Real image noise aware steganography with image denoising and generative adversarial network

被引:0
作者
Toguchi, Shinnosuke [1 ]
Miyata, Takamichi [1 ]
机构
[1] Chiba Inst Technol, 2-17-1 Tsudanuma, Narashino, Chiba 2750016, Japan
来源
IEICE NONLINEAR THEORY AND ITS APPLICATIONS | 2024年 / 15卷 / 04期
基金
日本学术振兴会;
关键词
image steganography; generative adversarial network; steganalysis; real image noise;
D O I
10.1587/nolta.15.737
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Image steganography is a technique for embedding secret messages in images. SteganoGAN, one of the previous methods, uses generative adversarial networks and achieves high payload when the input is a noise-free image. However, real images contain real image noise (RIN) generated during the image acquisition process, which can degrade the performance of SteganoGAN. We propose a RIN-aware image steganography that uses a real image denoising method as preprocessing and modifies the loss function of SteganoGAN. These modifications encourage the proposed method to embed a secret message that simulates RIN into a pseudo-noise-free image obtained by denoising. Experimental results show that the proposed method improves the trade-off between image quality and payload compared to the previous method. We validate the statistical and neural steganalysis and JPEG robustness, showing that the proposed method has reasonable detection avoidance capability and higher compression tolerance than the conventional methods.
引用
收藏
页码:737 / 749
页数:13
相关论文
共 32 条
[1]   A High-Quality Denoising Dataset for Smartphone Cameras [J].
Abdelhamed, Abdelrahman ;
Lin, Stephen ;
Brown, Michael S. .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :1692-1700
[2]   NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study [J].
Agustsson, Eirikur ;
Timofte, Radu .
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, :1122-1131
[3]  
[Anonymous], 2019, CORR
[4]  
Boehm B, 2014, CORR
[5]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[6]   Never Mind the Malware, Here's the Stegomalware [J].
Caviglione, Luca ;
Mazurczyk, Wojciech .
IEEE SECURITY & PRIVACY, 2022, 20 (05) :101-106
[7]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[8]  
Dumitrescu S, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P641, DOI 10.1109/ICIP.2002.1039052
[9]   Detection of LSB steganography via sample pair analysis [J].
Dumitrescu, S ;
Wu, XL ;
Wang, Z .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (07) :1995-2007
[10]  
Fridrich J., 2001, P 2001 WORKSHOP MULT, P27