VidaGAN: Adaptive GAN for image steganography

被引:1
作者
Ramandi, Vida Yousefi [1 ]
Fateh, Mansoor [4 ,1 ]
Rezvani, Mohsen [1 ]
机构
[1] Shahrood Univ Technol, Fac Comp Engn, Shahrood, Iran
关键词
image processing; steganography; INFORMATION HIDING ALGORITHM;
D O I
10.1049/ipr2.13177
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A recent approach to image steganography is to use deep learning. Mainly, convolutional neural networks can extract complex features and use them as patterns to combine hidden messages and images. Also, by using generative adversarial networks, it is possible to generate realistic and high-quality stego images without any noticeable artifacts. Previous methods suffered from challenges such as simple architecture, low network accuracy, imbalance between capacity and transparency, vanishing gradients, and low capacity. This study introduces a steganography framework named VidaGAN that utilizes deep learning techniques. The network being proposed is made up of three components: an encoder, a decoder, and a critic, and introduces a novel architecture and several innovations to address some of the unresolved challenges mentioned above. This study introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model. This neural network called VarIable aDAptive GAN (VidaGAN) achieved state-of-the-art status by reaching a hiding capacity of 3.9 bits per pixel in the DIV2K dataset. Furthermore, examination by the StegExpose steganalysis tool shows an AUC of 0.6, a suitable threshold for transparency. This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model. image
引用
收藏
页码:3329 / 3342
页数:14
相关论文
共 61 条
[1]   NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study [J].
Agustsson, Eirikur ;
Timofte, Radu .
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, :1122-1131
[2]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[3]   Highly transparent steganography model of speech signals using Efficient Wavelet Masking [J].
Ballesteros L, Dora M. ;
Moreno A, Juan M. .
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (10) :9141-9149
[4]  
Baluja S, 2017, ADV NEUR IN, V30
[5]  
Benedikt B., 2014, ARXIV
[6]  
Chen X., 2022, LEARNING ITERATIVE N
[7]   INVERTIBLE MOSAIC IMAGE HIDING NETWORK FOR VERY LARGE CAPACITY IMAGE STEGANOGRAPHY [J].
Chen, Zihan ;
Liu, Tianrui ;
Huang, Jun-Jie ;
Zhao, Wentao ;
Bi, Xing ;
Wang, Meng .
2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, :4520-4524
[8]  
Das Rig, 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science (NCETACS), P14, DOI 10.1109/NCETACS.2012.6203290
[9]  
Dumitrescu S, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P641, DOI 10.1109/ICIP.2002.1039052
[10]   Detection of LSB steganography via sample pair analysis [J].
Dumitrescu, S ;
Wu, XL ;
Wang, Z .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (07) :1995-2007