J Jvcir 2019 02 034
J Jvcir 2019 02 034
J Jvcir 2019 02 034
PII: S1047-3203(19)30091-4
DOI: https://doi.org/10.1016/j.jvcir.2019.02.034
Reference: YJVCI 2495
Please cite this article as: Y. Zou, G. Zhang, L. Liu, Research on Image Steganography Analysis Based on Deep
Learning, J. Vis. Commun. Image R. (2019), doi: https://doi.org/10.1016/j.jvcir.2019.02.034
This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers
we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and
review of the resulting proof before it is published in its final form. Please note that during the production process
errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Research on Image Steganography Analysis Based on Deep Learning
Ying Zou1,a , Ge Zhang2,3,b*and Leian Liu1,c
1
College of Information Science and Technology, Zhongkai University of Agriculture and
Engineering, Guangzhou, China
2
School of Computer and Information Engineering, Henan University, Kaifeng 475004,China
3
Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Kaifeng
475004, China
a
[email protected], [email protected], [email protected]
*Corresponding author:Ge Zhang([email protected])
Abstract: Although steganalysis has developed rapidly in recent years, it still faces many difficulties and
challenges. Based on the theory of in-depth learning method and image-based general steganalysis, this paper
makes a deep study of the hot and difficult problem of steganalysis feature expression, and tries to establish a
new steganalysis paradigm from the idea of feature learning. The main contributions of this paper are as
follows: 1. An innovative steganalysis paradigm based on in-depth learning is proposed. Based on the
representative deep learning method CNN, the model is designed and adjusted according to the characteristics
of steganalysis, which makes the proposed model more effective in capturing the statistical characteristics such
as neighborhood correlation. 2. A steganalysis feature learning method based on global information constraints
is proposed. Based on the previous research of steganalysis method based on CNN, this work focuses on the
importance of global information in steganalysis feature expression. 3. A feature learning method for low
embedding rate steganalysis is proposed. 4. A general steganalysis method for multi-class steganography is
proposed. The ultimate goal of general steganalysis is to construct steganalysis detectors without
distinguishing specific types of steganalysis algorithms.
Key words: Steganalysis, Steganography, Feature Learning, Deep Learning, Convolutional Neural Network,
Transfer Learning, Multitask Learning
Chapter 1 Introduction
With the rapid development of information technology and the rapid popularization of the Internet,
digital media has become an important carrier for military, commercial and other organizations as well as
individuals to obtain and transmit information. But at the same time, because the digital communication in the
Internet is vulnerable to the threat of eavesdropping, malicious interference and other activities, people pay
more attention to the security issues such as privacy protection and data integrity in the process of information
transmission than ever before. The traditional solution uses encryption technology to convert the information
to ciphertext for transmission. But its shortcoming is that the encrypted ciphertext is usually disordered. It is
easy for an attacker to notice the existence of secret communication, which stimulates the attacker's enthusiasm
for decoding. At the same time, it may also lead to information being interfered or intercepted, resulting in the
failure of information transmission. In the above context, a new concept of communication security has been
gradually accepted and recognized: communication security means not only that the content of information to
be transmitted is secure, but also that the existence of the act of transmitting secret information is unknown.
Therefore, steganography, which is characterized by "camouflage" in the transmission of information, has
attracted more and more attention.
The basic principle of steganography is to hide the secret information which needs to be transmitted into
the redundant information by using the insensitive redundant information of human perception system existing
in common carriers, and to realize the transmission of secret information by means of carrier transmission.
Because the process of information hiding into the carrier usually does not change the normal perception
characteristics of the carrier, it is difficult for potential attackers to detect the existence of secret information,
thus ensuring the information security covert transmission. At the same time, it can also combine encryption,
scrambling, coding and other technologies, making it difficult to extract hidden information even if it is
detected by third parties, thus further ensuring the security of information transmission. In order to explain
steganography more vividly, we describe the "prisoner problem" as an example. Alice and Bob are prisoners in
different cells in the same prison. They are under the care of Warden Eve. Alice and Bob are going to discuss
plans for a joint jailbreak. Specific plans need to be negotiated through the exchange of information. However,
according to prison regulations, their communications need to be checked by the warden, so they can not
communicate in plaintext. In this case, Bob and Mice need to take more covert communication measures. One
consideration is to use encryption technology, that is, to hide the content of information, but because the
encrypted information is a mess of code, it is easy to arouse Eve's suspicion. Thus, in this case, a safer
consideration is to hide information in everyday objects, and make the hidden objects look normal, which can
reduce Warden Eve's vigilance and ensure the smooth transmission of information.
However, steganography is also a true double-edged sword, which provides people with reliable and
secure means of Internet communication, at the same time, it may also provide convenience for organizations
and individuals with malicious intentions or improper purposes [11-14]. In fact, in recent years, there have
been reports about the use of steganography in espionage, terrorist attacks, crimes and other activities. In 2001,
some mainstream media in the United States, such as CNN and US Today, reported the news of secret
communications between Al Qaeda members using steganography. Reported that bin Laden gang will attack
the target map, action instructions and other information hidden in pornography, sports chat and other websites.
According to Die Zeit, an al-Qaida suspect was arrested in Berlin in May 2011 and police found him carrying a
memory card. Later, after being cracked by experts in charge of computer criminal investigation in the German
Federal Criminal Police Bureau, it was found that on the surface, only one pornographic video named
"KickAss" appeared on the card, but in fact, 141 text documents were hidden in the video, including a large
number of Al-Qaida action reports, future action plans and so on. In June 2010, the Federal Bureau of
Investigation (FBI) successfully arrested 10 Russian agents in New Jersey, which caused a great diplomatic
shock between the United States and Russia.
The FBI said that by eavesdropping on the conversations between the Murphy couple, who were all
suspects, they found that Murphy had sent his wife Cynthia to South America to hand over something
"invisible" to someone. According to the FBI analysis, these so-called "invisible things" are likely to be
recorded by digital steganography. They also claimed to have found devices for digital steganography in the
homes of three suspected Russian agents, and inferred that Russian agents used steganography to communicate
information with relevant Russian intelligence agencies. According to a Reuters report in July 2015, a report
released by security manufacturer FireEye shows that Russian hackers have successfully invaded the U.S.
defense system and captured several computers of the U.S. Department of Defense using data from Twitter
that appears to be ordinary photos. These seemingly ordinary Twitter images hide information and instructions
to activate malicious programs that have been implanted into the target computer. With the help of the
camouflage of Twitter pictures, the transmission of commands controlling malicious programs easily avoids
the detection of most detection systems. In April 2014, mainstream media in China, such as CCTV and Xinhua
News Agency, reported that the mobile Trojan Horse "immortal Trojan Horse II" infected millions of mobile
phones, and carried out fishing attacks, remote control of users'mobile phone photos, stealing users' online
silver and other activities that seriously endangered users'personal privacy and property security. It is reported
that, unlike the normal Trojan horse direct command mode, the Trojan horse cunningly disguises malicious
code instructions as a common picture through steganography, in order to avoid the "pursuit" of mobile phone
security software.
It can be seen from above that illegal or malicious use of digital steganography has brought serious harm
to national information security, business and personal privacy and property security [15-19]. In this case, how
to effectively supervise the use of steganography in real life, prevent or block the malicious or illegal use of
steganography in real time has become an urgent need of military and security departments in various
countries. Because of this, Steganalysis, as a countermeasure technology of steganography, came into being,
and has attracted the attention of governments and scientific research institutions. Steganalysis is a technique
to determine whether there is additional information hidden in the carrier or not, even to estimate the amount
of information embedded in the carrier, and to obtain the content of the hidden information by analyzing the
statistical characteristics of the carrier. It plays the role of Warden Eve in the model of "prisoner problem"
mentioned above. The research of steganalysis technology is of great significance in preventing the leakage of
confidential information, combating terrorism and criminal activities, and maintaining Internet security.
Based on the theory of in-depth learning method and image-based general steganalysis as the research
object, this paper focuses on the hot and difficult problem of feature expression in steganalysis, and tries to
establish a new framework of steganalysis from the new idea of feature learning. The specific research
contents of this paper mainly include the following aspects:
1. A digital image steganalysis framework based on depth learning is proposed.
Aiming at the problems in steganalysis, especially in feature expression. Considering feature learning, a
new steganalysis paradigm based on in-depth learning is proposed. Based on the representative deep learning
method CNN, the proposed model is designed and adjusted according to the characteristics of steganalysis,
which makes the proposed model more effective in capturing the statistical characteristics such as
neighborhood correlation Related to steganalysis, and automatically expresses the features of steganalysis
effectively through learning. Different from traditional methods based on artificial design features, this method
integrates feature extraction module and classification module into a trainable network model framework, and
automatically learns features and realizes classification in the form of data-driven, thus greatly reducing the
need for human experience and time. On this basis, the detection performance is further improved by model
fusion and other methods.
2. A steganalysis feature learning method based on global statistical information constraints is proposed.
This work focuses on the importance of global information in steganalysis feature expression, and
introduces how to use global statistical information to make the model learn better feature expression under the
framework of feature-based learning steganalysis. Referring to the idea of transfer learning, this paper
proposes a CNN model based on global statistical information constraints. By calculating auxiliary features to
obtain additional global statistical information, and then introducing global statistical information into CNN
model in the form of auxiliary tasks in migration learning, regularization constraints are applied to training
CNN model, so that it can learn better feature expression.
3. A feature learning method for low embedding rate steganalysis is proposed.
In the field of steganalysis, the detection of low embedding rate encrypted images is a key concern. The
difficulty lies in the small amount of embedding information, which makes the change of image statistical
characteristics relatively small, so it is more difficult to detect. To solve this problem, based on the idea of
Transfer Learning, this paper proposes to enhance the feature learning on low embedding rate dense image
datasets by migrating the prior information of features learned from high embedding rate dense image datasets
of CNN, so as to improve the detection performance of CNN model for low embedding rate dense image.
4. A general steganalysis method for multi-class steganography is proposed.
From the current research status of general steganalysis algorithms, the "universality" of existing
methods only reflects that different steganalysis algorithms can use the same algorithm steps to construct
detectors. However, in the process of constructing the detector, we need to know the specific types of edge
information of the steganography algorithm to be detected, and use these edge information to generate the
dense image for training. There are many possible steganography algorithms in real application scenarios.
Steganalysts often find it difficult to know which steganography users use. Therefore, it is urgent and
significant to study steganalysis detectors for different steganalysis algorithms (known or even unknown). This
chapter will explore this issue. On the basis of previous research on Steganalysis Based on in-depth learning
and combined with the idea of multi-task learning, this paper tries to propose a steganalysis method for
steganographic images generated by different steganographic algorithms.
SVM detects steganography in JPEG domain. In addition to OC. SVM, Pevny and Fridrich tried One
Class Neighbor Machine (OC-NM). Compared with the other two methods, this type of method can be trained
independently of steganographic algorithm, but the problem is that the decision boundary of one class of
classification is more difficult to determine than that of two and multi-class classification, so the detection
effect of these methods is not ideal. In addition, the existing content adaptive steganography and other
advanced methods can maintain the statistical characteristics of complex natural images, which will bring
greater challenges to this type of methods.
By analyzing the advantages and disadvantages of various methods, the goal of this chapter is to solve
the problem of binary classification. Even if the detectors that have to be constructed can successfully
distinguish between cryptographic carriers and normal carriers in the face of images embedded in different
steganography algorithms. Among the three methods mentioned above, the performance of multi-
steganographic detector has an important relationship with feature expression, but these methods all depend on
the features extracted manually. In the first and second methods, the steganalysis features corresponding to
different steganographic algorithms are extracted separately, and the related characteristics between different
algorithms are not utilized in the process. With the help of steganalysis research based on in-depth learning,
this work incorporates feature expression, an important module, into the learning process. At the same time,
drawing on the idea of multi-task learning, this paper hopes to use the complementary information between
different steganography algorithms to improve the detection performance and generalization ability of
detectors in the process of feature learning and classification.
6.3 Steganalysis Framework Based on Multitask CNN
This section introduces the proposed steganalysis framework based on Multitask CNN. Firstly, the
training set of multi-steganographic algorithm is constructed, and then the CNN model is trained by multi-task
learning to optimize the binary classification task of normal image/secret image and the classification task of
multi-steganographic algorithm. Steganographic classification task is an auxiliary task. Its purpose is to help
the main task, i.e. image/dense image binary classification task training. The final trained detector can detect
many steganographic algorithms at the same time. How to choose the structure of CNN model and how to
carry out multi-task learning in the whole framework is related to the final detection performance of the
method.
Chapter 7 Summary
With the rapid development and popularization of computer and Internet technology, the problem of
information security on the network has become increasingly prominent. Steganography, as a representative
covert communication technology, can be used illegally by terrorist organizations, spies and criminal gangs
while ensuring communication security, thus endangering national security, public and personal privacy
security and other issues. Therefore, the research of steganalysis technology for detecting and blocking
steganography is of great significance.
Although steganalysis has developed rapidly in recent years, it still faces many difficulties and challenges.
Based on the theory of in-depth learning method and image-based general steganalysis, this paper makes a
deep study of the hot and difficult problem of steganalysis feature expression, and tries to establish a new
steganalysis paradigm from the idea of feature learning. The main contributions of this paper are as follows:
1. An innovative steganalysis paradigm based on in-depth learning is proposed. In the field of
steganalysis, feature expression is the focus and difficulty. Traditional methods depend on artificial design
features. With the challenge of steganography, artificial design features become more and more difficult. This
paper introduces in-depth learning into steganalysis from the perspective of feature learning. Based on the
representative deep learning method CNN, the model is designed and adjusted according to the characteristics
of steganalysis, which makes the proposed model more effective in capturing the statistical characteristics such
as neighborhood correlation Related to steganalysis, and automatically learns the effective expression of
steganalysis features, thus greatly reducing the need for human experience and time. In order to better
understand the working principle of CNN for steganalysis, this paper visualizes the features learned, and finds
that the high-pass-like filter core is more conducive to capture the patterns related to steganographic noise. At
the same time, in order to improve the generalization ability and detection performance of the model, this
paper considers the method of model fusion, trains different CNN models separately, and fuses the output of
the model. The experimental results show the effectiveness of the proposed method. The detection
performance of the proposed method based on CNN is close to that of the traditional feature-based method.
Finally, this paper analyses the performance of CNN using Ensemble Classifier to classify the features learned,
and gets better detection performance by combining CNN features and artificial features.
2. A steganalysis feature learning method based on global information constraints is proposed. Based on
the previous research of steganalysis method based on CNN, this work focuses on the importance of global
information in steganalysis feature expression. By summing up the experience of traditional steganalysis
methods, we have noticed that global statistical information plays an important role in steganalysis feature
expression. In CNN model, the local region information of image is fused by pooling to make use of the
information in a larger range, which is a region-based statistics. There are some limitations in using global
statistical information. In order to make better use of global statistical information in steganalysis feature
learning, this paper proposes to obtain additional global statistical information by calculating auxiliary features,
then introduce global information into CNN model in the form of auxiliary tasks, and regularize the training of
CNN model, so as to promote it to learn better feature expression. In the experiment, representative adaptive
steganography WOW and S-UNIWARD are detected on BOSSbase library to verify the effectiveness of the
proposed method. The results show that the detection performance of the proposed method based on global
constraints is much better than that of the previous CNN-based method.
3. A feature learning method for low embedding rate steganalysis is proposed. Steganalysis for low
embedding rate image detection has always been a challenging problem. Generally, the difference between the
images before and after steganography is very small, and this difference is easily concealed by the difference
between different image content, so it is difficult to detect. As the embedding rate decreases, the number of
image elements that need to be modified in low embedding rate embedding is less, and the change of statistical
characteristics that may be used by steganalysts is less, so it becomes more difficult to detect. Based on the
research work of steganalysis feature learning in the previous chapters, experiments show that the proposed
steganalysis model based on CNN is especially difficult to train and even unable to converge in the face of low
embedding rate steganalysis task. To solve this problem, this work is based on the idea of transfer learning.
First, the network is pre-trained by high embedding rate data sets, and then the features learned are transferred
to low embedding rate detection model for further fine-tuning training. Through this method, the prior
information of high embedding rate image is transferred to low embedding rate image detection, which
improves the detection performance of CNN model for low embedding rate image. In the experiment, the
effectiveness of the proposed method is verified by detecting WOW and UNIWARD steganography
algorithms. The experimental results on BOSSbase database show that the method based on migration learning
significantly improves the detection ability of steganalysis method based on CNN at low embedding rate.
4. A general steganalysis method for multi-class steganography is proposed. The ultimate goal of general
steganalysis is to construct steganalysis detectors without distinguishing specific types of steganalysis
algorithms. However, in the current steganalysis research, most of the methods can not be truly universal. In
the process of constructing the detector, we need to know the specific type of edge information of the
steganography algorithm to be detected, and use these edge information to generate the dense image for
training. From the practical application point of view, the current method can not meet the requirements.
Therefore, it is urgent and significant to study steganalysis detectors for different steganalysis algorithms (even
unknown ones). In this work, the problem is explored and studied. On the basis of previous research work on
Steganalysis Based on in-depth learning, combined with the idea of multi-task learning, this paper attempts to
propose a more general method for multi-steganalysis detection. This method constructs two related
steganalysis tasks in CNN training, that is, the binary classification task to distinguish the normal image from
the carrier image and the multi-classification task to distinguish the type of steganalysis algorithm. The goal of
this work is to hope that "fine-grained" multi-classification tasks can introduce more abundant shared
information into the model, and promote the performance of the two-category directors. In the experiment,
four representative adaptive steganography algorithms are selected to generate a hybrid training set, and multi-
task learning is used to train the known and unknown algorithms in the training set. The results show that the
proposed method based on Multi-task has better performance than the direct hybrid training method.
Declarations
Ethical Approval and Consent to participate: Approved.
Consent for publication: Approved.
Availability of supporting data: We can provide the data.
Competing interests
These no potential competing interests in our paper. And all authors have seen the manuscript
and approved to submit to your journal. We confirm that the content of the manuscript has not
been published or submitted for publication elsewhere.
Funding
This work was supported by the Science and Technology Planning Project of Guangdong
Province under Grant (2017A070709012) , the quality resource sharing course project-
“Computer Network” (Official document by Department of education of Guangdong province
([2015] no. 133)), the provincial-level characteristic specialty-“Network Engineering” and the
provincial teaching team-“Teaching team of basic core course of computer major” (Official
document by Department of education of Guangdong province ([2017]214)), 2018 higher
education teaching reform project of Guangdong province-“Reform and practice of the training
mode of network engineering talents based on the cooperation of school-school and school-
enterprise” (Official document by Department of education of Guangdong province ([2018] no.
180)), and the university-level high-quality resource sharing course project-“Network Security
Technology” and “Wireless Sensor Network and RFID Technology”. And NSFC (No. 61802114,
61802113), Scientific Research Foundation of the Higher Education Institutions of Henan
Province (18A520021, 18A120001), Project supported by the Jiangsu Key Laboratory of Image
and Video Understanding for Social Safety (Nanjing University of Science and Technology
No.30916014107)
Conflict of interest
There is no conflict of interest.
Author’s contributions
All authors take part in the discussion of the work described in this paper. The author Ying Zou
wrote the first version of the paper, and did part experiments of the paper, Ge Zhang initiated the
project . Leian Liu revised the paper in different version of the paper.
Acknowledgements
The authors thank the editor and anonymous reviewers for their helpful comments and valuable
suggestions.
.
References
[1]Johnson, Neil F., and Sushil Jajodia. "Exploring steganography: Seeing the unseen." Computer 31.2
(1998).
[2]Fridrich, Jessica, Miroslav Goljan, and Rui Du. "Detecting LSB steganography in color, and gray-scale
images." IEEE multimedia 8.4 (2001): 22-28.
[3]Cheddad, Abbas, et al. "Digital image steganography: Survey and analysis of current methods." Signal
processing 90.3 (2010): 727-752.
[4] Zhang L, Song M, Liu Z, Liu X, Bu J, Chen C (2013) Probabilistic graphlet cut: exploiting spatial
structure cue for weakly supervised image segmentation. In: Proceedings of the IEEE conference on
computer vision and pattern recognition. IEEE, Portland, pp. 1908–1915
[5]Cachin, Christian. "An information-theoretic model for steganography." International Workshop on
Information Hiding. Springer, Berlin, Heidelberg, 1998.
[6]Marvel, Lisa M., Charles G. Boncelet, and Charles T. Retter. "Spread spectrum image
steganography." IEEE Transactions on image processing 8.8 (1999): 1075-1083.
[7]Artz, Donovan. "Digital steganography: hiding data within data." IEEE Internet computing 5.3 (2001):
75-80.
[8] Junwei Han, Dingwen Zhang, Gong Cheng, Lei Guo, Jinchang Ren. Object detection in optical remote
sensing images based on weakly supervised learning and high-level feature learning. IEEE Transactions
on Geoscience and Remote Sensing, 53(6): 3325-3337, 2015.
[9]Luo, Weiqi, Fangjun Huang, and Jiwu Huang. "Edge adaptive image steganography based on LSB
matching revisited." IEEE Transactions on information forensics and security 5.2 (2010): 201-214.
[10]Zhang L, Hong R, Gao Y, Ji R, Dai Q, Li X (2016) Image Categorization by Learning a Propagated
Graphlet Path. IEEE T-NNLS 27(3):674–685.
[11]Lin, Chang-Chou, and Wen-Hsiang Tsai. "Secret image sharing with steganography and
authentication." Journal of Systems and software 73.3 (2004): 405-414.
[12]Hussain, Mehdi, and Mureed Hussain. "A survey of image steganography techniques." (2013).
[13] Junwei Han, Xiang Ji, Xintao Hu, Dajiang Zhu, Kaiming Li, Xi Jiang, Guangbin Cui, Lei Guo,
Tianming Liu. Representing and retrieving video shots in human-centric brain imaging space. IEEE
Transactions on Image Processing, 22(7): 2723-2736, 2013.
[14] Tuo Zhang, Lei Guo, Kaiming Li, Changfeng Jing, Yan Yin, Dajiang Zhu, Guangbin Cui, Lingjiang Li,
Tianming Liu. Predicting functional cortical ROIs via DTI-derived fiber shape models. Cerebral cortex,
22(4): 854-864, 2012.
[15] Zhang, L., Gao, Y., Xia, Y., Dai, Q., & Li, X. (2015). A fine-grained image categorization system by
cellet-encoded spatial pyramid modeling. IEEE transactions on industrial electronics, 62(1), 564-571.
[16] Dingwen Zhang, Deyu Meng, Junwei Han. Co-saliency detection via a self-paced multiple-instance
learning framework. IEEE Transactions on Pattern Analysis and Machine Intelligence, 39(5): 865-878,
2017.
[17] Zhang, L., Gao, Y., Xia, Y., Lu, K., Shen, J., & Ji, R. (2014). Representative discovery of structure
cues for weakly-supervised image segmentation. IEEE Transactions on Multimedia, 16(2), 470-479.
[18] Dingwen Zhang, Junwei Han, Chao Li, Jingdong Wang, Xuelong Li. Detection of Co-salient Objects
by Looking Deep and Wide. International Journal of Computer Vision, 120(2): 215-232, 2016.
[19] Gong Cheng, Peicheng Zhou, Junwei Han. Learning rotation-invariant convolutional neural networks
for object detection in VHR optical remote sensing images. IEEE Transactions on Geoscience and
Remote Sensing, 54(12): 7405-7415, 2016.
[20] Dumitrescu, Sorina, Xiaolin Wu, and Zhe Wang. "Detection of LSB steganography via sample pair
analysis." International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2002.
[21] Junwei Han, Dingwen Zhang, Xintao Hu, Lei Guo, Jinchang Ren, Feng Wu Background prior-based
salient object detection via deep reconstruction residual. IEEE Transactions on Circuits and Systems for
Video Technology, 25(8): 1309-1321, 2015.
[22] Junwei Han, King Ngi Ngan, Mingjing Li, Hong-Jiang Zhang. Unsupervised extraction of visual
attention objects in color images. IEEE Transactions on Circuits and Systems for Video Technology,
16(1): 141-145, 2006.
[23] Zhang, L., Xia, Y., Ji, R., & Li, X. (2015). Spatial-aware object-level saliency prediction by learning
graphlet hierarchies. IEEE Transactions on Industrial Electronics, 62(2), 1301-1308.
Author details
Zhongkai University of Agriculture and Engineering, No. 501, Zhongkai Rd, Haizhu District,
Guangzhou , School of Computer and Information Engineering, Henan University, Kaifeng
475004,China
Ying Zou was born in Henan, china in 1979. She is currently a lecturer in
Zhongkai University of Agriculture and Engineering, China. She is a member of
China Computer Federation. Her research interests include: network security
technology, IoT technology and machine learning. In recent five years, as the first
author has published 1 paper, chaired three software copyrights.
E-mail: [email protected]
Ge Zhang received the B.S. and M.S. degrees in computer science from the
Zhongnan University of Economics and Law, Wuhan, China, in 2005 and
2007, respectively, and received the Ph.D. degree from Huazhong University
of Science and Technology, Wuhan, China,in 2015. Now he is an assistant
professor in in School of Computer and Information Engineering, Henan
University, Kaifeng, China. His research interests include image processing,
streaming media, network modeling, and measurement.
E-mail:[email protected]
Leian Liu is an associate professor in computer science and technology, Zhongkai University of
Agriculture and Engineering, China. He received the Ph.D. in Circuits and Systems from South
China University of Technology. He is a member of Guangdong Institute of Electronics and China
Computer Federation. Currently, he is interested in the research areas such as IoT technology,
network security, and embedded technology, etc.
E-mail:[email protected]