Abstract
Steganalysers based on deep learning achieve state-of-the-art performance. However, due to the difficulty of capturing the distribution of the high-dimensional covers, traditional steganography schemes construct more complex artificial rules within expert knowledge, which is usually challenging to obtain to counter these powerful steganalysers. Adversarial learning is a valuable potential for steganography. There have some steganography schemes through playing an adversarial game within deep neural networks. However, there is a vast security margin needed to reduce. In this paper, we propose AdvSGAN, which learns an image steganography scheme represented by a restricted neural coder from scratch by playing an adversarial game between the restricted neural coder and adversaries in the adversary model, i.e., In-Training and Out-Training adversaries. The restricted neural coder is implemented by two neural networks named SE and SD are to perform encoding and decoding transformation respectively, and a flexible restriction model to constrain the covers’ embedding space to improve the performance. The In-Training adversary is implemented by another network of discriminator named Eve in the GANs model. The Out-Training adversary is implemented by the targeted CNN based steganalyser. By playing adversarial game jointly with Eve, SE and SD are evolving to find the possible transformation. Meanwhile, by attacking the Out-Training adversary in a white-box setting, the obtained gradient provides instructive guidance for evolving to find the optimal steganographic scheme. Experiments demonstrate that the proposed steganographic scheme achieves better security performance even in high capacity against targeted steganalyser, and still has some transferability to other unaware steganalysers.
Similar content being viewed by others
References
Baluja S (2017) Hiding images in plain sight: Deep steganography. In: Advances in neural information processing systems, pp 2069–2079
Bas P, Filler T, Pevnỳ T (2011) break our steganographic system: The ins and outs of organizing boss. In: International workshop on information hiding. Springer, pp 59–70
Boehm B (2014) Stegexpose-a tool for detecting lsb steganography. arXiv:1410.6656
Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inform Forens Secur 14(5):1181–1193
Chaumont M (2019) Deep learning in steganography and steganalysis from 2015 to 2018. arXiv:1904.01444
Chen C, Shi YQ (2008) Jpeg image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International symposium on circuits and systems. IEEE, pp 3029–3032
Cogranne R, Sedighi V, Fridrich J, Pevnỳ T (2015) Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?. In: 2015 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 1–6
Denemark T, Fridrich J, Holub V (2014) Further study on the security of s-uniward. In: Media watermarking, security, and forensics 2014. International society for optics and photonics, vol 9028, p 902805
Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random lsb embedding in continuous-tone images. In: Proceedings. International conference on image processing, vol 3. IEEE, pp 641–644
Fridrich J (2012) Kodovsky: Rich models for steganalysis of digital images. Information Forensics and Security, IEEE Transactions on
Fridrich J (2020) Steganographicalgorithms.[Online].Available: http://dde.binghamton.edu/download/stegoalgorithms/
Fridrich J, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: New challenges, pp 27–30
Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forens Secur 7(3):868–882
Girod B (1993) What’s wrong with mean-squared error? Digit Images Human Vision 207–220
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672–2680
Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572
Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of wasserstein gans. In: Advances in neural information processing systems, pp 5767–5777
Hayes J, Danezis G (2017) Generating steganographic images via adversarial training. In: Advances in neural information processing systems, pp 1954–1963
Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 234–239
Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inform Secur 2014 (1):1
Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980
Kodovsky J, Fridrich HV (2012) Ensemble classifiers for steganalysis of digital media. Inform Forens Secur IEEE Transactions on 7(2):432–444
Kouider S, Chaumont M, Puech W (2013) Adaptive steganography by oracle (aso). In: 2013 IEEE International conference on multimedia and expo (ICME). IEEE, pp 1–6
Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world. arXiv:1607.02533
Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inform Hiding Multimed Signal Process 2(2):142–172
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inform Forens Secur 5(2):201–214
Mielikainen J (2006) Lsb matching revisited. IEEE Signal Process Lett 13(5):285–287
Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans inform Forens Secur 5(2):215–224
Pevnỳ T., Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding. Springer, pp 161–177
Simmons GJ (1984) The prisoners’ problem and the subliminal channel. In: Advances in cryptology. Springer, pp 51–67
Tang W, Li B, Tan S, Barni M, Huang J (2019) Cnn-based adversarial embedding for image steganography. IEEE Trans Inform Forens Secur 14 (8):2074–2087
Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551
Wang Z, Bovik AC, Lu L (2002) Why is image quality assessment so difficult?. In: 2002 IEEE International conference on acoustics, speech, and signal processing, vol 4. IEEE, pp IV–3313
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems breaking the steganographic utilities ezstego, jsteg, steganos and s-toolsand some lessons learned
Wu P, Yang Y, Li X (2018) Image-into-Image Steganography Using Deep Convolutional Network: 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II 792–802
Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712
Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forens Secur 12(11):2545–2557
Yedroudj M, Comby F, Chaumont M (2019) Steganography using a 3 player game. arXiv:1907.06956
Zhang KA, Cuesta-Infante A, Xu L, Veeramachaneni K (2019) Steganogan: High capacity image steganography with gans. arXiv:1901.03892
Zhang Y, Zhang W, Chen K, Liu J, Liu Y, Yu N (2018) Adversarial examples against deep neural network based steganalysis. In: Proceedings of the 6th ACM Workshop on information hiding and multimedia security, pp 67–72
Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the european conference on computer vision (ECCV), pp 657–672
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, L., Fan, M. & Liu, D. AdvSGAN: Adversarial image Steganography with adversarial networks. Multimed Tools Appl 80, 25539–25555 (2021). https://doi.org/10.1007/s11042-021-10904-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10904-1