[go: up one dir, main page]

Skip to main content
Log in

GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, the development of steganalysis based on convolutional neural networks (CNN) has brought new challenges to the security of image steganography. However, the current steganographic methods are difficult to resist the detection of CNN-based steganalyzers. To solve this problem, we propose an end-to-end image steganographic scheme based on generative adversarial networks (GAN) with adversarial attack and pixel-wise deep fusion. There are mainly four modules in the proposed scheme: the universal adversarial network is utilized in Attack module to fool CNN-based steganalyzers for enhancing security; Encoder module is seen as the generator to implement the pixel-wise deep fusion for imperceptible information embedding with high payload; Decoder module is responsible for the process of recovering embedded information; Critic module is designed for the discriminator to provide objective scores and conduct adversarial training. Besides, multiple loss functions together with Wasserstein GAN strategy are applied to enhance the stability and availability of the proposed scheme. Experiments on different datasets have verified the advantages of adding universal adversarial perturbations for higher security against CNN-based steganalyzers without compromising imperceptibility. Compared with state-of-the-art methods, the proposed scheme has achieved better performance in security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: International conference on machine learning, pp 214–223

  2. Bas P, Turon (2007) Bows-2. [online]. Available: http://www.bows2.ec-lille.fr

  3. Bas P, Filler T, Pevný T (2011) Break our steganography system— the ins and outs of organizing BOSS. Proc Inf Hiding 6958:59–70

    Article  Google Scholar 

  4. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181–1193

    Article  Google Scholar 

  5. Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on security and privacy (sp). IEEE, pp 39–57

  6. Chen PY, Zhang H, Sharma Y, Yi J, Hsieh CJ (2017) Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. In: Proceedings of the 10th ACM workshop on artificial intelligence and security, pp 15–26

  7. Egiazarian K, Astola J, Ponomarenko N, Lukin V, Battisti F, Carli M (2006) New full-reference quality metrics based on HVS. In: Proceedings of the Second International Workshop on Video Processing and Quality Metrics, Vol. 4

  8. Feng G, Zhang X, Ren Y, Qian Z, Li S (2019) Diversity-based cascade filters for jpeg steganalysis. IEEE Trans Circuits Syst Video Technol to be published https://doi.org/10.1109/TCSVT.2019.2891778

  9. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Security 6(3):920–935

    Article  Google Scholar 

  10. Fridrich J, Koovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882

    Article  Google Scholar 

  11. Goodfellow I et al (2014) Generative adversarial nets. Proc Adv Neural Inf Process Syst:2672–2680

  12. Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572

  13. Hayes J, Danezis G (2017) Generating steganography images via adversarial training. Adv Neural Inf Proces Syst:1954–1963

  14. Hayes J, Danezis G (2018) Learning universal adversarial perturbations with generative models. In: 2018 IEEE Security and Privacy Workshops (SPW). IEEE, pp 43–49

  15. He K, Zhang X, Ren S, Sun J (2015) Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans Pattern Anal Mach Intell (TPAMI) 37(9):1904–1916

    Article  Google Scholar 

  16. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778

  17. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 234–239

  18. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. J Inf Secur 1:1–13

    Google Scholar 

  19. Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning, pp 448–456

  20. Li L, Fan M, Liu D (2021) AdvSGAN: adversarial image steganography with adversarial networks. Multimed Tools Appl. https://doi.org/10.1007/s11042-021-10904-1

  21. Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Zitnick CL (2014) Microsoft coco: Common objects in context. In: European conference on computer vision. Springer, pp 740–755

  22. Lin M, Chen Q, Yan S (2013) Network in network. arXiv:1312.4400

  23. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Proc. 12th Int. Conf. Inf. Hiding, pp. 161–177

  24. Pevný T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Security 5(2):215–224

    Article  Google Scholar 

  25. Pibre L, Pasquet J, Ienco D, Chaumont M (2015) LIRMMBase. [Online]. Available: http://www.lirmm.fr/chaumont/LIRMMBase.html

  26. Ponomarenko N, Silvestri F, Egiazarian K, Carli M, Astola J, Lukin V (2007) On between-coefficient contrast masking of DCT basis functions. In: Proceedings of the third international workshop on video processing and quality metrics, Vol. 4

  27. Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics 2015. International Society for Optics and Photonics 9409:94090J

  28. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234

    Article  Google Scholar 

  29. Sg A, Ss B, Ss C, Sk D, Rd E (2021) Steganogram removal using multidirectional diffusion in fourier domain while preserving perceptual image quality. Pattern Recogn Lett 147:197–205

    Article  Google Scholar 

  30. Shi H, Dong J, Wang W, Qian Y, Zhang X (2017) SSGAN: secure steganography based on generative adversarial networks. In: Pacific Rim Conference on Multimedia. Springer, pp 534–544

  31. Tan S, Li B (2014) Stacked convolutional auto-encoders for steganalysis of digital images. In: Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific. IEEE, pp 1–4

  32. Tang W, Tan S, Li B, Huang J (2017) Automatic steganography distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551

    Article  Google Scholar 

  33. Volkhonskiy D, Nazarov I, Burnaev E (2020) Steganographic generative adversarial networks. In: Twelfth International Conference on Machine Vision (ICMV 2019). International Society for Optics and Photonics 11433:114333M

  34. Xu G, Wu H, Shi Y (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712

    Article  Google Scholar 

  35. Yang J, Ruan D, Huang J, Kang X, Shi Y (2020) An embedding cost learning framework using GAN. IEEE Trans Inf Forensics Secur 15:839–851

    Article  Google Scholar 

  36. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12(11):2545–2557

    Article  Google Scholar 

  37. Yu C (2020) Attention based data hiding with generative adversarial networks. In: Proceedings of the AAAI Conference on Artificial Intelligence 34(01):1120–1128

  38. Zhang R, Dong S, Liu J (2019) Invisible steganography via generative adversarial networks. Multimed Tools Appl 78(7):8559–8575

    Article  Google Scholar 

  39. Zhang R, Zhu F, Liu J, Liu G (2020) Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based Steganalysis. IEEE Trans Inf Forensics Secur 15:1138–1150

    Article  Google Scholar 

  40. Zhou X, Ma Y, Zhang Q, Mohammed MA, Damaševičius R (2021) A reversible watermarking system for medical color images: balancing capacity, imperceptibility, and robustness. Electronics 10(9):1024. https://doi.org/10.3390/electronics10091024

    Article  Google Scholar 

  41. Zhu J, Kaplan R, Johnson J, Li F (2018) Hidden: hiding data with deep networks. Proc Eur Conf Comput Vis:657–672

  42. Zi H, Zhang Q, Yang J, Kang X (2018) Steganography with convincing normal image from a joint generative adversarial framework. In: 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). IEEE, pp 526–532

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (61972269, 61902263), China Postdoctoral Science Foundation (2020 M673276), and the Fundamental Research Funds for the Central Universities (YJ201881, 2020SCU12066).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuan, C., Wang, H., He, P. et al. GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion. Multimed Tools Appl 81, 6681–6701 (2022). https://doi.org/10.1007/s11042-021-11778-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11778-z

Keywords

Navigation