Browse > Article
http://dx.doi.org/10.3837/tiis.2020.01.020

High-Capacity Robust Image Steganography via Adversarial Network  

Chen, Beijing (School of Computer & Software, Nanjing University of Information Science & Technology)
Wang, Jiaxin (School of Computer & Software, Nanjing University of Information Science & Technology)
Chen, Yingyue (School of Internet of Things Engineering, Jiangnan University)
Jin, Zilong (School of Computer & Software, Nanjing University of Information Science & Technology)
Shim, Hiuk Jae (School of Computer & Software, Nanjing University of Information Science & Technology)
Shi, Yun-Qing (Department of Electrical and Computer Engineering, New Jersey Institute of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.1, 2020 , pp. 366-381 More about this Journal
Abstract
Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.
Keywords
Steganography; steganalysis; high-capacity; robustness; adversarial network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Baluja, "Hiding images in plain sight: deep steganography," in Proc. of Neural Information Processing Systems, pp. 2069-2079, December, 2017.
2 R. Zhang, S. Dong and J. Liu, "Invisible steganography via generative adversarial networks." Multimedia Tools and Applications, vol. 78, no. 7, pp. 8559-8575, 2019.   DOI
3 G. Xu, H. Wu and Y. Shi, "Structural design of convolutional neural networks for steganalysis," IEEE Signal Processing Letters, vol. 23, no. 5, pp. 708-712, May, 2016.   DOI
4 K. Zhang, A. Cuesta-Infante, L. Xu and K. Veeramachaneni, "SteganoGAN: high capacity image steganography with GANs," arXiv:1901.03892 [cs.CV], 2019.
5 Y. G. Fu and R. M. Shen, ''Color image watermarking scheme based on linear discriminant analysis,'' Computer Standards and Interfaces, vol. 30, no. 3, pp. 115-120, 2008.   DOI
6 M. Kutter and S. Winkler, "A vision-based masking model for spread-spectrum image watermarking,'' IEEE Transactions on Image Processing, vol. 11, no. 1, pp. 16-25, 2002.   DOI
7 C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens and Z. Wojna, "Rethinking the inception architecture for computer vision,'' in Proc. of CVPR 2016, pp. 2818-2826, 2016.
8 J. Deng, W. Dong, R. Socher, L. Li and F. Li, "ImageNet: a large-scale hierarchical image database," in Proc. of CVPR 2009, pp. 248-255, June, 2009.
9 N.F. Johnson and S. Jajodia, "Exploring steganography: seeing the unseen," IEEE Computer, vol. 31, no.2, pp. 26-34, 1998.   DOI
10 BBC News: Hiding messages in plain sight, available from: http://news.bbc.co.uk/go/pr/fr/-/1/hi/technology/6361891.stm
11 I. J. Kadhim, Pr. Premaratne, P. J. Vial and B. Halloran, ''Comprehensive survey of image steganography: techniques, evaluations, and trends in future research,'' Neurocomputing, vol. 335, pp. 299-326, March, 2019.   DOI
12 L. Shi, Z. Wang and Z. Qian, ''Distortion function for emoji image steganography,'' Computers, Materials & Continua, vol. 59, pp. 943-953, 2019.   DOI
13 W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems Journal, vol. 35, no. 3.4, pp. 313-336, January, 1996.   DOI
14 W. Lie and L. Chang, "Data hiding in images with adaptive numbers of least significant bits based on the human visual system," in Proc. of IEEE International Conference on Image Processing, pp. 286-290, February, 1999.
15 B. Chen, C. Zhou, B. Jeon, Y. Zheng and J. Wang, "Quaternion discrete fractional random transform for color image adaptive watermarking," Multimedia Tools and Application, vol. 77, no. 16, pp. 20809-20837, 2018.   DOI
16 M. Ramkumar, A. N. Akansu and A. A. Alatan, "A robust data hiding scheme for images using DFT," in Proc. of IEEE International Conference on Image Processing, pp. 211-215, February, 1999.
17 B. Kaur, E. Kaur and J. Singh, "Steganographic approach for hiding image in DCT domain," International Journal of Advances in Engineering and Technology, vol.1, no. 3, pp. 72-78, 2011.
18 P. Chen and H. Lin, "A DWT based approach for image steganography," International Journal of Applied Science and Engineering, vol. 4, no. 3, pp. 275-290, January, 2006.
19 X. Duan, H. Song and C. Qin, "Coverless steganography for digital images based on a generative model," Computers, Materials & Continua, vol. 55, no. 3, pp. 483-493, 2018.
20 A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, "Digital image steganography: survey and analysis of current methods," Signal Processing, vol. 90, no. 3, pp. 727-752, March, 2010.   DOI
21 D. L. Robie and R. M. Mersereau, "Video error correction using steganography," EURASIP Journal on Advances in Signal Processing, vol. 1, pp. 164-173, 2002.
22 W. N. Lie, T. I. Lin and C. W. Lin, "Enhancing video error resilience by using data-embedding techniques," IEEE Transactions on Circuits Systems for Video Technology, vol.16, no.2, pp.300-308, 2006.   DOI
23 D. Volkhonskiy, I. Nazarov, B. Borisenko and E. Burnaev, "Steganographic generative adversarial networks," arXiv:1703.05502 [cs.MM], 2019.
24 Z. Qu, H. Song and C. Qin, "Analysis and improvement of steganography protocol based on bell states in noise environment," Computers, Materials & Continua, vol. 59, no. 2, pp. 607-624, 2019.   DOI
25 J. Schmidhuber, "Deep learning in neural networks: an overview," Neural Networks, vol.61, pp. 85-117, January, 2015.   DOI
26 R. Salakhutdinov, A. Mnih and G. Hinton, "Restricted boltzmann machines for collaborative filtering," in Proc. of 24th ACM International conference on Machine Learning, pp. 791-798, Junuary, 2007.
27 H. Shi, J. Dong, W. Wang, Y. Qian and X. Zhang, "SSGAN: secure steganography based on generative adversarial networks," Advances in Multimedia Information Processing, pp.534-544, 2017.
28 D. Hu, L. Wang, W. Jiang, S. Zheng and B. Li, "A novel image steganography method via deep convolutional generative adversarial networks," IEEE Access, vol. 6, pp. 38303-38314, July, 2018.   DOI
29 W. Zhang, S. Cheung and M. Chen, "Hiding privacy information in video surveillance system," in Proc. of 12th IEEE International Conference on Image Processing, pp. 868-871, 2005.
30 J. Hayes and G. Danezis, "Generating steganographic images via adversarial training," Advances in Neural Information Processing Systems 2017, December, 2017.
31 J. Zhu, R. Kaplan, J. Johnson and F. F. Li, "Hidden: hiding data with deep networks," in Proc. of ECCV 2018, pp. 657-672, 2018.
32 W. Tang, S. Tan, B. Li and J. Huang, "Automatic steganographic distortion learning using a generative adversarial network," IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547-1551, October, 2017.   DOI
33 J. Yang, K. Liu, X. Kang, E. K. Wong and Y. Shi, "Spatial image steganography based on generative adversarial network," arXiv:1804.07939 [cs.MM], 2018.
34 A. Rehman, R. Rahim, M. Nadeem and S. Hussain, "End-to-end trained CNN encode-decoder networks for image steganography," in Proc. of Computer Vision - ECCV 2018 Workshops, pp. 723-729, 2018.