AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography

被引:1
作者
Fan, Haiju [1 ,2 ]
Jin, Changyuan [1 ,2 ]
Li, Ming [1 ,2 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Henan Prov Key Lab Educ Artificial Intelligence &, Xinxiang 453007, Peoples R China
关键词
steganography; adversarial attacks; generative adversarial network (GAN); information security;
D O I
10.3390/e27030282
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant threat to traditional steganography. To address this, we propose AGASI, a GAN-based approach for strengthening adversarial image steganography. This method employs an encoder as the generator in conjunction with a discriminator to form a generative adversarial network (GAN), thereby enhancing the robustness of stego-images against steganalysis tools. Additionally, the GAN framework reduces the gap between the original secret image and the extracted image, while the decoder effectively extracts the secret image from the stego-image, achieving the goal of image privacy protection. Experimental results demonstrate that the AGASI method not only ensures high-quality secret images but also effectively reduces the accuracy of neural network classifiers, inducing misclassifications and significantly increasing the embedding capacity of the steganography system. For instance, under PGD attack, the adversarial stego-images generated by the GAN, at higher disturbance levels, successfully maintain the quality of the secret image while achieving an 84.73% misclassification rate in neural network detection. Compared to images with the same visual quality, our method increased the misclassification rate by 23.31%.
引用
收藏
页数:27
相关论文
共 38 条
[1]  
Baluja S, 2017, ADV NEUR IN, V30
[2]  
Banik Barnali Gupta, 2019, Emerging Technologies in Data Mining and Information Security. Proceedings of IEMIS 2018. Advances in Intelligent Systems and Computing (AISC 814), P175, DOI 10.1007/978-981-13-1501-5_15
[3]  
Chen L., 2024, Pattern Recognit, V123, P108
[4]  
Ghamizi M., 2020, IEEE Access, V8, P125345
[5]  
Ghamizi S, 2019, Arxiv, DOI arXiv:1912.01487
[6]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672
[7]   An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques [J].
Hameed, Mohamed Abdel ;
Hassaballah, M. ;
Aly, Saleh ;
Awad, Ali Ismail .
IEEE ACCESS, 2019, 7 :185189-185204
[8]   Densely Connected Convolutional Networks [J].
Huang, Gao ;
Liu, Zhuang ;
van der Maaten, Laurens ;
Weinberger, Kilian Q. .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :2261-2269
[9]  
Goodfellow IJ, 2015, Arxiv, DOI [arXiv:1412.6572, DOI 10.48550/ARXIV.1412.6572]
[10]   Adv-watermark: A Novel Watermark Perturbation for Adversarial Examples [J].
Jia, Xiaojun ;
Wei, Xingxing ;
Cao, Xiaochun ;
Han, Xiaoguang .
MM '20: PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, 2020, :1579-1587