Constructing Immune-Cover for Improving Holistic Security of Spatial Adaptive Steganography

被引:0
作者
Chen, Yijing [1 ,2 ]
Wang, Hongxia [1 ,2 ]
Li, Wanjie [1 ,2 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610065, Peoples R China
[2] Sichuan Univ, Key Lab Data Protect & Intelligent Management, Minist Educ, Chengdu 610207, Peoples R China
基金
中国国家自然科学基金;
关键词
Steganography; Distortion; Security; Immune system; Antibodies; Artificial intelligence; Antigens; Adaptive steganography; artificial immune system; steganalysis; LEARNING FRAMEWORK; COST REASSIGNMENT; IMAGE;
D O I
10.1109/TDSC.2024.3376815
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The cover image with strong resistance against embedding distortion has promise for improving the holistic security of steganography. However, existing methods use the vulnerability of Convolutional Neural Network (CNN) to construct the enhanced cover which can only deceive the target CNN-based steganalyzer, but is not more suitable for steganography. When resisting steganalysis outside the target steganalyzer, its performance drops significantly. In this paper, we propose an immune-cover construction scheme via Artificial Immune System (AIS). By the association between the steganography and immune theory, we regard the cover as the organism, the distortion introduced by steganography as the pathogenic factor, and the immunoprocessing for optimizing the original cover as the antibody. Based on AIS, the optimal immunoprocessing is dynamically searched and performed on the original cover to construct an immune-cover which is most suitable for steganography. Besides, the proposed method carefully selects the immunoprocessing region to prevent artifacts, and guarantees the visual quality of the immune-cover through the constraint of the immunoprocessing intensity. Extensive experimental results demonstrate that the proposed immune-cover has much stronger resistance against embedding distortion compared with the related methods, thus significantly improving the holistic security of the adaptive steganography evaluated on both traditional and CNN-based steganalyzers.
引用
收藏
页码:5403 / 5419
页数:17
相关论文
共 48 条
  • [21] Goodfellow IJ, 2015, Arxiv, DOI arXiv:1412.6572
  • [22] Ensemble Classifiers for Steganalysis of Digital Media
    Kodovsky, Jan
    Fridrich, Jessica
    Holub, Vojtech
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 432 - 444
  • [23] Li B, 2014, IEEE IMAGE PROC, P4206, DOI 10.1109/ICIP.2014.7025854
  • [24] Constructing Immunized Stego-Image for Secure Steganography via Artificial Immune System
    Li, Wanjie
    Wang, Hongxia
    Chen, Yijing
    Abdullahi, Sani M.
    Luo, Jie
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 8320 - 8333
  • [25] Designing Near-Optimal Steganographic Codes in Practice Based on Polar Codes
    Li, Weixiang
    Zhang, Weiming
    Li, Li
    Zhou, Hang
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (07) : 3948 - 3962
  • [26] Perceptual visual quality metrics: A survey
    Lin, Weisi
    Kuo, C-C Jay
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2011, 22 (04) : 297 - 312
  • [27] Adversarial Steganography Embedding via Stego Generation and Selection
    Liu, Minglin
    Song, Tingting
    Luo, Weiqi
    Zheng, Peijia
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2375 - 2389
  • [28] A New Adversarial Embedding Method for Enhancing Image Steganography
    Liu, Minglin
    Luo, Weiqi
    Zheng, Peijia
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4621 - 4634
  • [29] Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning
    Luo, Jie
    He, Peisong
    Liu, Jiayong
    Wang, Hongxia
    Wu, Chunwang
    Chen, Yijing
    Li, Wanjie
    Li, Jiangchuan
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, ICME, 2023, : 49 - 54
  • [30] Improving security for image steganography using content-adaptive adversarial perturbations
    Luo, Jie
    He, Peisong
    Liu, Jiayong
    Wang, Hongxia
    Wu, Chunwang
    Yuan, Chao
    Xia, Qiang
    [J]. APPLIED INTELLIGENCE, 2023, 53 (12) : 16059 - 16076