Enhancing the anti-steganalysis ability of steganography via adversarial examples

被引:4
作者
Peng, Ye [1 ]
Fu, GuoBin [1 ]
Yu, Qi [1 ]
Luo, YingGuang [1 ]
Hu, Jia [1 ]
Duan, ChaoFan [1 ]
机构
[1] Natl Univ Def Technol, Coll Informat & Commun, 45 Liberat Pk Rd, Wuhan 430000, Hubei, Peoples R China
关键词
Steganography; Deep learning; Adversarial example; Generative adversarial network; IMAGE STEGANOGRAPHY; FRAMEWORK;
D O I
10.1007/s11042-023-15306-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography technology can effectively conceal secret information in the carrier medium, enable covert communication without drawing the attention of a third party, and ensure the safe and reliable transmission of confidential information. However, with the development of steganalysis technology, steganalysers based on deep learning can accurately identify the modification traces in the steganographic cover, which poses a huge threat to steganography. Therefore, the focus of the research is how to reduce the detection accuracy of deep learning-based steganalyzer. In this work, we design an Adversarial Example STeganography (AEST) method, which hides the secret grayscale image into the color cover image to obtain the stego image that is difficult to distinguish by the naked eye. Then, the attack module composed of the FGM and PGD adversarial attacks added small perturbations to generate adversarial steganographic images, reducing the detection accuracy of the steganalyzer. In addition, to reduce the impact of adversarial examples on secret information recovery, we designed a decoder based on adversarial training and the generative adversarial network. Finally, the experimental results show that AEST has a good performance of anti-steganalysis ability. For example, the adversarial steganographic image based on PGD attack can make the detection error rate of the XuNet steganalyzer reach 63.511%.
引用
收藏
页码:6227 / 6247
页数:21
相关论文
共 47 条
  • [1] Zhang KA, 2019, Arxiv, DOI arXiv:1901.03892
  • [2] Baluja S, 2017, ADV NEUR IN, V30
  • [3] Brock A, 2019, Arxiv, DOI [arXiv:1809.11096, DOI 10.48550/ARXIV.1809.11096]
  • [4] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [5] Chaumont M, 2020, DIGITAL MEDIA STEGAN, P321, DOI [10.1016/B978-0-12-819438-6.00022-0, DOI 10.1016/B978-0-12-819438-6.00022-0]
  • [6] Donahue J., 2016, arXiv
  • [7] GAN-based synthetic medical image augmentation for increased CNN performance in liver lesion classification
    Frid-Adar, Maayan
    Diamant, Idit
    Klang, Eyal
    Amitai, Michal
    Goldberger, Jacob
    Greenspan, Hayit
    [J]. NEUROCOMPUTING, 2018, 321 : 321 - 331
  • [8] Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application
    Ghamizi, Salah
    Cordy, Maxime
    Papadakis, Mike
    Le Traon, Yves
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW 2021), 2021, : 31 - 40
  • [9] Image steganography based on Kirsch edge detection
    Ghosal, Sudipta Kumar
    Chatterjee, Agneet
    Sarkar, Ram
    [J]. MULTIMEDIA SYSTEMS, 2021, 27 (01) : 73 - 87
  • [10] Goodfellow I., 2014, ADV NEUR IN, V27, P2672, DOI DOI 10.1145/3422622