Abstract
Some of the most advanced steganographic methods for binary images are to manually extract the features of binary images. And state-of-the-art binary image steganography techniques need to be promoted in the human visual system. This paper proposes a secure binary image steganography method by a generative adversarial network (GAN). The generator part of GAN simulates stego images, and the discriminator is designed to discriminate between the stego image produced by the generator and the cover image. The proposed GAN can automatically learn the most suitable flipped pixels in a binary image. Firstly, we learn the probability of embedded change from each pixel in the binary image, which can be converted into an embedded distortion map. Then we design an embedded function to simulate the steganography of the binary image. Experimental results show that the proposed method can find more suitable texture areas to embed secret information under the premise of ensuring security with fewer pixels flipped and better visual effects. The proposed network structure is different from the traditional binary image steganography by achieving more advanced content-adaptive embedding. Meanwhile, the proposed method is the first to apply GAN structure to the field of binary image steganography.
Similar content being viewed by others
References
Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur, pp 1–1
Chang C-C, Lin C-J (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27
Chen J, Lu W, Fang Y, Liu X, Yeung Y, Xue Y (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55(AUG):149–156
Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C et al (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Contin 55(2):201–211
Chiew KL, Pieprzyk J (2010) Binary image steganographic techniques classification based on multi-class steganalysis. Information Security, Practice and Experience. Springer, Berlin, pp 341–358
Chiew KL, Pieprzyk J (2010) Blind steganalysis: A countermeasure for binary image steganography. In: International Conference on Availability, Reliability and Security. IEEE Computer Society, pp 653–658
Chiew KL, Pieprzyk J (2010) Estimating hidden message length in binary image embedded by using boundary pixels steganography. In: International Conference on Availability, Reliability and Security. IEEE Computer Society, pp 683–688
Feng B, Lu W, Sun W (2014) Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Trans Inform Forensics Secur 10(2):243–255
Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46(jul):119–127
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Bengio Y (2014) Generative adversarial nets. In Advances in neural information processing systems, pp 2672–2680
Goodfellow IJ, Pouget-Abadie J, Mirza M et al (2014) Generative adversarial networks. Adv Neural Inf Process Syst 3:2672–2680
He K, Zhang X, Ren S et al (2016) Deep residual learning for image recognition. IEEE Conference on Computer Vision & Pattern Recognition. IEEE Computer Society
Jetchev N, Bergmann U, Vollgraf R (2016) Texture synthesis with spatial generative adversarial networks. arXiv preprint arXiv:1611.08207
Jia Y, Yin Z, Zhang X, Luo Y (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sig Process 163(OCT):238–246
Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. International Workshop on Information Hiding. Springer, Berlin, pp 314–327
Li Ming, Fan H, Hua R, Lu D, Xiao D, Li Y (2018) Meaningful image encryption based on reversible data hiding in compressive sensing domain. Secur Commun Netw 2018:1–12
Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739–20753
Lin C, Lu W, Huang X (2018) Copy-move forgery detection using combined features and transitive matching. Multimed Tools Appl 78:30081–30096
Lin C, Lu W, Huang X et al (2019) Region duplication detection based on hybrid feature and evaluative clustering. Multimed Tools Appl 78(15):20739–20763
Liu J, Lu W, Zhan Y, Chen J, Li R (2019) Efficient binary image steganalysis based on ensemble neural network of multi-module. J Real-Time Image Process
Liu W, Yin X, Lu W, Zhang J, Zeng J, Shi S, Mao M (2019) Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process 167:107287
Liu X, Lu W, Huang T, Liu H, Xue Y, Yeung Y (2019) Scaling factor estimation on JPEG compressed images by cyclostationarity analysis. Multimed Tools Appl 78(7):7947–7964
Liu X, Lu W, Zhang Q, Huang J, Shi YQ (2019) Downscaling factor estimation on pre-JPEG compressed images. IEEE Trans Circuits Syst Video Technol, pp 1–1
Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2018) Secure binary image steganography based on fused distortion measurement. IEEE Trans Circuits Syst Video Technol (6):1–1
Lu W, Li R, Zeng L, Chen J, Huang J, Shi Y (2019) Binary image steganalysis based on histogram of structuring elements. IEEE Trans Circuits Syst Video Technol
Luo L, Chen Z, Chen M, Zeng X (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inform Forensics Secur 5(1):187–193
Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557–13583
Ma Y, Luo X, Li X, Bao Z, Zhang Y (2019) Selection of rich model steganalysis features based on decision rough set α -positive region reduction. IEEE Trans Circuits Syst Video Technol 29(2):336–350
Mhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. TIIS 9(5):1938–1962
Mhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40(5):114
Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst 86:951–960
Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security[J]. Multimed Tools Appl 77(14):18451–18481
Paul G, Davidson I, Mukherjee I (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):1–27
Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG bitstream. IEEE Trans Multimed 16(5):1486–1491
Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks.arXiv preprintarXiv:1511.06434
Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Proc 12(6):1065–1071
Tang W, Tan S, Tan S, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551
Theodoridis S, Koutroumbas K (2009) Pattern Recognition, 4th edn. Elsevier, Amsterdam
Tuceryan M, Jain AK (1993) Texture analysis. Handbook of pattern recognition and computer vision, vol 2, pp 207–248
Xiao H, Lu W, Li R, Zhong N, Yeung Y, Chen J (2019) Defocus blur detection based on multiscale SVD fusion in gradient domain. J Vis Commun Image Represent 59(FEB):52–61
Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis[J]. IEEE Signal Process Lett 23(5):708–712
Xue F, Lu W, Ren H, Liu X (2020) Forensics of visual privacy protection in digital images. Multimed Tools Appl 3:1–19
Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2019) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Proc 16(3):601–609
Yang S, Jiang L, Liu Z, Loy CC (2022) Unsupervised image-to-image translation with generative prior. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 18332–18341
Yeung Y, Lu W, Xue Y, Huang J, Shi YQ (2020) Secure binary image steganography with distortion measurement based on prediction. IEEE Trans Circuits Syst Video Technol 30(5):1423–1434
Zeng L, Lu W, Liu W, Chen J (2020) Deep residual network for halftone image steganalysis with stego-signal diffusion. Signal Process 172(Jul.):107576.1-107576.9
Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on l0 regularization and kernel shape optimization. Multimed Tools Appl 77(20):26239–26257
Zhang F, Lu W, Liu H, Yeung Y, Xue Y (2019) Reversible data hiding in binary images based on image magnification. Multimed Tools Appl 78:21891–21915
Zhang J, Lu W, Yin X (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600–605
Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimed Tools Appl 77(23):31239–31260
Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458
Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495
Acknowledgements
This work was supported in part by NSFC (U19B2022, 61772349, 61872244, 62072313, 61806131, 61802262), Guangdong Basic and Applied Basic Research Foundation (2019B151502001), and Shenzhen R&D Program (JCYJ20200109105008228, 20200813110043002). This work was also supported in part by Alibaba Group through Alibaba Innovative Research (AIR) Program.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Guan, Y., Tan, S. & Li, Q. Binary steganography based on generative adversarial nets. Multimed Tools Appl 82, 6687–6706 (2023). https://doi.org/10.1007/s11042-022-13581-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13581-w