AdvSGAN: Adversarial image Steganography with adversarial networks

Steganalysers based on deep learning achieve state-of-the-art performance. However, due to the difficulty of capturing the distribution of the high-dimensional covers, traditional steganography schemes construct more complex artificial rules within expert knowledge, which is usually challenging to o...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Multimedia tools and applications 2021-07, Vol.80 (17), p.25539-25555
Hauptverfasser: Li, Lin, Fan, Mingyu, Liu, Defu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Steganalysers based on deep learning achieve state-of-the-art performance. However, due to the difficulty of capturing the distribution of the high-dimensional covers, traditional steganography schemes construct more complex artificial rules within expert knowledge, which is usually challenging to obtain to counter these powerful steganalysers. Adversarial learning is a valuable potential for steganography. There have some steganography schemes through playing an adversarial game within deep neural networks. However, there is a vast security margin needed to reduce. In this paper, we propose AdvSGAN, which learns an image steganography scheme represented by a restricted neural coder from scratch by playing an adversarial game between the restricted neural coder and adversaries in the adversary model, i.e., In-Training and Out-Training adversaries. The restricted neural coder is implemented by two neural networks named SE and SD are to perform encoding and decoding transformation respectively, and a flexible restriction model to constrain the covers’ embedding space to improve the performance. The In-Training adversary is implemented by another network of discriminator named Eve in the GANs model. The Out-Training adversary is implemented by the targeted CNN based steganalyser. By playing adversarial game jointly with Eve, SE and SD are evolving to find the possible transformation. Meanwhile, by attacking the Out-Training adversary in a white-box setting, the obtained gradient provides instructive guidance for evolving to find the optimal steganographic scheme. Experiments demonstrate that the proposed steganographic scheme achieves better security performance even in high capacity against targeted steganalyser, and still has some transferability to other unaware steganalysers.
ISSN:1380-7501
1573-7721
DOI:10.1007/s11042-021-10904-1