Coverless Information Hiding Based on Generative Adversarial Networks
Received date: 2018-01-28
Online published: 2018-03-31
Traditional image steganography algorithms, which embed the secret information by modifying the content of the image more or less, are hard to resist the detection of image steganalysis tools. To address this problem, a novel coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is replaced with the secret information as a driver to generate hidden image directly. And the secret information is extracted from the hidden image through a discriminator. Experimental results show that this hidden algorithm ensures good performs in terms of steganography capacity, anti-steganalysis and safety.
LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian, ZHANG Ying-nan . Coverless Information Hiding Based on Generative Adversarial Networks[J]. Journal of Applied Sciences, 2018 , 36(2) : 371 -382 . DOI: 10.3969/j.issn.0255-8297.2018.02.015
[1] 沈昌祥,张焕国,冯登国. 信息安全综述[J]. 中国科学,2007, 37(2):129-150. Shen C X, Zhang H G, Feng D G. A survey of information security[J]. Science China, 2007, 37(2):129-150. (in Chinese)
[2] Tirkel A Z, Rankin G A, Schyndel R V. Electronic watermark[C]//Digital Image Computing, Technology and Applications, 1993.
[3] Yang C H, Weng C Y, Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems[J]. IEEE Transactions on Information Forensics & Security, 2008, 3(3):488-497.
[4] Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain[J]. Eurasip Journal on Information Security, 2014, 2014(1):1.
[5] Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[J]. Lecture Notes in Computer Science, 2010, 6387:161-177.
[6] Holub V, Fridrich J. Designing steganographic distortion using directional flters[C]//IEEE International Workshop on Information Forensics and Security. IEEE, 2013:234-239.
[7] Ruanaidh J K, Dowling W J, Boland F M. Phase watermarking of digital images[C]//International Conference on Image Processing, 1996:239-242.
[8] Cox I J, Kilian J, Leighton F T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673-1687.
[9] Lin W H, Horng S J, Kao T W. An efcient watermarking method based on signifcant difference of wavelet coefcient quantiZation[J]. IEEE Transactions on Multimedia, 2008, 10(5):746-757.
[10] 周志立,曹燚,孙星明. 基于图像bag-of-words模型的无载体信息隐藏[J]. 应用科学学报,2016, 34(5):527-536. Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences, 2016, 34(5):527-536. (in Chinese)
[11] 张新鹏,钱振兴,李晟. 信息隐藏研究展望[J]. 应用科学学报,2016, 34(5):475-489. Zhang X P, Qian Z X, Li S. Prospect of digital steganography research[J]. Journal of Applied Sciences, 2016, 34(5):475-489. (in Chinese)
[12] Otori H, Kuriyama S. Texture synthesis for mobile data communications[J]. IEEE Computer Graphics and Applications, 2009, 29(6):74-81.
[13] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions Image Processing, 2015, 24(1):130-139.
[14] Goodfellow I, Pouget A J, Mirz M, Xu B, Wardef D, Ozair S, Courville A, Bengio Y. Generative adversarial nets[C]//International Conference on Neural Information Processing Systems, 2014:2672-2680.
[15] Odena A, Olah C, Shlens J. Conditional image synthesis with auxiliary classifer GANs[J]. Computer Science, 2016.
[16] 王坤峰,苟超,段艳杰,林懿伦,郑心湖,王飞跃. 生成式对抗网络GAN的研究进展与展望[J]. 自动化学报,2017, 43(3):321-332. Wang K F, Gou C, Duan Y J, Lin Y L, Zheng X H, Wang F Y. Generative adversarial networks:the state of the art and beyond[J]. Acta Automatica Sinica, 2017, 43(3):321-332. (in Chinese)
[17] Radford A, Metz L, Chintala S. Unsupervised representation learning with deep convolutional generative adversarial networks[J]. Computer Science, 2015.
[18] Mirz M, Osindero S. Conditional generative adversarial nets[J]. Computer Science, 2014:2672-2680.
[19] Chen X, Duan Y, Houthooft R, Schulmanj, Sutskeveri, Abbeel P. InfoGAN:interpretable representation learning by information maximizing generative adversarial nets[J]. Computer Science, 2016.
[20] Pibre L, Pasquet J, Ienco D, Chaumont M. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch[J]. Electronic Imaging, 2016, 4(8):1-11.
/
| 〈 |
|
〉 |