Skip to main content
Log in

Binary steganography based on generative adversarial nets

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Some of the most advanced steganographic methods for binary images are to manually extract the features of binary images. And state-of-the-art binary image steganography techniques need to be promoted in the human visual system. This paper proposes a secure binary image steganography method by a generative adversarial network (GAN). The generator part of GAN simulates stego images, and the discriminator is designed to discriminate between the stego image produced by the generator and the cover image. The proposed GAN can automatically learn the most suitable flipped pixels in a binary image. Firstly, we learn the probability of embedded change from each pixel in the binary image, which can be converted into an embedded distortion map. Then we design an embedded function to simulate the steganography of the binary image. Experimental results show that the proposed method can find more suitable texture areas to embed secret information under the premise of ensuring security with fewer pixels flipped and better visual effects. The proposed network structure is different from the traditional binary image steganography by achieving more advanced content-adaptive embedding. Meanwhile, the proposed method is the first to apply GAN structure to the field of binary image steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur, pp 1–1

  2. Chang C-C, Lin C-J (2011) Libsvm: a library for support vector machines. ACM Trans Intell Syst Technol (TIST) 2(3):27

    Google Scholar 

  3. Chen J, Lu W, Fang Y, Liu X, Yeung Y, Xue Y (2018) Binary image steganalysis based on local texture pattern. J Vis Commun Image Represent 55(AUG):149–156

    Article  Google Scholar 

  4. Chen J, Lu W, Yeung Y, Xue Y, Liu X, Lin C et al (2018) Binary image steganalysis based on distortion level co-occurrence matrix. Comput Mater Contin 55(2):201–211

    Google Scholar 

  5. Chiew KL, Pieprzyk J (2010) Binary image steganographic techniques classification based on multi-class steganalysis. Information Security, Practice and Experience. Springer, Berlin, pp 341–358

  6. Chiew KL, Pieprzyk J (2010) Blind steganalysis: A countermeasure for binary image steganography. In: International Conference on Availability, Reliability and Security. IEEE Computer Society, pp 653–658

  7. Chiew KL, Pieprzyk J (2010) Estimating hidden message length in binary image embedded by using boundary pixels steganography. In: International Conference on Availability, Reliability and Security. IEEE Computer Society, pp 683–688

  8. Feng B, Lu W, Sun W (2014) Secure Binary Image Steganography Based on Minimizing the Distortion on the Texture. IEEE Trans Inform Forensics Secur 10(2):243–255

    Article  Google Scholar 

  9. Feng B, Weng J, Lu W, Pei B (2017) Steganalysis of content-adaptive binary image data hiding. J Vis Commun Image Represent 46(jul):119–127

    Article  Google Scholar 

  10. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Bengio Y (2014) Generative adversarial nets. In Advances in neural information processing systems, pp 2672–2680

  11. Goodfellow IJ, Pouget-Abadie J, Mirza M et al (2014) Generative adversarial networks. Adv Neural Inf Process Syst 3:2672–2680

    Google Scholar 

  12. He K, Zhang X, Ren S et al (2016) Deep residual learning for image recognition. IEEE Conference on Computer Vision & Pattern Recognition. IEEE Computer Society

  13. Jetchev N, Bergmann U, Vollgraf R (2016) Texture synthesis with spatial generative adversarial networks. arXiv preprint arXiv:1611.08207

  14. Jia Y, Yin Z, Zhang X, Luo Y (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sig Process 163(OCT):238–246

    Article  Google Scholar 

  15. Kim Y, Duric Z, Richards D (2007) Modified matrix encoding technique for minimal distortion steganography. International Workshop on Information Hiding. Springer, Berlin, pp 314–327

  16. Li Ming, Fan H, Hua R, Lu D, Xiao D, Li Y (2018) Meaningful image encryption based on reversible data hiding in compressive sensing domain. Secur Commun Netw 2018:1–12

    Google Scholar 

  17. Liao X, Li K, Yin J (2016) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739–20753

    Article  Google Scholar 

  18. Lin C, Lu W, Huang X (2018) Copy-move forgery detection using combined features and transitive matching. Multimed Tools Appl 78:30081–30096

    Article  Google Scholar 

  19. Lin C, Lu W, Huang X et al (2019) Region duplication detection based on hybrid feature and evaluative clustering. Multimed Tools Appl 78(15):20739–20763

    Article  Google Scholar 

  20. Liu J, Lu W, Zhan Y, Chen J, Li R (2019) Efficient binary image steganalysis based on ensemble neural network of multi-module. J Real-Time Image Process

  21. Liu W, Yin X, Lu W, Zhang J, Zeng J, Shi S, Mao M (2019) Secure halftone image steganography with minimizing the distortion on pair swapping. Signal Process 167:107287

  22. Liu X, Lu W, Huang T, Liu H, Xue Y, Yeung Y (2019) Scaling factor estimation on JPEG compressed images by cyclostationarity analysis. Multimed Tools Appl 78(7):7947–7964

    Article  Google Scholar 

  23. Liu X, Lu W, Zhang Q, Huang J, Shi YQ (2019) Downscaling factor estimation on pre-JPEG compressed images. IEEE Trans Circuits Syst Video Technol, pp 1–1

  24. Lu W, He L, Yeung Y, Xue Y, Liu H, Feng B (2018) Secure binary image steganography based on fused distortion measurement. IEEE Trans Circuits Syst Video Technol (6):1–1

  25. Lu W, Li R, Zeng L, Chen J, Huang J, Shi Y (2019) Binary image steganalysis based on histogram of structuring elements. IEEE Trans Circuits Syst Video Technol

  26. Luo L, Chen Z, Chen M, Zeng X (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inform Forensics Secur 5(1):187–193

    Article  Google Scholar 

  27. Luo X, Song X, Li X, Zhang W, Lu J, Yang C, Liu F (2016) Steganalysis of hugo steganography based on parameter recognition of syndrome-trellis-codes. Multimed Tools Appl 75(21):13557–13583

    Article  Google Scholar 

  28. Ma Y, Luo X, Li X, Bao Z, Zhang Y (2019) Selection of rich model steganalysis features based on decision rough set α -positive region reduction. IEEE Trans Circuits Syst Video Technol 29(2):336–350

    Article  Google Scholar 

  29. Mhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. TIIS 9(5):1938–1962

    Google Scholar 

  30. Mhammad K, Sajjad M, Baik SW (2016) Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J Med Syst 40(5):114

    Article  Google Scholar 

  31. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626

    Article  Google Scholar 

  32. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst 86:951–960

    Article  Google Scholar 

  33. Mukherjee N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security[J]. Multimed Tools Appl 77(14):18451–18481

    Article  Google Scholar 

  34. Paul G, Davidson I, Mukherjee I (2016) Keyless dynamic optimal multi-bit image steganography using energetic pixels. Multimed Tools Appl 76(5):1–27

    Google Scholar 

  35. Qian Z, Zhang X, Wang S (2014) Reversible data hiding in encrypted JPEG bitstream. IEEE Trans Multimed 16(5):1486–1491

    Article  Google Scholar 

  36. Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks.arXiv preprintarXiv:1511.06434

  37. Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Proc 12(6):1065–1071

    Article  Google Scholar 

  38. Tang W, Tan S, Tan S, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551

  39. Theodoridis S, Koutroumbas K (2009) Pattern Recognition, 4th edn. Elsevier, Amsterdam

    MATH  Google Scholar 

  40. Tuceryan M, Jain AK (1993) Texture analysis. Handbook of pattern recognition and computer vision, vol 2, pp 207–248

  41. Xiao H, Lu W, Li R, Zhong N, Yeung Y, Chen J (2019) Defocus blur detection based on multiscale SVD fusion in gradient domain. J Vis Commun Image Represent 59(FEB):52–61

    Article  Google Scholar 

  42. Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis[J]. IEEE Signal Process Lett 23(5):708–712

  43. Xue F, Lu W, Ren H, Liu X (2020) Forensics of visual privacy protection in digital images. Multimed Tools Appl 3:1–19

    Google Scholar 

  44. Xue Y, Liu W, Lu W, Yeung Y, Liu X, Liu H (2019) Efficient halftone image steganography based on dispersion degree optimization. J Real-Time Image Proc 16(3):601–609

    Article  Google Scholar 

  45. Yang S, Jiang L, Liu Z, Loy CC (2022) Unsupervised image-to-image translation with generative prior. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 18332–18341

  46. Yeung Y, Lu W, Xue Y, Huang J, Shi YQ (2020) Secure binary image steganography with distortion measurement based on prediction. IEEE Trans Circuits Syst Video Technol 30(5):1423–1434

  47. Zeng L, Lu W, Liu W, Chen J (2020) Deep residual network for halftone image steganalysis with stego-signal diffusion. Signal Process 172(Jul.):107576.1-107576.9

  48. Zhang F, Lu W, Liu H, Xue F (2018) Natural image deblurring based on l0 regularization and kernel shape optimization. Multimed Tools Appl 77(20):26239–26257

    Article  Google Scholar 

  49. Zhang F, Lu W, Liu H, Yeung Y, Xue Y (2019) Reversible data hiding in binary images based on image magnification. Multimed Tools Appl 78:21891–21915

    Article  Google Scholar 

  50. Zhang J, Lu W, Yin X (2019) Binary image steganography based on joint distortion measurement. J Vis Commun Image Represent 58:600–605

    Article  Google Scholar 

  51. Zhang Q, Lu W, Wang R, Li G (2018) Digital image splicing detection based on markov features in block dwt domain. Multimed Tools Appl 77(23):31239–31260

    Article  Google Scholar 

  52. Zhang Q, Lu W, Weng J (2016) Joint image splicing detection in dct and contourlet transform domain. J Vis Commun Image Represent 40:449–458

    Article  Google Scholar 

  53. Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485–495

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported in part by NSFC (U19B2022, 61772349, 61872244, 62072313, 61806131, 61802262), Guangdong Basic and Applied Basic Research Foundation (2019B151502001), and Shenzhen R&D Program (JCYJ20200109105008228, 20200813110043002). This work was also supported in part by Alibaba Group through Alibaba Innovative Research (AIR) Program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shunquan Tan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guan, Y., Tan, S. & Li, Q. Binary steganography based on generative adversarial nets. Multimed Tools Appl 82, 6687–6706 (2023). https://doi.org/10.1007/s11042-022-13581-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13581-w

Keywords

Navigation