skip to main content
research-article

Enhancing Adversarial Embedding based Image Steganography via Clustering Modification Directions

Published: 18 September 2023 Publication History

Abstract

Image steganography is a technique used to conceal secret information within cover images without being detected. However, the advent of convolutional neural networks (CNNs) has threatened the security of image steganography. Due to the inherent properties of adversarial examples, adding perturbations to stego images can mislead the CNN-based image steganalysis, but it also easily leads to some errors when extracting secret information. Recently, some adversarial embedding methods have been proposed for improving image steganography security. In this work, we aim at furthering enhance the security of adversarial embedding-based image steganography by exploiting the strong correlation between adjacent pixels. Specifically, we divide the cover image into four non-overlapping parts for four-stage information embedding. During the adversarial embedding process, we cluster the modification directions of adjacent pixels and select only those with relatively larger amplitudes of gradients and smaller embedding costs to update their original embedding costs. Experimental results demonstrate that our proposed method can effectively fool targeted steganalyzers and outperform state-of-the-art techniques under different scenarios.

References

[1]
Patrick Bas, Tomáš Filler, and Tomáš Pevnỳ. 2011. “Break our steganographic system”: The ins and outs of organizing BOSS. In Proceedings of the International Workshop on Information Hiding. Springer, 59–70.
[2]
Patrick Bas and Teddy Furon. 2017. Image database of BOWS-2. Accessed: Jun 20 (2017), 2016–2017. [online] Available: http://bows2.ec-lille.fr/
[3]
Solène Bernard, Patrick Bas, John Klein, and Tomas Pevny. 2020. Explicit optimization of min max steganographic game. IEEE Transactions on Information Forensics and Security 16 (2020), 812–823.
[4]
Mehdi Boroumand, Mo Chen, and Jessica J. Fridrich. 2019. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 14, 5 (2019), 1181–1193.
[5]
Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In Proceedings of the 2017 IEEE Symposium on Security and Privacy. IEEE, 39–57.
[6]
Tomáš Denemark and Jessica Fridrich. 2015. Improving steganographic security by synchronizing the selection channel. In Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security. 5–14.
[7]
Tomás Denemark, Vahid Sedighi, Vojtech Holub, Rémi Cogranne, and Jessica J. Fridrich. 2014. Selection-channel-aware rich model for Steganalysis of digital images. 2014 IEEE International Workshop on Information Forensics and Security(2014), 48–53.
[8]
Xiaoqing Deng, Bolin Chen, Weiqi Luo, and Da Luo. 2019. Fast and effective global covariance pooling network for image steganalysis. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 230–234.
[9]
Tomáš Filler and Jessica Fridrich. 2010. Gibbs construction in steganography. IEEE Transactions on Information Forensics and Security 5, 4 (2010), 705–720.
[10]
Jessica Fridrich and Tomas Filler. 2007. Practical methods for minimizing embedding impact in steganography. In Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX. SPIE, 13–27.
[11]
Jessica J. Fridrich and Jan Kodovský. 2012. Rich models for steganalysis of digital images. IEEE Transactions on Information Forensics and Security 7, 3 (2012), 868–882.
[12]
Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Proceedings of the NIPS. 2672–2680.
[13]
Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. arXiv:1412.6572. Retrieved from https://arxiv.org/abs/1412.6572
[14]
Vojtech Holub and Jessica J. Fridrich. 2012. Designing steganographic distortion using directional filters. 2012 IEEE International Workshop on Information Forensics and Security(2012), 234–239.
[15]
Vojtech Holub, Jessica J. Fridrich, and Tomás Denemark. 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security 2014 (2014), 1–13.
[16]
Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2014. A new cost function for spatial image steganography. 2014 IEEE International Conference on Image Processing(2014), 4206–4210.
[17]
Bin Li, Ming Wang, Xiaolong Li, Shunquan Tan, and Jiwu Huang. 2015. A strategy of clustering modification directions in spatial image steganography. IEEE Transactions on Information Forensics and Security 10, 9 (2015), 1905–1917.
[18]
Minglin Liu, Weiqi Luo, Peijia Zheng, and Jiwu Huang. 2021. A new adversarial embedding method for enhancing image steganography. IEEE Transactions on Information Forensics and Security 16 (2021), 4621–4634.
[19]
Minglin Liu, Tingting Song, Weiqi Luo, Peijia Zheng, and Jiwu Huang. 2022. Adversarial steganography embedding via stego generation and selection. IEEE Transactions on Dependable and Secure Computing 3 (2022), 1–15. DOI:
[20]
Sai Ma, Xianfeng Zhao, and Yaqi Liu. 2019. Adaptive spatial steganography based on adversarial examples. Multimedia Tools and Applications 78, 22 (2019), 32503–32522.
[21]
Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2017. Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083. Retrieved from https://arxiv.org/abs/1706.06083
[22]
Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016. Transferability in machine learning: From phenomena to black-box attacks using adversarial samples. arXiv:1605.07277. Retrieved from https://arxiv.org/abs/1605.07277
[23]
Nicolas Papernot, Patrick Mcdaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. 2016 IEEE European Symposium on Security and Privacy(2016), 372–387.
[24]
Tomáš Pevnỳ, Tomáš Filler, and Patrick Bas. 2010. Using high-dimensional image models to perform highly undetectable steganography. In Proceedings of the International Workshop on Information Hiding. Springer, 161–177.
[25]
Tomáš Pevnỳ and Jessica Fridrich. 2008. Benchmarking for steganography. In Proceedings of the Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19–21, 2008, Revised Selected Papers 10. Springer, 251–267.
[26]
Vahid Sedighi, Rémi Cogranne, and Jessica J. Fridrich. 2016. Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security 11, 2 (2016), 221–234.
[27]
Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, and Xiaoyu Zhang. 2017. SSGAN: Secure steganography based on generative adversarial networks. In Proceedings of the Pacific Rim Conference on Multimedia. Springer, 534–544.
[28]
Wuzhen Shi and Shaohui Liu. 2022. Hiding message using a cycle generative adversarial network. ACM Transactions on Multimedia Computing, Communications, and Applications 18, 3s (2022), 1–15.
[29]
T. Filler, J. Judas, and J. Fridrich. 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security 6, 3 (2011), 920–935.
[30]
Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, and Jiwu Huang. 2019. CNN-based adversarial embedding for image steganography. IEEE Transactions on Information Forensics and Security 14, 8 (2019), 2074–2087.
[31]
Weixuan Tang, Shunquan Tan, Bin Li, and Jiwu Huang. 2017. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters 24, 10 (2017), 1547–1551.
[32]
Denis Volkhonskiy, Ivan Nazarov, and Evgeny Burnaev. 2017. Steganographic Generative Adversarial Networks. 12th International Conference on Machine Vision (ICMV’19). Vol. 11433 (2017), 991–1005.
[33]
W. Bender, D. Gruhl, and N. Morimoto. 1996. Techniques for data hiding. IBM Systems Journal 35, 9 (1996), 313–336.
[34]
Guanshuo Xu, Han Wu, and Yun Qing Shi. 2016. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters 23, 5 (2016), 708–712.
[35]
Jianhua Yang, Danyang Ruan, Jiwu Huang, Xiangui Kang, and Yun-Qing Shi. 2019. An embedding cost learning framework using GAN. IEEE Transactions on Information Forensics and Security 15 (2019), 839–851.
[36]
Jian Ye, Jiangqun Ni, and Yang Yi. 2017. Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security 12, 11 (2017), 2545–2557.
[37]
Yiwei Zhang, Weiming Zhang, Kejiang Chen, Jiayang Liu, Yujia Liu, and Nenghai Yu. 2018. Adversarial examples against deep neural network based steganalysis. In Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security. 67–72.

Cited By

View all
  • (2025)Image Semantic Steganography: A Way to Hide Information in Semantic CommunicationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.347668935:2(1951-1960)Online publication date: 1-Feb-2025
  • (2024)Network Information Security Monitoring Under Artificial Intelligence EnvironmentInternational Journal of Information Security and Privacy10.4018/IJISP.34503818:1(1-25)Online publication date: 21-Jun-2024
  • (2024)Heterogeneous Fusion and Integrity Learning Network for RGB-D Salient Object DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365647620:7(1-24)Online publication date: 15-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 1
January 2024
639 pages
EISSN:1551-6865
DOI:10.1145/3613542
  • Editor:
  • Abdulmotaleb El Saddik
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 September 2023
Online AM: 03 June 2023
Accepted: 22 May 2023
Revised: 04 April 2023
Received: 02 August 2022
Published in TOMM Volume 20, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Image steganography
  2. adversarial embedding
  3. convolutional neural network
  4. steganalysis

Qualifiers

  • Research-article

Funding Sources

  • National Natural Science Foundation of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)133
  • Downloads (Last 6 weeks)7
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Image Semantic Steganography: A Way to Hide Information in Semantic CommunicationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.347668935:2(1951-1960)Online publication date: 1-Feb-2025
  • (2024)Network Information Security Monitoring Under Artificial Intelligence EnvironmentInternational Journal of Information Security and Privacy10.4018/IJISP.34503818:1(1-25)Online publication date: 21-Jun-2024
  • (2024)Heterogeneous Fusion and Integrity Learning Network for RGB-D Salient Object DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365647620:7(1-24)Online publication date: 15-May-2024
  • (2024)MultiRider: Enabling Multi-Tag Concurrent OFDM Backscatter by Taming In-band InterferenceProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661862(292-303)Online publication date: 3-Jun-2024
  • (2024)Driver intention prediction based on multi-dimensional cross-modality information interactionMultimedia Systems10.1007/s00530-024-01282-330:2Online publication date: 15-Mar-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media