Enhancing the security of image steganography via multiple adversarial networks and channel attention modules

被引:12
作者
Ma, Bin [1 ,2 ]
Li, Kun [1 ,2 ]
Xu, Jian [3 ]
Wang, Chunpeng [1 ,2 ]
Li, Jian [1 ,2 ]
Zhang, Liwei [4 ]
机构
[1] Qilu Univ Technol, Shandong Acad Sci, Jinan, Peoples R China
[2] Shandong Prov Key Lab Comp Networks, Jinan, Peoples R China
[3] Shandong Univ Finance & Econ, Jinan, Peoples R China
[4] Integrated Elect Syst Lab Co Ltd, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
Steganography; Steganalysis; Adversarial image; Channel attention; Generative adversarial networks; STEGANALYSIS; WATERMARKING;
D O I
10.1016/j.dsp.2023.104121
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing steganographic methods based on adversarial images can only design adversarial images for a single steganalyzer and cannot resist detection from the latest steganalyzers using convolutional neural networks such as SRNet and Zhu-Net. To address this issue, this paper proposes a novel method for enhancing the security of image steganography using multiple adversarial networks and channel attention modules. The proposed method employs generative adversarial networks based on the U-Net structure to generate high-quality adversarial images and uses the self-learning properties of the adversarial networks to iteratively optimize the parameters of multiple adversarial steganographic networks. This process generates high-quality adversarial images capable of misleading multiple steganalyzers. Additionally, the proposed scheme adaptively adjusts the distribution of adversarial noise in the original image using multiple lightweight channel attention modules in the generator, thus enhancing the anti-steganalysis ability of adversarial images. Furthermore, the proposed method utilizes multiple discrimination losses and MSE loss, dynamically combined to improve the quality of adversarial images and facilitate the network's rapid and stable convergence. Extensive experimental results demonstrate that the proposed algorithm can generate adversarial images with an average PSNR of 40.3 dB, and the success rate of misleading the advanced steganalyzers is over 93%. The security and generalization of the algorithm we propose exceed those of the compared steganographic methods.& COPY; 2023 Published by Elsevier Inc.
引用
收藏
页数:19
相关论文
共 58 条
[1]  
Zhang KA, 2019, Arxiv, DOI [arXiv:1901.03892, 10.48550/arXiv.1901.03892]
[2]  
Baluja S, 2017, ADV NEUR IN, V30
[3]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[4]  
Bose AJ, 2018, IEEE INT WORKSH MULT
[5]   Novel Coverless Steganography Method Based on Image Selection and StarGAN [J].
Chen, Xianyi ;
Zhang, Zhentian ;
Qiu, Anqi ;
Xia, Zhihua ;
Xiong, Neal N. .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01) :219-230
[6]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[7]  
Denemark T, 2014, IEEE INT WORKS INFOR, P48, DOI 10.1109/WIFS.2014.7084302
[8]   Reversible Image Steganography Scheme Based on a U-Net Structure [J].
Duan, Xintao ;
Jia, Kai ;
Li, Baoxia ;
Guo, Daidou ;
Zhang, En ;
Qin, Chuan .
IEEE ACCESS, 2019, 7 :9314-9323
[9]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[10]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882