Generative Steganography via Auto-Generation of Semantic Object Contours

被引:42
作者
Zhou, Zhili [1 ]
Dong, Xiaohua [2 ]
Meng, Ruohan [1 ]
Wang, Meimin [2 ]
Yan, Hongyang [1 ]
Yu, Keping [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Guangdong, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Minist Educ, Nanjing 210044, Peoples R China
[3] Hosei Univ, Grad Sch Sci & Engn, Tokyo 1848584, Japan
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Steganography; Feature extraction; Security; Generative adversarial networks; Encoding; Transforms; Distortion; Generative steganography; coverless steganography; Index Terms; generative information hiding; covert communication; digital forensics; IMAGE; STEGANALYSIS; FRAMEWORK;
D O I
10.1109/TIFS.2023.3268843
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a promising technique of resisting steganalysis detection, generative steganography usually generates a new image driven by secret information as the stego-image. However, it generally encodes secret information as entangled features in a non-distribution-preserving manner for the stego-image generation, which leads to two common issues: 1) limited accuracy of information extraction, and 2) low security in the feature-domain. To address the above limitations, we propose a generative steganographic framework via auto-generation of semantic object contours, in which a given secret message is encoded as the disentangled features, i.e., object-contours, in a distribution-preserving manner for the stego-image generation. In this framework, we propose a contour generative adversarial nets (CtrGAN) consisting of a contour-generator and a contour-discriminator, which are adversarially trained with reinforcement learning. To realize the generative steganography, by using the contour-generator of the trained CtrGAN, a contour point selection (CPS)-based encoding strategy is designed to encode the secret message as the contours. Then, the BicycleGAN is employed to transform the generated contours to the corresponding stego-image. Extensive experiments demonstrate that the proposed steganographic approach outperforms the state-of-the-arts in terms of information extraction accuracy, especially under common image attacks, and feature-domain security.
引用
收藏
页码:2751 / 2765
页数:15
相关论文
共 61 条
  • [1] Steganalysis using image quality metrics
    Avcibas, I
    Memon, N
    Sankur, B
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) : 221 - 229
  • [2] Hiding Images within Images
    Baluja, Shumeet
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 42 (07) : 1685 - 1697
  • [3] Representation Learning: A Review and New Perspectives
    Bengio, Yoshua
    Courville, Aaron
    Vincent, Pascal
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 35 (08) : 1798 - 1828
  • [4] Cachin C, 1998, LECT NOTES COMPUT SC, V1525, P306
  • [5] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [6] Das S, 2011, Arxiv, DOI arXiv:1111.3758
  • [7] Dinh L, 2015, Arxiv, DOI [arXiv:1410.8516, 10.48550/arXiv.1410.8516]
  • [8] Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
    Filler, Tomas
    Judas, Jan
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 920 - 935
  • [9] Digital image steganography using stochastic modulation
    Fridrich, J
    Goljan, M
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 191 - 202
  • [10] Rich Models for Steganalysis of Digital Images
    Fridrich, Jessica
    Kodovsky, Jan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) : 868 - 882