skip to main content
10.1145/3664647.3681330acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography

Published: 28 October 2024 Publication History

Abstract

Deep steganography is a technique that imperceptibly hides secret information into image by neural networks. Existing networks consist of two components, including a hiding component for information hiding and an adversary component for countering against steganalyzers. However, these two components are two ends of the seesaw, and it is difficult to balance the tradeoff between message extraction accuracy and security performance by joint optimization. To address the issues, this paper proposes a steganographic method called AHDeS (Adversary-Hiding-Decoupled Steganography) under the Dig-and-Fill paradigm, wherein the adversary and hiding components can be decoupled into an optimization-based adversary module in the digging process and an INN-based hiding network in the filling process. Specfically in the training stage, the INN is first trained for acquiring the ability of message embedding. In the deployment stage, given the well-trained and fixed INN, the cover image is first iteratively optimized for enhancing the security performance against steganalyzers, followed by the actual message embedding by the INN. Owing to the reversibility of the INN, security performance can be enhanced without sacrificing message extraction accuracy. Experimental results show that AHDeS can achieve the state-of-the-art security performance and visual quality while maintaining satisfied message extraction accuracy.

References

[1]
Shumeet Baluja. 2017. Hiding images in plain sight: Deep steganography. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS). 2066--2076.
[2]
Solène Bernard, Patrick Bas, John Klein, and Tomas Pevny. 2020. Explicit optimization of min max steganographic game. IEEE Transactions on Information Forensics and Security, Vol. 16 (2020), 812--823.
[3]
Benedikt Boehm. 2014. Stegexpose-A tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656 (2014).
[4]
Mehdi Boroumand, Mo Chen, and Jessica Fridrich. 2018. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, Vol. 14, 5 (2018), 1181--1193.
[5]
Kejiang Chen, Hang Zhou, Hanqing Zhao, Dongdong Chen, Weiming Zhang, and Nenghai Yu. 2021. Distribution-preserving steganography based on text-to-speech generative models. IEEE Transactions on Dependable and Secure Computing, Vol. 19, 5 (2021), 3343--3356.
[6]
Xiaoqing Deng, Bolin Chen, Weiqi Luo, and Da Luo. 2019. Fast and effective global covariance pooling network for image steganalysis. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 230--234.
[7]
Laurent Dinh, David Krueger, and Yoshua Bengio. 2014. Nice: Non-linear independent components estimation. arXiv preprint arXiv:1410.8516 (2014).
[8]
Laurent Dinh, Jascha Sohl-Dickstein, and Samy Bengio. 2016. Density estimation using real nvp. arXiv preprint arXiv:1605.08803 (2016).
[9]
Tomávs Filler, Jan Judas, and Jessica Fridrich. 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, Vol. 6, 3 (2011), 920--935.
[10]
Jessica Fridrich and Tomas Filler. 2007. Practical methods for minimizing embedding impact in steganography. In Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX. 13--27.
[11]
Jessica Fridrich and Jan Kodovskỳ. 2013. Multivariate Gaussian model for designing additive distortion for steganography. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 2949--2953.
[12]
Zhenyu Guan, Junpeng Jing, Xin Deng, Mai Xu, Lai Jiang, Zhou Zhang, and Yipeng Li. 2022. DeepMIH: Deep invertible network for multiple image hiding. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 45, 1 (2022), 372--390.
[13]
Linjie Guo, Jiangqun Ni, and Yun Qing Shi. 2014. Uniform embedding for efficient JPEG steganography. IEEE Transactions on Information Forensics and Security, Vol. 9, 5 (2014), 814--825.
[14]
Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS). 1951--1960.
[15]
Vojtvech Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In Proceedings of the IEEE International Workshop on Information Forensics and Security (WIFS). 234--239.
[16]
Junpeng Jing, Xin Deng, Mai Xu, Jianyi Wang, and Zhenyu Guan. 2021. Hinet: Deep image hiding by invertible network. In Proceedings of the IEEE International Conference on Computer Vision (ICCV). 4733--4742.
[17]
Durk P Kingma and Prafulla Dhariwal. 2018. Glow: Generative flow with invertible 1x1 convolutions. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS). 10236--10245.
[18]
Yuhang Lan, Fei Shang, Jianhua Yang, Xiangui Kang, and Enping Li. 2023. Robust image steganography: Hiding messages in frequency coefficients. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI). 14955--14963.
[19]
Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. 2014. A new cost function for spatial image steganography. In Proceedings of the IEEE International Conference on Image Processing (ICIP). 4206--4210.
[20]
Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In Proceedings of the European Conference on Computer Vision (ECCV). 740--755.
[21]
Shao-Ping Lu, Rong Wang, Tao Zhong, and Paul L Rosin. 2021. Large-capacity image steganography based on invertible neural networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 10816--10825.
[22]
Rui Ma, Mengxi Guo, Yi Hou, Fan Yang, Yuan Li, Huizhu Jia, and Xiaodong Xie. 2022. Towards blind watermarking: Combining invertible and non-invertible mechanisms. In Proceedings of the ACM International Conference on Multimedia (MM). 1532--1542.
[23]
Xianbo Mo, Shunquan Tan, Bin Li, and Jiwu Huang. 2021. MCTSteg: A Monte Carlo tree search-based reinforcement learning framework for universal non-additive steganography. IEEE Transactions on Information Forensics and Security, Vol. 16 (2021), 4306--4320.
[24]
Xianbo Mo, Shunquan Tan, Weixuan Tang, Bin Li, and Jiwu Huang. 2023. ReLOAD: Using reinforcement learning to optimize asymmetric distortion for additive steganography. IEEE Transactions on Information Forensics and Security, Vol. 18 (2023), 1524--1538.
[25]
Jingxuan Tan, Xin Liao, Jiate Liu, Yun Cao, and Hongbo Jiang. 2021. Channel attention image steganography with generative adversarial networks. IEEE Transactions on Network Science and Engineering, Vol. 9, 2 (2021), 888--903.
[26]
Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, and Jiwu Huang. 2019. CNN-based adversarial embedding for image steganography. IEEE Transactions on Information Forensics and Security, Vol. 14, 8 (2019), 2074--2087.
[27]
Weixuan Tang, Shunquan Tan, Bin Li, and Jiwu Huang. 2017. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters, Vol. 24, 10 (2017), 1547--1551.
[28]
Tycho FA van der Ouderaa and Daniel E Worrall. 2019. Reversible gans for memory-efficient image-to-image translation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 4720--4728.
[29]
Yaolong Wang, Mingqing Xiao, Chang Liu, Shuxin Zheng, and Tie-Yan Liu. 2020. Modeling lost information in lossy image compression. arXiv preprint arXiv:2006.11999 (2020).
[30]
Shaowei Weng, Mengfei Chen, Lifang Yu, and Shiyao Sun. 2022. Lightweight and effective deep image steganalysis network. IEEE Signal Processing Letters, Vol. 29 (2022), 1888--1892.
[31]
Mingqing Xiao, Shuxin Zheng, Chang Liu, Yaolong Wang, Di He, Guolin Ke, Jiang Bian, Zhouchen Lin, and Tie-Yan Liu. 2020. Invertible image rescaling. In Proceedings of the European Conference on Computer Vision (ECCV). 126--144.
[32]
Guanshuo Xu, Han-Zhou Wu, and Yun Q Shi. 2016. Ensemble of CNNs for steganalysis: An empirical study. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. 103--107.
[33]
Jianhua Yang, Danyang Ruan, Jiwu Huang, Xiangui Kang, and Yun-Qing Shi. 2019. An embedding cost learning framework using GAN. IEEE Transactions on Information Forensics and Security, Vol. 15 (2019), 839--851.
[34]
Chong Yu. 2020. Attention based data hiding with generative adversarial networks. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI). 1120--1128.
[35]
Chaoning Zhang, Philipp Benz, Adil Karjauv, Geng Sun, and In So Kweon. 2020. UDH: Universal deep hiding for steganography, watermarking, and light field messaging. In Proceedings of the Conference on Neural Information Processing Systems (NeurIPS). 10223--10234.
[36]
Kevin Alex Zhang, Alfredo Cuesta-Infante, Lei Xu, and Kalyan Veeramachaneni. 2019. SteganoGAN: High capacity image steganography with GANs. arXiv preprint arXiv:1901.03892 (2019).
[37]
Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. 2018. Hidden: Hiding data with deep networks. In Proceedings of the European Conference on Computer Vision (ECCV). 657--672.

Index Terms

  1. Dig a Hole and Fill in Sand: Adversary and Hiding Decoupled Steganography

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MM '24: Proceedings of the 32nd ACM International Conference on Multimedia
      October 2024
      11719 pages
      ISBN:9798400706868
      DOI:10.1145/3664647
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 October 2024

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. information hiding
      2. invertible neural networks
      3. multimedia steganography

      Qualifiers

      • Research-article

      Funding Sources

      • National Key R&D Program of China

      Conference

      MM '24
      Sponsor:
      MM '24: The 32nd ACM International Conference on Multimedia
      October 28 - November 1, 2024
      Melbourne VIC, Australia

      Acceptance Rates

      MM '24 Paper Acceptance Rate 1,150 of 4,385 submissions, 26%;
      Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 51
        Total Downloads
      • Downloads (Last 12 months)51
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 20 Feb 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media