Abstract
Today, a lot of information is being shared electronically in a way or another. Despite the advancements in technology used for data transfer, the reliable transmission of sensitive data is still a major challenge that need to be addressed. In this paper, we propose a steganographic technique to generate a stego image using the Neural Style Transfer (NST) algorithm that maintain the perceptual quality of the stego image with maximum capacity payload. Along with this, we propose to recover the secret content from generated stego image with minimal distortion. So, to recover the secret image from the generated stego image, destylization is performed using conditional Generative Adversarial Networks (cGANs). The proposed destyling GAN is forced to learn the embedded secret information using a loss function that learns the same representation as in the embedding NST algorithm. This whole framework of embedding and extraction of secret image is evaluated for Imagenet dataset and later tested on the PASCAL VOC12 dataset. The algorithm outperforms in terms of Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Visual Information Fidelity (VIF) with 44.175 dB, 0.9958, and 0.954 respectively for the Imagenet dataset. Also, the proposed algorithm is more robust against StegExpose with 0.529, area under the curve (AUC).








Similar content being viewed by others
References
Baagyere EY, Agbedemnab PAN, Qin Z, Daabo MI, Qin Z (2020) A multi-layered data encryption and decryption scheme based on genetic algorithm and residual numbers. IEEE Access 8:100438–100447
Baluja S (2017) Hiding images in plain sight: Deep steganography. In: Advances in neural information processing systems, pp 2069–2079
Baluja S (2019) Hiding images in plain sight: Deep steganography. Adv Neural Inf Proc Syst, vol 30
Bhattacharyya S, Khan A, Nandi A, Dasmalakar A, Roy S, Sanyal G (2011) Pixel mapping method (pmm) based bit plane complexity segmentation (bpcs) steganography. In: 2011 World congress on information and communication technologies, pp 36–41
Biradar RL, Umashetty A (2016) A survey paper on steganography techniques, vol 4
Boehm B Stegexpose-a tool for detecting lsb steganography. arXiv:1410.6656
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90 (3):727–752
Chen B, Luo W, Zheng P, Huang J (2020) Universal stego post-processing for enhancing image steganography. Journal of Information Security and Applications 55:102664
Chen HY, Fang I, Cheng CM, Chiu WC, et al. (2020) Self-contained stylization via steganography for reverse and serial style transfer. In: The IEEE winter conference on applications of computer vision, pp 2163–2171
Chu C, Zhmoginov A, Sandler M (2017) Cyclegan, a master of steganography. arXiv:1712.02950
Duan X, Jia K, Li B, Guo D, Zhang E, Qin C (2019) Reversible image steganography scheme based on a u-net structure. IEEE Access 7:9314–9323
Duan X, Nao L, Mengxiao G, Yue D, Xie Z, Ma Y, Qin C (2020) High-capacity image steganography based on improved fc-densenet. IEEE Access 8:170174–170182
Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random lsb embedding in continuous-tone images. In: Proceedings International conference on image processing, vol. 3, pp 641–644. IEEE
Dumitrescu S, Wu X, Wang Z (2002) Detection of lsb steganography via sample pair analysis. In: International workshop on information hiding, pp 355–372. Springer
Everingham M, Winn J (2012) The PASCAL visual object classes challenge 2012 (VOC2012) development kit. Pattern Anal Stat Model Comput Learn, Tech Rep 2007: 1–45
Fridrich J, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: new challenges, pp 27–30
Garg M, Ubhi JS, Aggarwal A (2019) Steganography and its advancements in spatial domain. EasyChair
Garg M, Ubhi JS, Aggarwal A (2021) Deep learning for obstacle avoidance in autonomous driving. In: Autonomous driving and advanced driver-assistance systems (ADAS), pp 233–246. CRC press
Gatys LA, Ecker AS, Bethge M (2015) A neural algorithm of artistic style. arXiv:1508.06576
Gatys LA, Ecker AS, Bethge M (2016) Image style transfer using convolutional neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2414–2423
Gatys LA, Ecker AS, Bethge M, Hertzmann A, Shechtman E (2017) Controlling perceptual factors in neural style transfer. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3985–3993
Ghosh S, Ghosh S, Kumar P, Scheme E, Roy PP (2021) A novel spatio-temporal siamese network for 3d signature recognition. Pattern Recogn Lett 144:13–20
Hayes J, Danezis G (2017) Generating steganographic images via adversarial training. In: Advances in neural information processing systems, pp 1954–1963
Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6:38303–38314
Huang X, Belongie S (2017) Arbitrary style transfer in real-time with adaptive instance normalization. In: Proceedings of the IEEE international conference on computer vision, pp 1501–1510
Jiang D, Li G, Sun Y, Kong J, Tao B (2019) Gesture recognition based on skeletonization algorithm and cnn with asl database. Multimedia Tools and Applications 78(21):29953–29970
Jiang D, Li G, Sun Y, Kong J, Tao B, Chen D (2019) Grip strength forecast and rehabilitative guidance based on adaptive neural fuzzy inference system using sEMG. Pers Ubiquit Comput, pp. 1–10. Springer
Jiang D, Zheng Z, Li G, Sun Y, Kong J, Jiang G, et al. (2019) Gesture recognition based on binocular vision. Clust Comput 22(6):13261–13271
Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20–32
Ke Y, Zhang M.q., Liu J, Su Tt, Yang Xy (2019) Generative steganography with kerckhoffs’ principle. Multimed Tools Appl 78(10):13805–13818
Khatun A, Haque MR, Basri R, Uddin MS, et al. (2020) Single image dehazing: an analysis on generative adversarial network. Jl Comput Commun 8(04):127
Kumar P, Scheme E (2021) A deep spatio-temporal model for eeg-based imagined speech recognition. In: ICASSP 2021-2021 IEEE International conference on acoustics, speech and signal processing (ICASSP), pp 995–999. IEEE
Laskar SA, Hemachandran K (2013) Steganography based on random pixel selection for efficient data hiding. Jl Comput Commun 4(2):31–44
Li G, Jiang D, Zhou Y, Jiang G, Kong J, Manogaran G (2019) Human lesion detection method based on image information and brain signal. IEEE Access 7:11533–11542
Li Y, Fang C, Yang J, Wang Z, Lu X, Yang MH (2017) Universal style transfer via feature transforms. In: Advances in neural information processing systems, pp 386–396
Li Y, Wang N, Liu J, Hou X (2017) Demystifying neural style transfer. arXiv:1701.01036
Lin Z, Huang Y, Wang J (2018) Rnn-sm: Fast steganalysis of voip streams using recurrent neural network. IEEE Transactions on Information Forensics and Security 13(7):1854–1868
Mallika, Ubhi JS, Aggarwal A (2022) Neural style transfer for image within images and conditional gans for destylization. J Vis Commun Image Represent 85:103483. https://doi.org/10.1016/j.jvcir.2022.103483
Meng R, Rice SG, Wang J, Sun X (2018) A fusion steganographic algorithm based on faster r-cnn. Computers, Materials & Continua 55(1):1–16
Noda H, Niimi M, Kawaguchi E (2006) High-performance jpeg steganography using quantization index modulation in dct domain. Pattern Recogn Lett 27(5):455–461. https://doi.org/10.1016/j.patrec.2005.09.008
Olatunji J, Redding G, Rowe C, East A (2020) Reconstruction of kiwifruit fruit geometry using a cgan trained on a synthetic dataset. Comput Electron Agric 177:105699
Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv:1511.06434
Rahim R, Nadeem S, et al. (2018) End-to-end trained cnn encoder-decoder networks for image steganography. In: Proceedings of the European Conference on Computer Vision (ECCV), pp 0–0
Russakovsky O, Deng J, Su H, Krause J, Satheesh S, Ma S, Huang Z, Karpathy A, Khosla A, Bernstein M, Berg AC, Fei-Fei L (2015) ImageNet Large Scale Visual Recognition Challenge. Int J Comput Vis (IJCV) 115 (3):211–252. https://doi.org/10.1007/s11263-015-0816-y
Setiadi DRIM (2019) Payload enhancement on least significant bit image steganography using edge area dilation. Int J Electron Telecommun 65
Sharifzadeh M, Aloraini M, Schonfeld D (2019) Adaptive batch size image merging steganography and quantized gaussian image steganography. IEEE Transactions on Information Forensics and Security 15:867–879
Sharma K, Aggarwal A, Singhania T, Gupta D, Khanna A (2019) Hiding data in images using cryptography and deep neural network. arXiv:1912.10413
Sheng L, Lin Z, Shao J, Wang X (2018) Avatar-net: Multi-scale zero-shot style transfer by feature decoration. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 8242–8250
Sun Y, Zhang H, Zhang T, Wang R (2019) Deep neural networks for efficient steganographic payload location. J Real-Time Image Proc 16(3):635–647
Swain G (2016) A steganographic method combining lsb substitution and pvd in a block. Procedia Computer Science 85:39–44
Tang W, Li B, Tan S, Barni M, Huang J (2019) Cnn-based adversarial embedding for image steganography. IEEE Trans Inf Forensics Secur 14 (8):2074–2087
Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters 24(10):1547–1551
Van TP, Dinh TH, Thanh TM (2019) Simultaneous convolutional neural network for highly efficient image steganography. In: 2019 19Th international symposium on communications and information technologies (ISCIT), pp 410–415. IEEE
Volkhonskiy D, Nazarov I, Burnaev E (2020) Steganographic generative adversarial networks. In: Twelfth international conference on machine vision (ICMV 2019), vol. 11433, p. 114333m. International society for optics and photonics
Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J (2022) A comprehensive survey on robust image watermarking. Neurocomputing. Elsevier
Wang X, Gupta A (2016) Generative image modeling using style and structure adversarial networks. In: European conference on computer vision, pp 318–335. Springer
Wang Z, Gao N, Wang X, Xiang J, Liu G (2019) Stnet: a style transformation network for deep image steganography. In: International conference on neural information processing, pp. 3–14. Springer
Weng X, Li Y, Chi L, Mu Y (2019) High-capacity convolutional video steganography with temporal residual modeling. In: Proceedings of the 2019 on international conference on multimedia retrieval, pp 87–95
Wengrowski E, Dana K (2019) Light field messaging with deep photographic steganography. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1515–1524
Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems. information hiding. In: Third international workshop, IH, vol. 99
Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9-10):1613–1626
Xintao D, Nao L (2019) Hide the image in fc-densenets to another image. arXiv:1910.08341
Xu C, Fu Y, Wen C, Pan Y, Jiang YG, Xue X (2020) Pose-guided person image synthesis in the non-iconic views. IEEE Trans Image Process 29:9060–9072
Xu G (2017) Deep convolutional neural network to detect j-uniward. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, pp 67–73
Xu H, Wang J, Kim HJ (2010) Near-optimal solution to pair-wise lsb matching via an immune programming strategy. Inf Sci 180(8):1201–1217
Zhang KA, Cuesta-Infante A, Xu L, Veeramachaneni K (2019) Steganogan: High capacity image steganography with gans. arXiv:1901.03892
Zhang R, Dong S, Liu J (2019) Invisible steganography via generative adversarial networks. Multimed Tools Appl 78(7):8559–8575
Zheng S, Wang L, Ling B, Hu D (2017) Coverless information hiding based on robust image hashing. In: International conference on intelligent computing, pp 536–547. Springer
Zhong N, Qian Z, Wang Z, Zhang X (2019) Steganography in stylized images. J Electron Imaging 28(1):033005
Zhou Z, Cao Y, Sun X (2016) Coverless information hiding based on bag-of-words model of image. J Appl Sci 34(5):527–536
Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp 657–672
Zhu JY, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp 2223–2232
Funding
There is no funding provided in the course of this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Garg, M., Ubhi, J.S. & Aggarwal, A.K. Neural style transfer for image steganography and destylization with supervised image to image translation. Multimed Tools Appl 82, 6271–6288 (2023). https://doi.org/10.1007/s11042-022-13596-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13596-3
Keywords
Profiles
- Ashwani Kumar Aggarwal View author profile