Exploiting Adversarial Embeddings for Better Steganography

被引:29
作者
Bernard, Solene [1 ]
Pevny, Tomas [2 ]
Bas, Patrick [1 ]
Klein, John [1 ]
机构
[1] Univ Lille, CNRS, Cent Lille, UMR 9189,CRIStAL, Lille, France
[2] FEL CTU Prague, Prague, Czech Republic
来源
IH&MMSEC '19: PROCEEDINGS OF THE ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY | 2019年
关键词
steganography; adversarial attacks; security; game-theory;
D O I
10.1145/3335203.3335737
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work proposes a protocol to iteratively build a distortion function for adaptive steganography while increasing its practical security after each iteration. It relies on prior art on targeted attacks and iterative design of steganalysis schemes. It combines targeted attacks on a given detector with a min max strategy, which dynamically selects the most difficult stego content associated with the best classifier at each iteration. We theoretically prove the convergence, which is confirmed by the practical results. Applied on J-Uniward this new protocol increases P-err from 7% to 20% estimated by Xu-Net, and from 10% to 23% for a non-targeted steganalysis by a linear classifier with GFR features.
引用
收藏
页码:216 / 221
页数:6
相关论文
共 24 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
[Anonymous], WIFS
[3]  
[Anonymous], IEEE T INFORM FORENS
[4]  
[Anonymous], 2016, DEEP LEARNING
[5]  
[Anonymous], DESIGN ADAPTIVE STEG
[6]  
[Anonymous], IS T SPIE ELECT IMAG
[7]  
Bas P., 2011, P 13 INF HID C PRAG, V6958, DOI 10.1007/978-3-642- 24178-9_5
[8]  
Chaumont M., 2016, ELECT IMAGING, V2016, P1, DOI DOI 10.2352/ISSN.2470-1173.2016.8.MWSF-078
[9]   Gibbs Construction in Steganography [J].
Filler, Tomas ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :705-720
[10]  
Goodfellow I J, 2015, P INT C LEARN REPR I