Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning

被引:15
作者
Pan, Wenwen [1 ]
Yin, Yanling [1 ]
Wang, Xinchao [2 ]
Jing, Yongcheng [1 ]
Song, Mingli [1 ,3 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[2] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore, Singapore
[3] Zhejiang Univ, Alibaba Zhejiang Univ Joint Res Inst Frontier Tec, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Steganography; Containers; Reinforcement learning; Receivers; Convolutional neural networks; Task analysis; Location awareness; deep learning; adversarial examples; reinforcement learning; IMAGE;
D O I
10.1109/TPAMI.2021.3114555
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The goal of image steganography is to hide a full-sized image, termed secret, into another, termed cover. Prior image steganography algorithms can conceal only one secret within one cover. In this paper, we propose an adaptive local image steganography (AdaSteg) system that allows for scale- and location-adaptive image steganography. By adaptively hiding the secret on a local scale, the proposed system makes the steganography more secured, and further enables multi-secret steganography within one single cover. Specifically, this is achieved via two stages, namely the adaptive patch selection stage and secret encryption stage. Given a pair of secret and cover, first, the optimal local patch for concealment is determined adaptively by exploiting deep reinforcement learning with the proposed steganography quality function and policy network. The secret image is then converted into a patch of encrypted noises, resembling the process of generating adversarial examples, which are further encoded to a local region of the cover to realize a more secured steganography. Furthermore, we propose a novel criterion for the assessment of local steganography, and also collect a challenging dataset that is specialized for the task of image steganography, thus contributing to a standardized benchmark for the area. Experimental results demonstrate that the proposed model yields results superior to the state of the art in both security and capacity.
引用
收藏
页码:7871 / 7884
页数:14
相关论文
共 57 条
[1]  
Abadi M., 2016, arXiv, DOI DOI 10.48550/ARXIV.1603.04467
[2]  
Amit R, 2020, PR MACH LEARN RES, V119
[3]  
[Anonymous], 2016, ABS161103718 CORR
[4]  
[Anonymous], 2014, Intriguing properties of neural networks
[5]  
[Anonymous], 2015, INT C LEARNING REPRE
[6]   On the Robustness of Semantic Segmentation Models to Adversarial Attacks [J].
Arnab, Anurag ;
Miksik, Ondrej ;
Torr, Philip H. S. .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :888-897
[7]   Multi-secret image sharing based on elementary cellular automata with steganography [J].
Azza, A. A. ;
Lian, Shiguo .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (29-30) :21241-21264
[8]  
Baluja S, 2017, ADV NEUR IN, V30
[9]   Hiding Images within Images [J].
Baluja, Shumeet .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 42 (07) :1685-1697
[10]  
Boehm B, 2014, Arxiv, DOI arXiv:1410.6656