Abstract
Image steganography secures the transmission of secret information by covering it under routine multimedia transmission. During image generation based on Generative Adversarial Network (GAN), the embedding and recovery of secret bits can rely entirely on deep networks, relieving many manual design efforts. However, existing GAN-based methods always design deep networks by adapting generic deep learning structures to image steganography. These structures themselves lack the feature extraction that is effective for steganography, resulting in the low imperceptibility of these methods. To address the problem, we propose GAN-based image steganography by exploiting transform domain knowledge with deep networks, called EStegTGANs. Different from existing GAN-based methods, we explicitly introduce transform domain knowledge with Discrete Wavelet Transform (DWT) and its inverse (IDWT) in deep networks, ensuring that each network performs with DWT features. Specifically, the encoder embeds secrets and generates stego images with the explicit DWT and IDWT approaches. The decoder recovers secrets and the discriminator evaluates feature distribution with the explicit DWT approach. By utilizing traditional DWT and IDWT approaches, we propose EStegTGAN-coe, which directly adopts the DWT coefficients of pixels for embedding and recovering. To create more feature redundancy for secrets, we extract DWT features from the intermediate features in deep networks for embedding and recovering. We then propose EStegTGAN-DWT with traditional DWT and IDWT approaches. To entirely rely on deep networks without traditional filters, we design the convolutional DWT and IDWT approaches that conduct the same feature transformation on features as traditional approaches. We further replace the traditional approaches in EStegTGAN-DWT with our proposed convolutional approaches. Comprehensive experimental results demonstrate that our proposals significantly improve the imperceptibility and our designed convolutional DWT and IDWT approaches are more effective in distinguishing high-frequency characteristics of images for steganography than traditional DWT and IDWT approaches.
Similar content being viewed by others
Data availibility
Data available on request from the authors. The data that support the findings of this study are available from the corresponding author, upon reasonable request.
References
Mandal, C., Mukherjee, I., Paul, G., Chatterji, B.N.: Digital image steganography: a literature survey. Inform. Sci. 609, 1451–1488 (2022)
Kadhim, I.J., Premaratne, P., Vial, P.J., Halloran, B.: Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335, 299–326 (2019)
Singh, O.P., Singh, A.K., Srivastava, G., Kumar, N.: Image watermarking using soft computing techniques: a comprehensive survey. Multimed. Tools Appl. 80(20), 30367–30398 (2021)
Singh, O.P., Singh, K.N., Baranwal, N., Agrawal, A.K., Singh, A.K., Zhou, H.: Hidemarks: hiding multiple marks for robust medical data sharing using IWT-LSB. Multimed. Tools Appl. 83(8), 24919–24937 (2024)
Tang, W., Tan, S., Li, B., Huang, J.: Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process. Lett. 24(10), 1547–1551 (2017)
Yang, J., Ruan, D., Huang, J., Kang, X., Shi, Y.-Q.: An embedding cost learning framework using GAN. IEEE Trans. Inform. Forensics Secur. 15, 839–851 (2019)
Zhao, J., Wang, S.: A stable GAN for image steganography with multi-order feature fusion. Neural Comput. Appl. 34(18), 16073–16088 (2022)
Filler, T., Judas, J., Fridrich, J.: Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans. Inform. Forensics Secur. 6(3), 920–935 (2011)
Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. Paper presented at the 12th international conference on information hiding (2010)
Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. Paper presented at the 2012 IEEE international workshop on information forensics and security (WIFS) (2012)
Zhang, K.A., Cuesta-Infante, A., Xu, L., Veeramachaneni, K.: SteganoGAN: High capacity image steganography with GANs. Preprint at http://arxiv.org/abs/1901.03892 (2019)
Tan, J., Liao, X., Liu, J., Cao, Y., Jiang, H.: Channel attention image steganography with generative adversarial networks. IEEE Trans. Netw. Sci. Eng. 9(2), 888–903 (2022)
Zhu, J., Kaplan, R., Johnson, J., Fei-Fei, L.: HiDDeN: hiding data with deep networks. Paper presented at the European conference on computer vision (ECCV) (2018)
Ernawan, F.: An improved hiding information by modifying selected DWT coefficients in video steganography. Multimed. Tools Appl. (2023). https://doi.org/10.1007/s11042-023-17113-y
Sashi Rekha, K., Joe Amali, M., Swathy, M., Raghini, M., Priya Darshini, B.: A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm. Biomed. Signal Process. Control 80, 104212 (2023)
Xiong, L., Zhong, X., Yang, C.-N.: DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Process. 173, 107571 (2020)
Daubechies, I.: The wavelet transform, time-frequency localization and signal analysis. IEEE Trans. Inform. Theor. 36(5), 961–1005 (1990)
Mallat, S.G.: A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674–693 (1989)
Chan, C.-K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognit. 37(3), 469–474 (2023)
Ghosal, S.K., Chatterjee, A., Sarkar, R.: image steganography based on Kirsch edge detection. Multimed. Syst. 27(1), 73–87 (2021)
Wang, J., Chen, X., Ni, J., Mao, N., Shi, Y.: Multiple histograms-based reversible data hiding: framework and realization. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2313–2328 (2019)
Denemark, T., Sedighi, V., Holub, V., Cogranne, R., Fridrich, J.: Selection-channel-aware rich model for steganalysis of digital images. Paper presented at the 2014 IEEE international workshop on information forensics and security (WIFS) (2014)
Filler, T., Fridrich, J.: Gibbs construction in steganography. IEEE Trans. Inform. Forensics Secur. 5(4), 705–720 (2010)
Volkhonskiy, D., Borisenko, B., Burnaev, E.: Generative adversarial networks for image steganography. Paper presented at the 5th international conference on learning representations (ICLR) (2017)
Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: secure steganography based on generative adversarial networks. Paper presented at the advances in multimedia information processing–PCM 2017 (2018)
Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. Paper presented at the IEEE conference on computer vision and pattern recognition (CVPR) (2017)
Baluja, S.: Hiding images in plain sight: deep steganography. Paper presented at the advances in neural information processing systems (NeurlPS) (2017)
Wu, P., Yang, Y., Li, X.: Stegnet: mega image steganography capacity with deep convolutional network. Fut. Internet 10(6), 54 (2018)
Zhang, R., Dong, S., Liu, J.: Invisible steganography via generative adversarial networks. Multimed. Tools Appl. 78(7), 8559–8575 (2019)
Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: HiNet: deep image hiding by invertible network. Paper presented at the IEEE/CVF international conference on computer vision (ICCV) (2021)
Lu, S.-P., Wang, R., Zhong, T., Rosin, P.L.: Large-capacity image steganography based on invertible neural networks. Paper presented at the IEEE/CVF conference on computer vision and pattern recognition (CVPR) (2021)
Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. Paper presented at the 34th international conference on machine learning (ICML) (2017)
Li, B., Wang, M., Huang, J., Li, X.: A new cost function for spatial image steganography. Paper presented at the 2014 IEEE international conference on image processing (ICIP) (2014)
Bas, P., Filler, T., Pevnỳ, T.: Break our steganographic system: the ins and outs of organizing BOSS. Paper presented at the international workshop on information hiding (2011)
Boehm, B.: StegExpose—a tool for detecting LSB steganography. Preprint at arXiv:abs/1410.6656 (2014)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Tang, W., Li, B., Barni, M., Li, J., Huang, J.: Improving cost learning for jpeg steganography by exploiting jpeg domain knowledge. IEEE Trans. Circuits Syst. Video Technol. 32(6), 4081–4095 (2021)
Kishore, V., Chen, X., Wang, Y., Li, B., Weinberger, K.Q.: Fixed neural network steganography: train the images, not the network. Paper presented at the international conference on learning representations (ICLR) (2022)
Acknowledgements
This research work was supported by the Big Data Computing Center of Southeast University. This research work was funded by the National Natural Science Foundation of China (U22B2026).
Funding
This research work was funded by the National Natural Science Foundation of China (U22B2026). This research work was supported by the Big Data Computing Center of Southeast University.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study’s conception and design. Xiao Li, Jianchang Lai, Zhangjie Fu and Suhui Liu performed material preparation, data collection and analysis. Founding was acquired by Liquan Chen and he provided the supervision. The first draft of the manuscript was written by Xiao Li and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethical approval
Not applicable.
Conflict of interest
The authors have no Conflict of interest or personal relationships to declare that are relevant to the content of this article.
Consent to publish
Not applicable.
Additional information
Communicated by Bing-kun Bao.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, X., Chen, L., Lai, J. et al. GAN-based image steganography by exploiting transform domain knowledge with deep networks. Multimedia Systems 30, 224 (2024). https://doi.org/10.1007/s00530-024-01427-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00530-024-01427-4