Camouflage Generative Adversarial Network: Coverless Full-image-to-image Hiding

被引:0
作者
Liu, Xiyao [1 ]
Ma, Ziping [1 ]
Guo, Xingbei [1 ]
Hou, Jialu [1 ]
Schaefer, Gerald [2 ]
Wang, Lei [3 ]
Wang, Victoria [4 ]
Fang, Hui [2 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha, Peoples R China
[2] Loughborough Univ, Dept Comp Sci, Loughborough, Leics, England
[3] TextitCent South Univ, Sch Comp Sci & Engn, Changsha, Peoples R China
[4] Univ Portsmouth, Inst Criminal Justice Studies, Portsmouth, Hants, England
来源
2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) | 2020年
基金
中国国家自然科学基金;
关键词
image hiding; deep learning; generative adversarial network; image synthesis;
D O I
10.1109/smc42975.2020.9283054
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Image hiding, one of the most important data hiding techniques, is widely used to enhance cybersecurity when transmitting multimedia data. In recent years, deep learning-based image hiding algorithms have been designed to improve the embedding capacity whilst maintaining sufficient imperceptibility to malicious eavesdroppers. These methods can hide a full-size secret image into a cover image, thus allowing full-image-to-image hiding. However, these methods suffer from a trade-off challenge to balance the possibility of detection from the container image against the recovery quality of secret image. In this paper, we propose Camouflage Generative Adversarial Network (Cam-GAN), a novel two-stage coverless full-image-to-image hiding method named, to tackle this problem. Our method offers a hiding solution through image synthesis to avoid using a modified cover image as the image hiding container and thus enhancing both image hiding imperceptibility and recovery quality of secret images. Our experimental results demonstrate that Cam-GAN outperforms state-of-the-art full-image-to-image hiding algorithms on both aspects.
引用
收藏
页码:166 / 172
页数:7
相关论文
共 21 条
  • [1] [Anonymous], 2014, Stegexpose - a tool for detecting lsb steganography
  • [2] [Anonymous], 2013, P ACM WORKSH INF HID
  • [3] Baluja S., 2017, ADV NEURAL INFORM PR, P2069
  • [4] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [5] Optical color image encryption based on Arnold transform and interference method
    Chen, W.
    Quan, C.
    Tay, C. J.
    [J]. OPTICS COMMUNICATIONS, 2009, 282 (18) : 3680 - 3685
  • [6] Fridrich J., 2009, INFORM HIDING
  • [7] Goodfellow I.J., 2014, ADV NEUR IN, p1406.2661, DOI DOI 10.1145/3422622
  • [8] Universal distortion function for steganography in an arbitrary domain
    Holub, Vojtech
    Fridrich, Jessica
    Denemark, Tomas
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2014, 2014 (01)
  • [9] Holub V, 2012, IEEE INT WORKS INFOR, P234, DOI 10.1109/WIFS.2012.6412655
  • [10] A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
    Hu, Donghui
    Wang, Liang
    Jiang, Wenjie
    Zheng, Shuli
    Li, Bin
    [J]. IEEE ACCESS, 2018, 6 : 38303 - 38314