Defeating data hiding in social networks using generative adversarial network

被引:6
|
作者
Wang, Huaqi [1 ]
Qian, Zhenxing [2 ]
Feng, Guorui [1 ]
Zhang, Xinpeng [2 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai, Peoples R China
[2] Fudan Univ, Shanghai Inst Intelligent Elect & Syst, Sch Comp Sci, Shanghai, Peoples R China
关键词
Information hiding; Social networks; Steganography; Steganalysis; IMAGE;
D O I
10.1186/s13640-020-00518-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a large number of images are transmitted through social networks every moment, terrorists may hide data into images to convey secret data. Various types of images are mixed up in the social networks, and it is difficult for the servers of social networks to detect whether the images are clean. To prevent the illegal communication, this paper proposes a method of defeating data hiding by removing the secret data without impacting the original media content. The method separates the clean images from illegal images using the generative adversarial network (GAN), in which a deep residual network is used as a generator. Therefore, hidden data can be removed and the quality of the processed images can be well maintained. Experimental results show that the proposed method can prevent secret transmission effectively and preserve the processed images with high quality.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Defeating data hiding in social networks using generative adversarial network
    Huaqi Wang
    Zhenxing Qian
    Guorui Feng
    Xinpeng Zhang
    EURASIP Journal on Image and Video Processing, 2020
  • [2] Hiding Message Using a Cycle Generative Adversarial Network
    Shi, Wuzhen
    Liu, Shaohui
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2022, 18 (03)
  • [3] StegGAN: hiding image within image using conditional generative adversarial networks
    Brijesh Singh
    Prasen Kumar Sharma
    Shashank Anil Huddedar
    Arijit Sur
    Pinaki Mitra
    Multimedia Tools and Applications, 2022, 81 : 40511 - 40533
  • [4] StegGAN: hiding image within image using conditional generative adversarial networks
    Singh, Brijesh
    Sharma, Prasen Kumar
    Huddedar, Shashank Anil
    Sur, Arijit
    Mitra, Pinaki
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) : 40511 - 40533
  • [5] Information Hiding Mechanism Based on Generative Adversarial Networks
    Cheng, Xiaohui
    Zhao, Jun
    Kang, Yanping
    PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 625 - 629
  • [6] Information Hiding Scheme Based on Quantum Generative Adversarial Network
    Luo J.
    Zhou R.
    Li Y.
    Liu G.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2021, 33 (07): : 983 - 990
  • [7] Encrypted Rich-data Steganography using Generative Adversarial Networks
    Shu, Dule
    Cong, Weilin
    Chai, Jiaming
    Tucker, Conrad S.
    PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, : 55 - 60
  • [8] Automatic Steganographic Distortion Learning Using a Generative Adversarial Network
    Tang, Weixuan
    Tan, Shunquan
    Li, Bin
    Huang, Jiwu
    IEEE SIGNAL PROCESSING LETTERS, 2017, 24 (10) : 1547 - 1551
  • [9] Steganography-based facial re-enactment using generative adversarial networks
    Kumar, Vijay
    Sharma, Sahil
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (03) : 7609 - 7630
  • [10] Steganography-based facial re-enactment using generative adversarial networks
    Vijay Kumar
    Sahil Sharma
    Multimedia Tools and Applications, 2024, 83 : 7609 - 7630