High-Capacity Robust Image Steganography via Adversarial Network |
Chen, Beijing
(School of Computer & Software, Nanjing University of Information Science & Technology)
Wang, Jiaxin (School of Computer & Software, Nanjing University of Information Science & Technology) Chen, Yingyue (School of Internet of Things Engineering, Jiangnan University) Jin, Zilong (School of Computer & Software, Nanjing University of Information Science & Technology) Shim, Hiuk Jae (School of Computer & Software, Nanjing University of Information Science & Technology) Shi, Yun-Qing (Department of Electrical and Computer Engineering, New Jersey Institute of Technology) |
1 | S. Baluja, "Hiding images in plain sight: deep steganography," in Proc. of Neural Information Processing Systems, pp. 2069-2079, December, 2017. |
2 | R. Zhang, S. Dong and J. Liu, "Invisible steganography via generative adversarial networks." Multimedia Tools and Applications, vol. 78, no. 7, pp. 8559-8575, 2019. DOI |
3 | G. Xu, H. Wu and Y. Shi, "Structural design of convolutional neural networks for steganalysis," IEEE Signal Processing Letters, vol. 23, no. 5, pp. 708-712, May, 2016. DOI |
4 | K. Zhang, A. Cuesta-Infante, L. Xu and K. Veeramachaneni, "SteganoGAN: high capacity image steganography with GANs," arXiv:1901.03892 [cs.CV], 2019. |
5 | Y. G. Fu and R. M. Shen, ''Color image watermarking scheme based on linear discriminant analysis,'' Computer Standards and Interfaces, vol. 30, no. 3, pp. 115-120, 2008. DOI |
6 | M. Kutter and S. Winkler, "A vision-based masking model for spread-spectrum image watermarking,'' IEEE Transactions on Image Processing, vol. 11, no. 1, pp. 16-25, 2002. DOI |
7 | C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens and Z. Wojna, "Rethinking the inception architecture for computer vision,'' in Proc. of CVPR 2016, pp. 2818-2826, 2016. |
8 | J. Deng, W. Dong, R. Socher, L. Li and F. Li, "ImageNet: a large-scale hierarchical image database," in Proc. of CVPR 2009, pp. 248-255, June, 2009. |
9 | N.F. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," IEEE Computer, vol. 31, no.2, pp. 26-34, 1998. DOI |
10 | BBC News: Hiding messages in plain sight, available from: http://news.bbc.co.uk/go/pr/fr/-/1/hi/technology/6361891.stm |
11 | I. J. Kadhim, Pr. Premaratne, P. J. Vial and B. Halloran, ''Comprehensive survey of image steganography: techniques, evaluations, and trends in future research,'' Neurocomputing, vol. 335, pp. 299-326, March, 2019. DOI |
12 | L. Shi, Z. Wang and Z. Qian, ''Distortion function for emoji image steganography,'' Computers, Materials & Continua, vol. 59, pp. 943-953, 2019. DOI |
13 | W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3.4, pp. 313-336, January, 1996. DOI |
14 | W. Lie and L. Chang, "Data hiding in images with adaptive numbers of least significant bits based on the human visual system," in Proc. of IEEE International Conference on Image Processing, pp. 286-290, February, 1999. |
15 | B. Chen, C. Zhou, B. Jeon, Y. Zheng and J. Wang, "Quaternion discrete fractional random transform for color image adaptive watermarking," Multimedia Tools and Application, vol. 77, no. 16, pp. 20809-20837, 2018. DOI |
16 | M. Ramkumar, A. N. Akansu and A. A. Alatan, "A robust data hiding scheme for images using DFT," in Proc. of IEEE International Conference on Image Processing, pp. 211-215, February, 1999. |
17 | B. Kaur, E. Kaur and J. Singh, "Steganographic approach for hiding image in DCT domain," International Journal of Advances in Engineering and Technology, vol.1, no. 3, pp. 72-78, 2011. |
18 | P. Chen and H. Lin, "A DWT based approach for image steganography," International Journal of Applied Science and Engineering, vol. 4, no. 3, pp. 275-290, January, 2006. |
19 | X. Duan, H. Song and C. Qin, "Coverless steganography for digital images based on a generative model," Computers, Materials & Continua, vol. 55, no. 3, pp. 483-493, 2018. |
20 | A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, "Digital image steganography: survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, March, 2010. DOI |
21 | D. L. Robie and R. M. Mersereau, "Video error correction using steganography," EURASIP Journal on Advances in Signal Processing, vol. 1, pp. 164-173, 2002. |
22 | W. N. Lie, T. I. Lin and C. W. Lin, "Enhancing video error resilience by using data-embedding techniques," IEEE Transactions on Circuits Systems for Video Technology, vol.16, no.2, pp.300-308, 2006. DOI |
23 | D. Volkhonskiy, I. Nazarov, B. Borisenko and E. Burnaev, "Steganographic generative adversarial networks," arXiv:1703.05502 [cs.MM], 2019. |
24 | Z. Qu, H. Song and C. Qin, "Analysis and improvement of steganography protocol based on bell states in noise environment," Computers, Materials & Continua, vol. 59, no. 2, pp. 607-624, 2019. DOI |
25 | J. Schmidhuber, "Deep learning in neural networks: an overview," Neural Networks, vol.61, pp. 85-117, January, 2015. DOI |
26 | R. Salakhutdinov, A. Mnih and G. Hinton, "Restricted boltzmann machines for collaborative filtering," in Proc. of 24th ACM International conference on Machine Learning, pp. 791-798, Junuary, 2007. |
27 | H. Shi, J. Dong, W. Wang, Y. Qian and X. Zhang, "SSGAN: secure steganography based on generative adversarial networks," Advances in Multimedia Information Processing, pp.534-544, 2017. |
28 | D. Hu, L. Wang, W. Jiang, S. Zheng and B. Li, "A novel image steganography method via deep convolutional generative adversarial networks," IEEE Access, vol. 6, pp. 38303-38314, July, 2018. DOI |
29 | W. Zhang, S. Cheung and M. Chen, "Hiding privacy information in video surveillance system," in Proc. of 12th IEEE International Conference on Image Processing, pp. 868-871, 2005. |
30 | J. Hayes and G. Danezis, "Generating steganographic images via adversarial training," Advances in Neural Information Processing Systems 2017, December, 2017. |
31 | J. Zhu, R. Kaplan, J. Johnson and F. F. Li, "Hidden: hiding data with deep networks," in Proc. of ECCV 2018, pp. 657-672, 2018. |
32 | W. Tang, S. Tan, B. Li and J. Huang, "Automatic steganographic distortion learning using a generative adversarial network," IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547-1551, October, 2017. DOI |
33 | J. Yang, K. Liu, X. Kang, E. K. Wong and Y. Shi, "Spatial image steganography based on generative adversarial network," arXiv:1804.07939 [cs.MM], 2018. |
34 | A. Rehman, R. Rahim, M. Nadeem and S. Hussain, "End-to-end trained CNN encode-decoder networks for image steganography," in Proc. of Computer Vision - ECCV 2018 Workshops, pp. 723-729, 2018. |
![]() |