[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Hiding Message Using a Cycle Generative Adversarial Network

Published: 01 November 2022 Publication History

Abstract

Training an image steganography is an unsupervised problem, because it is impossible to obtain an ideal supervised steganographic image corresponding to the cover image and secret message. Inspired by the success of cycle generative adversarial networks in unsupervised tasks such as style transfer, this article proposes to use a cycle generative adversarial network to solve the problem of unsupervised image steganography. Specifically, this article jointly trains five networks, i.e., a steganographic network, an inverse steganographic network, a hidden message reconstruction network, and two discriminative networks, which together constitute a hidden message cycle generative adversarial network (HCGAN). Compared with the recent image steganography based on generative adversative network, HCGAN provides more accurate supervised information, which makes the training process of HCGAN converge faster and the performance of the trained image steganography network is better. In addition, this article introduces an image steganographic network based on residual learning and shows that residual learning can effectively improve the performance of steganography. Furthermore, to the best of our knowledge, we are the first to propose an inverse steganographic network for eliminating steganographic message from steganographic images, which can be used to avoid steganographic message being discovered or acquired by a third party. The experimental results show that compared with the steganography based on generative adversarial network, the proposed HCGAN has a higher correct decoding rate, better visual quality of steganographic image, and higher secrecy.

References

[1]
Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mane, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viegas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, Xiaoqiang Zheng. 2015. TensorFlow: Large-scale machine learning on heterogeneous distributed systems. arXiv: Distributed, parallel, and Cluster Computing (2015). https://arxiv.org/abs/1603.04467.
[2]
Martin Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2016. TensorFlow: A system for large-scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI’16). USENIX Association, 265–283. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/abadi.
[3]
Alaa A. Jabbar Altaay, Shahrin Bin Sahib, and Mazdak Zamani. 2012. An introduction to image steganography techniques. In International Conference on Advanced Computer Science Applications and Technologies (ACSAT). IEEE, 122–126.
[4]
Chi-Kwong Chan and Lee-Ming Cheng. 2004. Hiding data in images by simple LSB substitution. Pattern Recog. 37, 3 (2004), 469–474.
[5]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Conference on Advances in Neural Information Processing Systems. 2672–2680.
[6]
Jamie Hayes and George Danezis. 2017. Generating steganographic images via adversarial training. In Conference on Advances in Neural Information Processing Systems. 1954–1963.
[7]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Conference on Computer Vision and Pattern Recognition. 770–778.
[8]
Vojtěch Holub and Jessica Fridrich. 2012. Designing steganographic distortion using directional filters. In IEEE International Workshop on Information Forensics and Security (WIFS). IEEE, 234–239.
[9]
Vojtech Holub and Jessica J. Fridrich. 2013. Digital image steganography using universal distortion. In ACM Workshop on Information Hiding and Multimedia Security. 59–68.
[10]
Donghui Hu, Liang Wang, Wenjie Jiang, Shuli Zheng, and Bin Li. 2018. A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6 (2018), 38303–38314.
[11]
Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International Conference on Machine Learning. 448–456.
[12]
Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros. 2017. Image-to-image translation with conditional adversarial networks. In IEEE Conference on Computer Vision and Pattern Recognition. 1125–1134.
[13]
Jiwon Kim, Jung Kwon Lee, and Kyoung Mu Lee. 2016. Accurate image super-resolution using very deep convolutional networks. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1646–1654.
[14]
Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).
[15]
Yann A. LeCun, Léon Bottou, Genevieve B. Orr, and Klaus-Robert Müller. 2012. Efficient backprop. In Neural Networks: Tricks of the Trade. Springer, 9–48.
[16]
Daniel Lerchhostalot and David Megias. 2016. Unsupervised steganalysis based on artificial training sets. Eng. Applic. Artif. Intell. 50 (2016), 45–59.
[17]
Bin Li, Shunquan Tan, Ming Wang, and Jiwu Huang. 2014. Investigation on cost assignment in spatial image steganography. IEEE Trans. Inf. Forens. Secur. 9, 8 (2014), 1264–1277.
[18]
Ziwei Liu, Ping Luo, Xiaogang Wang, and Xiaoou Tang. 2015. Deep learning face attributes in the wild. In Proceedings of the IEEE International Conference on Computer Vision. 3730–3738.
[19]
Andrew L. Maas, Awni Y. Hannun, Andrew Y. Ng, et al. 2013. Rectifier nonlinearities improve neural network acoustic models. In ICML Workshop on Deep Learning for Audio, Speech and Language Processing, Vol. 30. Citeseer.
[20]
Jarno Mielikainen. 2006. LSB matching revisited. IEEE Sig. Process. Lett. 13, 5 (2006), 285–287.
[21]
Tomáš Pevnỳ, Tomáš Filler, and Patrick Bas. 2010. Using high-dimensional image models to perform highly undetectable steganography. In International Workshop on Information Hiding. Springer, 161–177.
[22]
Yinlong Qian, Jing Dong, Wei Wang, and Tieniu Tan. 2016. Learning and transferring representations for image steganalysis using convolutional neural network. In IEEE International Conference on Image Processing (ICIP). IEEE, 2752–2756.
[23]
Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, and Xiaoyu Zhang. 2017. SSGAN: Secure steganography based on generative adversarial networks. In Pacific Rim Conference on Multimedia. 534–544.
[24]
Haichao Shi and Xiaoyu Zhang. 2018. Synchronization detection and recovery of steganographic messages with adversarial learning. arXiv preprint arXiv:1801.10365 (2018).
[25]
Deqing Sun, Stefan Roth, and Michael J. Black. 2014. A quantitative analysis of current practices in optical flow estimation and the principles behind them. Int. J. Comput. Vis. 106, 2 (2014), 115–137.
[26]
Yu Sun, Hao Zhang, Tao Zhang, and Ran Wang. 2019. Deep neural networks for efficient steganographic payload location. J. Real-time Image Process. 16, 3 (2019), 635–647.
[27]
Radu Timofte, Vincent De Smet, and Luc Van Gool. 2013. Anchored neighborhood regression for fast example-based super-resolution. In IEEE International Conference on Computer Vision. 1920–1927.
[28]
Radu Timofte, Vincent De Smet, and Luc Van Gool. 2014. A+: Adjusted anchored neighborhood regression for fast super-resolution. Asian Conf. Comput. Vis. 9006 (2014), 111–126.
[29]
Denis Volkhonskiy, Ivan Nazarov, and Evgeny Burnaev. 2020. Steganographic generative adversarial networks. In 12th International Conference on Machine Vision (ICMV), Vol. 11433. International Society for Optics and Photonics, 114333M.
[30]
Max Welling, Simon Osindero, and Geoffrey E. Hinton. 2002. Learning sparse topographic representations with products of student-t distributions. In Conference on Advances in Neural Information Processing Systems. 1383–1390.
[31]
Roman Zeyde, Michael Elad, and Matan Protter. 2010. On single image scale-up using sparse-representations. In International Conference on Curves and Surfaces. 711–730.
[32]
Richard Zhang, Phillip Isola, Alexei A. Efros, Eli Shechtman, and Oliver Wang. 2018. The unreasonable effectiveness of deep features as a perceptual metric. In IEEE Conference on Computer Vision and Pattern Recognition. 586–595.
[33]
Jiren Zhu, Russell Kaplan, Justin Johnson, and Fei-Fei Li. 2018. Hidden: Hiding data with deep networks. In European Conference on Computer Vision. 657–672.
[34]
Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A. Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In IEEE International Conference on Computer Vision. 2223–2232.

Cited By

View all
  • (2024)GSyncCode: Geometry Synchronous Hidden Code for One-step Photography DecodingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3706060Online publication date: 27-Nov-2024
  • (2024)Toward Long Form Audio-Visual Video UnderstandingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367207920:9(1-26)Online publication date: 7-Jun-2024
  • (2024)SNIPPET: A Framework for Subjective Evaluation of Visual Explanations Applied to DeepFake DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/366524820:8(1-29)Online publication date: 13-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 18, Issue 3s
October 2022
381 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/3567476
  • Editor:
  • Abdulmotaleb El Saddik
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2022
Online AM: 12 March 2022
Accepted: 03 November 2021
Revised: 18 August 2021
Received: 30 January 2021
Published in TOMM Volume 18, Issue 3s

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Steganography
  2. generative adversarial network
  3. cycle generative adversarial network
  4. residual learning
  5. inverse steganographic network

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • National Key Research and Development Program of China
  • National Science Foundation of China
  • Guangdong Basic and Applied Basic Research Foundation
  • Stable Support Plan for Shenzhen Higher Education Institutions

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)113
  • Downloads (Last 6 weeks)7
Reflects downloads up to 12 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)GSyncCode: Geometry Synchronous Hidden Code for One-step Photography DecodingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/3706060Online publication date: 27-Nov-2024
  • (2024)Toward Long Form Audio-Visual Video UnderstandingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/367207920:9(1-26)Online publication date: 7-Jun-2024
  • (2024)SNIPPET: A Framework for Subjective Evaluation of Visual Explanations Applied to DeepFake DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/366524820:8(1-29)Online publication date: 13-Jun-2024
  • (2024)Multimodal Score Fusion with Sparse Low-rank Bilinear Pooling for Egocentric Hand Action RecognitionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/365604420:7(1-22)Online publication date: 16-May-2024
  • (2024)Distributed Learning Mechanisms for Anomaly Detection in Privacy-Aware Energy Grid Management SystemsACM Transactions on Sensor Networks10.1145/3640341Online publication date: 17-Jan-2024
  • (2024)Pedestrian Attribute Recognition via Spatio-temporal Relationship Learning for Visual SurveillanceACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363262420:6(1-15)Online publication date: 8-Mar-2024
  • (2024)High invisibility image steganography with wavelet transform and generative adversarial networkExpert Systems with Applications10.1016/j.eswa.2024.123540249(123540)Online publication date: Sep-2024
  • (2023)A review of Content Adaptive Image Steganography methodsSignal and Data Processing10.61186/jsdp.20.3.14120:3(141-182)Online publication date: 1-Dec-2023
  • (2023)Relation with Free Objects for Action RecognitionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361759620:2(1-19)Online publication date: 18-Oct-2023
  • (2023)Attentional Composition Networks for Long-Tailed Human Action RecognitionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/360325320:1(1-18)Online publication date: 9-Jun-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media