A High-Performance Image Steganography Scheme Based on Dual-Adversarial Networks

被引:1
作者
Ma, Bin [1 ]
Li, Kun [1 ]
Xu, Jian [2 ]
Wang, Chunpeng [1 ]
Li, Xiaolong [3 ]
机构
[1] Sch Qilu Univ Technol, Shandong Acad Sci, Jinan 250353, Peoples R China
[2] Shandong Univ Finance & Econ, Jinan 250014, Peoples R China
[3] Sch Beijing Jiaotong Univ, Beijing 100044, Peoples R China
基金
中国国家自然科学基金;
关键词
Steganography; generative adversarial networks; steganalysis; adversarial image; channel attention;
D O I
10.1109/LSP.2024.3440176
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter proposes a high-performance image steganography scheme based on dual-adversarial networks to enhance the performance of secret message hiding. According to the characteristics of generative adversarial networks, a dual-adversarial steganography scheme is devised to improve both the visual quality and the steganalysis resistance capability of the stego image. In the first adversarial block, the U-net structure is employed to reconstruct the original image as the generated image, and the adversarial noise is imperceptibly embedded into the generated image to produce the adversarial image that is most suitable for data hiding. In the second adversarial block, secret messages are undetectably embedded into the adversarial image under the confrontation of multiple steganalysis networks. Moreover, a multiple-channel attention module is introduced to enhance the performance of the adversarial image and accelerate the convergence speed of the proposed dual-adversarial networks. Additionally, the MSE loss is employed to minimize the divergence between the original and the adversarial image. Experimental results indicate that the average PSNR of the adversarial images reach 41 dB, and the detection probability is 2.79% lower than that of other advanced schemes. The proposed scheme outperforms its counterparts in terms of performance.
引用
收藏
页码:2655 / 2659
页数:5
相关论文
共 24 条
  • [1] Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
  • [2] Deep Residual Network for Steganalysis of Digital Images
    Boroumand, Mehdi
    Chen, Mo
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1181 - 1193
  • [3] Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
    Filler, Tomas
    Judas, Jan
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 920 - 935
  • [4] Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
  • [5] Uniform Embedding for Efficient JPEG Steganography
    Guo, Linjie
    Ni, Jiangqun
    Shi, Yun Qing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (05) : 814 - 825
  • [6] Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
    Hemalatha, J.
    Sekar, M.
    Kumar, Chandan
    Gutub, Adnan
    Sahu, Aditya Kumar
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [7] Hu J, 2018, PROC CVPR IEEE, P7132, DOI [10.1109/TPAMI.2019.2913372, 10.1109/CVPR.2018.00745]
  • [8] A New Adversarial Embedding Method for Enhancing Image Steganography
    Liu, Minglin
    Luo, Weiqi
    Zheng, Peijia
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4621 - 4634
  • [9] A High-Performance Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments
    Ma, Bin
    Tao, Zhongquan
    Ma, Ruihe
    Wang, Chunpeng
    Li, Jian
    Li, Xiaolong
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (04) : 2763 - 2774
  • [10] Enhancing the security of image steganography via multiple adversarial networks and channel attention modules
    Ma, Bin
    Li, Kun
    Xu, Jian
    Wang, Chunpeng
    Li, Jian
    Zhang, Liwei
    [J]. DIGITAL SIGNAL PROCESSING, 2023, 141