Layerwise Adversarial Learning for Image Steganography

被引:3
作者
Chen, Bin [1 ]
Shi, Lei [2 ,3 ]
Cao, Zhiyi [4 ]
Niu, Shaozhang [5 ]
机构
[1] Shijiazhuang Informat Engn Vocat Coll, Dept Comp Applicat, Shijiazhuang 050025, Peoples R China
[2] Commun Univ China, State Key Lab Media Convergence & Commun, Beijing 100024, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin 541004, Peoples R China
[4] Hebei Normal Univ, Coll Comp & Cyberspace Secur, Shijiazhuang 050025, Peoples R China
[5] Beijing Univ Posts & Telecommun, Beijing Key Lab Intelligent Telecommun Software &, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
image generation; image steganography; layerwise adversarial learning; generative adversarial networks; STEGANALYSIS; WATERMARKING; NETWORK;
D O I
10.3390/electronics12092080
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image steganography is a subfield of pattern recognition. It involves hiding secret data in a cover image and extracting the secret data from the stego image (described as a container image) when needed. Existing image steganography methods based on Deep Neural Networks (DNN) usually have a strong embedding capacity, but the appearance of container images is easily altered by visual watermarks of secret data. One of the reasons for this is that, during the end-to-end training process of their Hiding Network, the location information of the visual watermarks has changed. In this paper, we proposed a layerwise adversarial training method to solve the constraint. Specifically, unlike other methods, we added a single-layer subnetwork and a discriminator behind each layer to capture their representational power. The representational power serves two purposes: first, it can update the weights of each layer which alleviates memory requirements; second, it can update the weights of the same discriminator which guarantees that the location information of the visual watermarks remains unchanged. Experiments on two datasets show that the proposed method significantly outperforms the most advanced methods.
引用
收藏
页数:14
相关论文
共 52 条
  • [1] Baluja S, 2017, ADV NEUR IN, V30
  • [2] Belilovsky E., 2019, Proceedings of the 36th International Conference on Machine Learning, Proceedings of Machine Learning Research, P583
  • [3] Bengio Y, 2016, Arxiv, DOI arXiv:1502.04156
  • [4] Deep Residual Network for Steganalysis of Digital Images
    Boroumand, Mehdi
    Chen, Mo
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1181 - 1193
  • [5] Brandao AS, 2016, IEEE LAT AM T, V14, P1361, DOI 10.1109/TLA.2016.7459621
  • [6] Chen XL, 2015, Arxiv, DOI [arXiv:1504.00325, DOI 10.48550/ARXIV.1504.00325]
  • [7] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [8] Dong X, 2017, ADV NEUR IN, V30
  • [9] NDDR-CNN: Layerwise Feature Fusing in Multi-Task CNNs by Neural Discriminative Dimensionality Reduction
    Gao, Yuan
    Ma, Jiayi
    Zhao, Mingbo
    Liu, Wei
    Yuille, Alan L.
    [J]. 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 3200 - 3209
  • [10] Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672