Generative Steganography via Auto-Generation of Semantic Object Contours

被引:42
作者
Zhou, Zhili [1 ]
Dong, Xiaohua [2 ]
Meng, Ruohan [1 ]
Wang, Meimin [2 ]
Yan, Hongyang [1 ]
Yu, Keping [3 ]
Choo, Kim-Kwang Raymond [4 ]
机构
[1] Guangzhou Univ, Inst Artificial Intelligence & Blockchain, Guangzhou 510006, Guangdong, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Minist Educ, Nanjing 210044, Peoples R China
[3] Hosei Univ, Grad Sch Sci & Engn, Tokyo 1848584, Japan
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Steganography; Feature extraction; Security; Generative adversarial networks; Encoding; Transforms; Distortion; Generative steganography; coverless steganography; Index Terms; generative information hiding; covert communication; digital forensics; IMAGE; STEGANALYSIS; FRAMEWORK;
D O I
10.1109/TIFS.2023.3268843
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As a promising technique of resisting steganalysis detection, generative steganography usually generates a new image driven by secret information as the stego-image. However, it generally encodes secret information as entangled features in a non-distribution-preserving manner for the stego-image generation, which leads to two common issues: 1) limited accuracy of information extraction, and 2) low security in the feature-domain. To address the above limitations, we propose a generative steganographic framework via auto-generation of semantic object contours, in which a given secret message is encoded as the disentangled features, i.e., object-contours, in a distribution-preserving manner for the stego-image generation. In this framework, we propose a contour generative adversarial nets (CtrGAN) consisting of a contour-generator and a contour-discriminator, which are adversarially trained with reinforcement learning. To realize the generative steganography, by using the contour-generator of the trained CtrGAN, a contour point selection (CPS)-based encoding strategy is designed to encode the secret message as the contours. Then, the BicycleGAN is employed to transform the generated contours to the corresponding stego-image. Extensive experiments demonstrate that the proposed steganographic approach outperforms the state-of-the-arts in terms of information extraction accuracy, especially under common image attacks, and feature-domain security.
引用
收藏
页码:2751 / 2765
页数:15
相关论文
共 61 条
  • [31] Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220
  • [32] An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism
    Qin, Chuan
    Chang, Chin-Chen
    Huang, Ying-Hsuan
    Liao, Li-Ting
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2013, 23 (07) : 1109 - 1118
  • [33] Radford A, 2016, Arxiv, DOI [arXiv:1511.06434, 10.48550/arXiv.1511.06434, DOI 10.48550/ARXIV.1511.06434]
  • [34] U-Net: Convolutional Networks for Biomedical Image Segmentation
    Ronneberger, Olaf
    Fischer, Philipp
    Brox, Thomas
    [J]. MEDICAL IMAGE COMPUTING AND COMPUTER-ASSISTED INTERVENTION, PT III, 2015, 9351 : 234 - 241
  • [35] Rubner L. J., 1997, P ARPA IM UND WORKSH, P661
  • [36] Salimans T., 2017, ARXIV, DOI [10.48550/arXiv.1701.05517, DOI 10.48550/ARXIV.1701.05517]
  • [37] Content-Adaptive Steganography by Minimizing Statistical Detectability
    Sedighi, Vahid
    Cogranne, Remi
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 221 - 234
  • [38] SSGAN: Secure Steganography Based on Generative Adversarial Networks
    Shi, Haichao
    Dong, Jing
    Wang, Wei
    Qian, Yinlong
    Zhang, Xiaoyu
    [J]. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2017, PT I, 2018, 10735 : 534 - 544
  • [39] Soloveitchik M, 2022, Arxiv, DOI arXiv:2103.11521
  • [40] Sutton RS, 2018, ADAPT COMPUT MACH LE, P1