Abstract
Raising payload capacity in image steganography without losing too much safety is a challenging task. This paper combines recent deep convolutional neural network methods with image-into-image steganography. We show that with the proposed method, the capacity can go up to 23.57 bpp (bits per pixel) by changing only 0.76% of the cover image. We applied several traditional steganography analysis algorithms and found out that the proposed method is quite robust.
The source code is available at: https://github.com/adamcavendish/Deep-Image-Steganography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Almohammad, A., Hierons, R.M., Ghinea, G.: High capacity steganographic method based upon JPEG. In: The Third International Conference on Availability, Reliability and Security (2008)
Baluja, S.: Hiding Images in Plain Sight: Deep Steganograph, pp. 2069–2079. Curran Associates, Inc. (2017). http://papers.nips.cc/paper/6802-hiding-images-in-plain-sight-deep-steganography.pdf
Boehm, B.: StegExpose - A Tool for Detecting LSB Steganography. arXiv e-prints (2014). arXiv:1410.6656
Chang, C.C., Chen, T.S., Chung, L.Z.: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141(1–2), 123–138 (2002)
Chollet, F.: Xception: Deep Learning with Depthwise Separable Convolutions. arXiv e-prints (2016). arXiv:1610.02357
Clevert, D.A., Unterthiner, T., Hochreiter, S.: Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs). arXiv e-prints (2015). arXiv:1511.07289
He, K., Zhang, X., Ren, S., Sun, J.: Deep Residual Learning for Image Recognition (2016)
Ioffe, S., Szegedy, C.: Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. arXiv e-prints (2015). arXiv:1502.03167
Kawaguchi, E., Eason, R.: Principle and applications of BPCS-Steganography. In: Proceedings of SPIE, Multimedia Systems and Applications, vol. 3528, p. 464 (1998)
Kingma, D., Ba, J.: Adam: A Method for Stochastic Optimization. arXiv e-prints (2014). arXiv:1412.6980
Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_13
Sedighi, V., Fridrich, J.: Histogram layer, moving convolutional neural networks towards feature-based steganalysis. Electron. Imaging 2017(7), 50–55 (2017)
Sharifzadeh, M., Agarwal, C., Aloraini, M., Schonfeld, D.: Convolutional neural network steganalysis’s application to steganography. arXiv:1711.02581 [cs], November 2017
Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: secure steganography based on generative adversarial networks. arXiv:1707.01613 [cs], July 2017
Srivastava, R.K., Greff, K., Schmidhuber, J.: Highway Networks. arXiv e-prints (2015). arXiv:1505.00387
Szegedy, C., Ioffe, S., Vanhoucke, V., Alemi, A.: Inception-v4, Inception-ResNet and the Impact of Residual Connections on Learning. arXiv e-prints (2016). arXiv:1602.07261
Szegedy, C., et al.: Going Deeper with Convolutions. arXiv e-prints (2014). arXiv:1409.4842
Volkhonskiy, D., Nazarov, I., Borisenko, B., Burnaev, E.: Steganographic generative adversarial networks. arXiv:1703.05502 [cs, stat], March 2017
Xie, S., Girshick, R., Dollár, P., Tu, Z., He, K.: Aggregated Residual Transformations for Deep Neural Networks (2017)
Zeiler, M.D., Fergus, R.: Visualizing and understanding convolutional networks 8689, 818–833 (2013). https://doi.org/10.1007/978-3-319-10590-1_53
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Wu, P., Yang, Y., Li, X. (2018). Image-into-Image Steganography Using Deep Convolutional Network. In: Hong, R., Cheng, WH., Yamasaki, T., Wang, M., Ngo, CW. (eds) Advances in Multimedia Information Processing – PCM 2018. PCM 2018. Lecture Notes in Computer Science(), vol 11165. Springer, Cham. https://doi.org/10.1007/978-3-030-00767-6_73
Download citation
DOI: https://doi.org/10.1007/978-3-030-00767-6_73
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00766-9
Online ISBN: 978-3-030-00767-6
eBook Packages: Computer ScienceComputer Science (R0)