720.
H. Kheddar, M. Hemis, Y. Himeur, D. Megías, and A. Amira, “Deep learning for steganalysis of diverse data types: review of methods, taxonomy, challenges and future directions”, Neurocomputing, vol. 581, iss. C, art. 127528, 2024. doi: https://doi.org/10.1016/j.neucom.2024.127528.
E. Hong, K. Lim, T.-W. Oh, and H. Jang, “Lightweight image steganalysis with block-wise pruning”, Scientific Reports, vol. 13, art. 16148, 2023. doi: https://doi.org/10.1038/s41598-023-43386-2.
S. Hong, et al. “Author Correction: Lightweight image steganalysis with block-wise pruning”, Scientific Reports, vol. 13, art. 17300, 2023. doi: https://doi.org/10.1038/s41598-023-44614-5.
S. Liu, C. Zhang, L. Wang, P. Yang, S. Hua, and T. Zhang, “Image Steganalysis of Low Embedding Rate Based on the Attention Mechanism and Transfer Learning”, Electronics, vol. 12 (4), art. 0969, 2023. doi: https://doi.org/10.3390/electronics12040969.
F. Liu, X. Zhou, X. Yan, Y. Lu, and S. Wang, “Image Steganalysis via Diverse Filters and Squeeze-and-Excitation Convolutional Neural Network”, Mathematics, vol. 9 (2), art. 189, 2021. doi: https://doi.org/10.3390/math9020189.
J. Liu, F. Xu, Y. Zhao, X. Xin, K. Liu, and Y. Ma, “Sterilization of image steganography using self-supervised convolutional neural network (SS-Net)”, PeerJ Computer Science, vol. 10, art. e23302024. doi: https://doi.org/10.7717/peerj-cs.2330.
W. Guo, “Dilated Separable Convolution Network for Image Steganalysis”, in Proc. 2024 Int. Conf. on Image Proc., Mult. Tech. and ML (IPMML'24), Dali Henan, China, 2024, pp. 43-46. doi: https://doi.org/10.1145/3722405.3722413.
S. Mekruksavanich, and A. Jitpattanakul Hybrid convolutional architectures and channel attention studies for detection tasks. Scientific Reports, vol. 13, art. 12067, 2023. doi: https://doi.org/10.1038/s41598-023-39080-y.
L. Qiushi, L. Shenghai, T. Shunquan, and L. Zhenjun, “SEAP: Squeeze-and-Excitation Attention Guided Pruning for Image Steganalysis Networks”, EURASIP Journal on Information Security, art. 25, 2025. doi: https://doi.org/10.1186/s13635-025-00212-8.
N.J. De La Croix, T. Ahmad, and F. Han, “Comprehensive survey on image steganalysis using deep learning”, Array, art. 100353, 2024. doi: https://doi.org/10.1016/j.array.2024.100353.
S. Agarwal, and K.-H. Jung, “Digital image steganalysis using entropy driven deep neural network”, Jour. of Inf. Se. and App., vol. 84, art. 103799, 2024. doi: https://doi.org/10.1016/j.jisa.2024.103799.
T. Fu, L. Chen, Z. Fu, K. Yu, and Y. Wang, “CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis”, Jour. of Vis. Comm. and Image Repres., vol. 88, art. 103633, 2022. doi: https://doi.org/10.1016/j.jvcir.2022.103633.
L. Bohang et al. “Image steganalysis using active learning and hyperparameter optimization”, Scientific Reports, vol. 15, art. 7340, 2025. doi: https://doi.org/10.1038/s41598-025-92082-w.
Z. Fu et al. “Adaptive, Dilated and Hybrid Techniques for JPEG and Domain-Aware Steganalysis”, Signal Processing, vol. 216, art. 109299, 2024. doi: https://doi.org/10.1016/j.sigpro.2023.109299.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Collection "Information Technology and Security"

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).