Skip to main content
Log in

AdvSGAN: Adversarial image Steganography with adversarial networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganalysers based on deep learning achieve state-of-the-art performance. However, due to the difficulty of capturing the distribution of the high-dimensional covers, traditional steganography schemes construct more complex artificial rules within expert knowledge, which is usually challenging to obtain to counter these powerful steganalysers. Adversarial learning is a valuable potential for steganography. There have some steganography schemes through playing an adversarial game within deep neural networks. However, there is a vast security margin needed to reduce. In this paper, we propose AdvSGAN, which learns an image steganography scheme represented by a restricted neural coder from scratch by playing an adversarial game between the restricted neural coder and adversaries in the adversary model, i.e., In-Training and Out-Training adversaries. The restricted neural coder is implemented by two neural networks named SE and SD are to perform encoding and decoding transformation respectively, and a flexible restriction model to constrain the covers’ embedding space to improve the performance. The In-Training adversary is implemented by another network of discriminator named Eve in the GANs model. The Out-Training adversary is implemented by the targeted CNN based steganalyser. By playing adversarial game jointly with Eve, SE and SD are evolving to find the possible transformation. Meanwhile, by attacking the Out-Training adversary in a white-box setting, the obtained gradient provides instructive guidance for evolving to find the optimal steganographic scheme. Experiments demonstrate that the proposed steganographic scheme achieves better security performance even in high capacity against targeted steganalyser, and still has some transferability to other unaware steganalysers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Baluja S (2017) Hiding images in plain sight: Deep steganography. In: Advances in neural information processing systems, pp 2069–2079

  2. Bas P, Filler T, Pevnỳ T (2011) break our steganographic system: The ins and outs of organizing boss. In: International workshop on information hiding. Springer, pp 59–70

  3. Boehm B (2014) Stegexpose-a tool for detecting lsb steganography. arXiv:1410.6656

  4. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inform Forens Secur 14(5):1181–1193

    Article  Google Scholar 

  5. Chaumont M (2019) Deep learning in steganography and steganalysis from 2015 to 2018. arXiv:1904.01444

  6. Chen C, Shi YQ (2008) Jpeg image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International symposium on circuits and systems. IEEE, pp 3029–3032

  7. Cogranne R, Sedighi V, Fridrich J, Pevnỳ T (2015) Is ensemble classifier needed for steganalysis in high-dimensional feature spaces?. In: 2015 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 1–6

  8. Denemark T, Fridrich J, Holub V (2014) Further study on the security of s-uniward. In: Media watermarking, security, and forensics 2014. International society for optics and photonics, vol 9028, p 902805

  9. Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random lsb embedding in continuous-tone images. In: Proceedings. International conference on image processing, vol 3. IEEE, pp 641–644

  10. Fridrich J (2012) Kodovsky: Rich models for steganalysis of digital images. Information Forensics and Security, IEEE Transactions on

  11. Fridrich J (2020) Steganographicalgorithms.[Online].Available: http://dde.binghamton.edu/download/stegoalgorithms/

  12. Fridrich J, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Proceedings of the 2001 workshop on Multimedia and security: New challenges, pp 27–30

  13. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inform Forens Secur 7(3):868–882

    Article  Google Scholar 

  14. Girod B (1993) What’s wrong with mean-squared error? Digit Images Human Vision 207–220

  15. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672–2680

  16. Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572

  17. Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of wasserstein gans. In: Advances in neural information processing systems, pp 5767–5777

  18. Hayes J, Danezis G (2017) Generating steganographic images via adversarial training. In: Advances in neural information processing systems, pp 1954–1963

  19. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, pp 234–239

  20. Holub V, Fridrich J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inform Secur 2014 (1):1

    Article  Google Scholar 

  21. Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980

  22. Kodovsky J, Fridrich HV (2012) Ensemble classifiers for steganalysis of digital media. Inform Forens Secur IEEE Transactions on 7(2):432–444

    Article  Google Scholar 

  23. Kouider S, Chaumont M, Puech W (2013) Adaptive steganography by oracle (aso). In: 2013 IEEE International conference on multimedia and expo (ICME). IEEE, pp 1–6

  24. Kurakin A, Goodfellow I, Bengio S (2016) Adversarial examples in the physical world. arXiv:1607.02533

  25. Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. J Inform Hiding Multimed Signal Process 2(2):142–172

    Google Scholar 

  26. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on lsb matching revisited. IEEE Trans Inform Forens Secur 5(2):201–214

    Article  Google Scholar 

  27. Mielikainen J (2006) Lsb matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  28. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans inform Forens Secur 5(2):215–224

    Article  Google Scholar 

  29. Pevnỳ T., Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: International workshop on information hiding. Springer, pp 161–177

  30. Simmons GJ (1984) The prisoners’ problem and the subliminal channel. In: Advances in cryptology. Springer, pp 51–67

  31. Tang W, Li B, Tan S, Barni M, Huang J (2019) Cnn-based adversarial embedding for image steganography. IEEE Trans Inform Forens Secur 14 (8):2074–2087

    Article  Google Scholar 

  32. Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551

    Article  Google Scholar 

  33. Wang Z, Bovik AC, Lu L (2002) Why is image quality assessment so difficult?. In: 2002 IEEE International conference on acoustics, speech, and signal processing, vol 4. IEEE, pp IV–3313

  34. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  35. Westfeld A, Pfitzmann A (2000) Attacks on steganographic systems breaking the steganographic utilities ezstego, jsteg, steganos and s-toolsand some lessons learned

  36. Wu P, Yang Y, Li X (2018) Image-into-Image Steganography Using Deep Convolutional Network: 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II 792–802

  37. Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712

    Article  Google Scholar 

  38. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forens Secur 12(11):2545–2557

    Article  Google Scholar 

  39. Yedroudj M, Comby F, Chaumont M (2019) Steganography using a 3 player game. arXiv:1907.06956

  40. Zhang KA, Cuesta-Infante A, Xu L, Veeramachaneni K (2019) Steganogan: High capacity image steganography with gans. arXiv:1901.03892

  41. Zhang Y, Zhang W, Chen K, Liu J, Liu Y, Yu N (2018) Adversarial examples against deep neural network based steganalysis. In: Proceedings of the 6th ACM Workshop on information hiding and multimedia security, pp 67–72

  42. Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the european conference on computer vision (ECCV), pp 657–672

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingyu Fan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, L., Fan, M. & Liu, D. AdvSGAN: Adversarial image Steganography with adversarial networks. Multimed Tools Appl 80, 25539–25555 (2021). https://doi.org/10.1007/s11042-021-10904-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10904-1

Keywords

Navigation