skip to main content
10.1145/3581783.3612514acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model

Published: 27 October 2023 Publication History

Abstract

Image steganography is the technology of concealing secret messages within an image. Recently, generative image steganography has been developed, which conceals secret messages during image generation. However, existing generative image steganography schemes are often criticized for their poor steganographic capacity and extraction accuracy. To ensure secure and dependable communication, we propose a novel generative image steganography based on the denoising diffusion probabilistic model, called StegaDDPM. StegaDDPM utilizes the probability distribution between the intermediate state and generated image in the reverse process of the diffusion model. The secret message is hidden in the generated image through message sampling, which follows the same probability distribution as normal generation. The receiver uses two shared random seeds to reproduce the reverse process and accurately extract secret data. Experimental results show that StegaDDPM outperforms state-of-the-art methods in terms of steganographic capacity, extraction accuracy, and security. In addition, it can securely conceal and accurately extract secret messages up to 9 bits per pixel.

Supplemental Material

MP4 File
Presentation Video

References

[1]
Shumeet Baluja. 2017. Hiding images in plain sight: Deep steganography. Advances in neural information processing systems 30 (2017).
[2]
Mehdi Boroumand, Mo Chen, and Jessica Fridrich. 2018. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 14, 5 (2018), 1181--1193.
[3]
Christian Cachin. 1998. An information-theoretic model for steganography. In Information Hiding: Second International Workshop, IH'98 Portland, Oregon, USA, April 14-17, 1998 Proceedings. Springer, 306--318.
[4]
Jooyoung Choi, Sungwon Kim, Yonghyun Jeong, Youngjune Gwon, and Sungroh Yoon. 2021. Ilvr: Conditioning method for denoising diffusion probabilistic models. arXiv preprint arXiv:2108.02938 (2021).
[5]
Yunjey Choi, Youngjung Uh, Jaejun Yoo, and Jung-Woo Ha. 2020. Stargan v2: Diverse image synthesis for multiple domains. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 8188--8197.
[6]
Florinel-Alin Croitoru, Vlad Hondru, Radu Tudor Ionescu, and Mubarak Shah. 2023. Diffusion models in vision: A survey. IEEE Transactions on Pattern Analysis and Machine Intelligence (2023).
[7]
Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion models beat gans on image synthesis. Advances in Neural Information Processing Systems 34 (2021), 8780--8794.
[8]
Tomá? Filler, Jan Judas, and Jessica Fridrich. 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security 6, 3 (2011), 920--935.
[9]
Jessica Fridrich. 2009. Steganography in digital media: principles, algorithms, and applications. Cambridge University Press.
[10]
Zhenyu Guan, Junpeng Jing, Xin Deng, Mai Xu, Lai Jiang, Zhou Zhang, and Yipeng Li. 2022. DeepMIH: Deep Invertible Network for Multiple Image Hiding. IEEE Transactions on Pattern Analysis and Machine Intelligence (2022).
[11]
Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. Advances in neural information processing systems 30 (2017).
[12]
Jonathan Ho, Ajay Jain, and Pieter Abbeel. 2020. Denoising diffusion probabilistic models. Advances in Neural Information Processing Systems 33 (2020), 6840--6851.
[13]
Vojtěch Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, 234--239.
[14]
Vojtěch Holub, Jessica Fridrich, and Tomá? Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014, 1 (2014), 1--13.
[15]
Donghui Hu, Liang Wang, Wenjie Jiang, Shuli Zheng, and Bin Li. 2018. A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6 (2018), 38303--38314.
[16]
Junpeng Jing, Xin Deng, Mai Xu, Jianyi Wang, and Zhenyu Guan. 2021. HiNet: deep image hiding by invertible network. In Proceedings of the IEEE/CVF International Conference on Computer Vision. 4733--4742.
[17]
Tero Karras, Samuli Laine, and Timo Aila. 2019. A style-based generator architecture for generative adversarial networks. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 4401--4410.
[18]
Varsha Kishore, Xiangyu Chen, Yan Wang, Boyi Li, and Kilian Q Weinberger. 2021. Fixed Neural Network Steganography: Train the images, not the network. In International Conference on Learning Representations.
[19]
Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2014. A new cost function for spatial image steganography. In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 4206--4210.
[20]
Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, and Jiwu Huang. 2015. A strategy of clustering modification directions in spatial image steganography. IEEE Transactions on Information Forensics and Security 10, 9 (2015), 1905--1917.
[21]
Jun Li, Ke Niu, Liwei Liao, Lijie Wang, Jia Liu, Yu Lei, and Minqing Zhang. 2020. A generative steganography method based on wgan-gp. In International Conference on Artificial Intelligence and Security. Springer, 386--397.
[22]
Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Junshan Tan, and Yuanjing Luo. 2020. Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. Knowledge-Based Systems 192 (2020), 105375.
[23]
Xiyao Liu, Ziping Ma, Junxing Ma, Jian Zhang, Gerald Schaefer, and Hui Fang. 2022. Image Disentanglement Autoencoder for Steganography Without Embedding. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2303--2312.
[24]
Shao-Ping Lu, Rong Wang, Tao Zhong, and Paul L Rosin. 2021. Large-capacity image steganography based on invertible neural networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 10816--10825.
[25]
Jarno Mielikainen. 2006. LSB matching revisited. IEEE signal processing letters 13, 5 (2006), 285--287.
[26]
Wenwen Pan, Yanling Yin, Xinchao Wang, Yongcheng Jing, and Mingli Song. 2021. Seek-and-hide: adversarial steganography via deep reinforcement learning. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 11 (2021), 7871--7884.
[27]
Tomá? Pevny, Tomá? Filler, and Patrick Bas. 2010. Using high-dimensional image models to perform highly undetectable steganography. In International workshop on information hiding. Springer, 161--177.
[28]
Jascha Sohl-Dickstein, Eric Weiss, Niru Maheswaranathan, and Surya Ganguli. 2015. Deep unsupervised learning using nonequilibrium thermodynamics. In International Conference on Machine Learning. PMLR, 2256--2265.
[29]
Matthew Tancik, Ben Mildenhall, and Ren Ng. 2020. Stegastamp: Invisible hyperlinks in physical photographs. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2117--2126.
[30]
Weixuan Tang, Bin Li, Mauro Barni, Jin Li, and Jiwu Huang. 2020. An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Transactions on Information Forensics and Security 16 (2020), 952--967.
[31]
Weixuan Tang, Shunquan Tan, Bin Li, and Jiwu Huang. 2017. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters 24, 10 (2017), 1547--1551.
[32]
Ron G Van Schyndel, Andrew Z Tirkel, and Charles F Osborne. 1994. A digital watermark. In Proceedings of 1st international conference on image processing, Vol. 2. IEEE, 86--90.
[33]
Yaofei Wang, Weiming Zhang, Weixiang Li, Xinzhi Yu, and Nenghai Yu. 2019. Non-additive cost functions for color image steganography based on inter-channel correlations and differences. IEEE Transactions on Information Forensics and Security 15 (2019), 2081--2095.
[34]
Zihan Wang, Neng Gao, Xin Wang, Xuexin Qu, and Linghui Li. 2018. SSte-GAN: Self-learning steganography based on generative adversarial networks. In International Conference on Neural Information Processing. Springer, 253--264.
[35]
Ping Wei, Sheng Li, Xinpeng Zhang, Ge Luo, Zhenxing Qian, and Qing Zhou. 2022. Generative Steganography Network. In Proceedings of the 30th ACM International Conference on Multimedia. 1621--1629.
[36]
Ning Wu, Poli Shang, Jin Fan, Zhongliang Yang, Weibo Ma, and Zhenru Liu. 2019. Research on coverless text steganography based on single bit rules. In Journal of Physics: Conference Series, Vol. 1237. IOP Publishing, 022077.
[37]
Youmin Xu, Chong Mou, Yujie Hu, Jingfen Xie, and Jian Zhang. 2022. Robust Invertible Image Steganography. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 7875--7884.
[38]
Jianhua Yang, Danyang Ruan, Xiangui Kang, and Yun-Qing Shi. 2019. Towards automatic embedding cost learning for JPEG steganography. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 37--46.
[39]
Kuan Yang, Kejiang Chen, Weiming Zhang, and Nenghai Yu. 2018. Provably secure generative steganography based on autoregressive model. In International Workshop on Digital Watermarking. Springer, 55--68.
[40]
Jian Ye, Jiangqun Ni, and Yang Yi. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security 12, 11 (2017), 2545--2557.
[41]
Weike You, Hong Zhang, and Xianfeng Zhao. 2020. A Siamese CNN for image steganalysis. IEEE Transactions on Information Forensics and Security 16 (2020), 291--306.
[42]
Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li, and Zhong-qiu Zhao. 2021. An improved steganography without embedding based on attention GAN. Peer-to-Peer Networking and Applications 14, 3 (2021), 1446--1457.
[43]
Fisher Yu, Ari Seff, Yinda Zhang, Shuran Song, Thomas Funkhouser, and Jianxiong Xiao. 2015. Lsun: Construction of a large-scale image dataset using deep learning with humans in the loop. arXiv preprint arXiv:1506.03365 (2015).
[44]
Weiming Zhang, Zhuo Zhang, Lili Zhang, Hanyi Li, and Nenghai Yu. 2016. Decomposing joint distortion for adaptive steganography. IEEE Transactions on Circuits and Systems for Video Technology 27, 10 (2016), 2274--2280.
[45]
Xiang Zhang, Fei Peng, and Min Long. 2018. Robust coverless image steganography based on DCT and LDA topic classification. IEEE Transactions on Multimedia 20, 12 (2018), 3223--3238.
[46]
Zhili Zhou, Yuecheng Su, Jin Li, Keping Yu, QM Jonathan Wu, Zhangjie Fu, and Yunqing Shi. 2022. Secret-to-Image Reversible Transformation for Generative Steganography. IEEE Transactions on Dependable and Secure Computing (2022).
[47]
Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, and Xingming Sun. 2015. Coverless image steganography without embedding. In International Conference on Cloud Computing and Security. Springer, 123--132.
[48]
Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. Hidden: Hiding data with deep networks. In Proceedings of the European conference on computer vision (ECCV). 657--672.

Cited By

View all
  • (2025)Mutual Information-Optimized Steganalysis for Generative SteganographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.353908920(1852-1865)Online publication date: 2025
  • (2024)A Robust joint coverless image steganography scheme based on two independent modulesCybersecurity10.1186/s42400-024-00299-57:1Online publication date: 7-Dec-2024
  • (2024)LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion ModelsProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681635(3001-3009)Online publication date: 28-Oct-2024
  • Show More Cited By

Index Terms

  1. StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MM '23: Proceedings of the 31st ACM International Conference on Multimedia
      October 2023
      9913 pages
      ISBN:9798400701085
      DOI:10.1145/3581783
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. diffusion model
      2. generative image steganography
      3. large-capacity

      Qualifiers

      • Research-article

      Funding Sources

      • Anhui Science and Technology Key Special Program
      • the Natural Science Foundation of China

      Conference

      MM '23
      Sponsor:
      MM '23: The 31st ACM International Conference on Multimedia
      October 29 - November 3, 2023
      Ottawa ON, Canada

      Acceptance Rates

      Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)558
      • Downloads (Last 6 weeks)50
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Mutual Information-Optimized Steganalysis for Generative SteganographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2025.353908920(1852-1865)Online publication date: 2025
      • (2024)A Robust joint coverless image steganography scheme based on two independent modulesCybersecurity10.1186/s42400-024-00299-57:1Online publication date: 7-Dec-2024
      • (2024)LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion ModelsProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681635(3001-3009)Online publication date: 28-Oct-2024
      • (2024)Pulsar: Secure Steganography for Diffusion ModelsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690218(4703-4717)Online publication date: 2-Dec-2024
      • (2024)Constructing an Intrinsically Robust Steganalyzer via Learning Neighboring Feature Relationships and Self-Adversarial AdjustmentIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347065119(9390-9405)Online publication date: 1-Jan-2024
      • (2024)Conditional Diffusion Model for Image Steganography2024 2nd International Conference on Algorithm, Image Processing and Machine Vision (AIPMV)10.1109/AIPMV62663.2024.10692262(219-224)Online publication date: 12-Jul-2024
      • (2024)Coverless Steganography for Face Recognition Based on Diffusion ModelIEEE Access10.1109/ACCESS.2024.347746912(148770-148782)Online publication date: 2024
      • (2024)PRISEngineering Applications of Artificial Intelligence10.1016/j.engappai.2024.108419133:PDOnline publication date: 24-Jul-2024
      • (2024)Robust Generative Steganography via Intermediate State Normal DistributionAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5603-2_34(416-426)Online publication date: 5-Aug-2024

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media