Image data hiding with multi-scale autoencoder network

Image steganography is the process of hiding information which can be text, image, or video inside a cover image. The advantage of steganography over cryptography is that the intended secret message does not attract attention and is thus more suitable for secret communication in a highly-surveillant environment such as civil disobedience movements. Internet memes in social media and messaging apps have become a popular culture worldwide, so this folk custom is a good application scenario for image steganography. We try to explore and adopt the steganography techniques on the Internet memes in this work. We implement and improve the HiDDeN model [22] by changing the Conv-BN-ReLU blocks convolution layer with a multiscale autoencoder network so that the neural network learns to embed message bits in higherlevel feature space. Compared to methods that convolve feature filters on the row-pixel domain, our proposed MS-Hidden network learns to hide secrets in both low-level and high-level image features. As a result, the proposed model significantly reduces the bit-error rate to empirically 0% and the required network parameters are much less than the HiDDeN model. Introduction When two parties want to communicate with each other and preserve their privacy securely, the most commonly used strategy is data encryption. The data is converted into ciphertext using cryptography algorithms. The original message is not readable after encryption, but the ciphertext is visible to human eyes, leading to suspicion and further scrutiny. The advantage of steganography over cryptography is that the intended secret message does not attract attention. The visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be criminal in some countries [3]. Even worse, the two parties may be captured by an untrusted leagal authority in a civil disobedience movement [1] and being tortured with Rubber hose cryptanalysis [2]. Messsaging Apps In the Mobile computing and Mobile Internet age, people with a highly cost-effective mobile phone can easily communicate with friends and families using instant messaging apps (such as Facebook Messenger and LINE). The modern messaging apps connect users to social groups and enable users to send messages instantly in all kinds of multimedia formats. The richness of images or photos significantly improves the user experience during communication, and thus, sending interesting photos becomes a dominant user behavior in messaging activities. Figure 1 shows two examples of Internet memes shared among western and Asian societies. This kind of social phenomenon has become a folk custom, and the spread of Internet memes in messaging apps tends to be ignored by the ill-intentioned authority, which is a perfect application scenario for steganography.

[1]  Benedikt Boehm,et al.  StegExpose - A Tool for Detecting LSB Steganography , 2014, ArXiv.

[2]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[3]  Jiwu Huang,et al.  Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition , 2007, IEEE Transactions on Image Processing.

[4]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[5]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[6]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[7]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[8]  Michael S. Bernstein,et al.  ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.

[9]  David Megías,et al.  Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..

[10]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[11]  Ren Ng,et al.  StegaStamp: Invisible Hyperlinks in Physical Photographs , 2019, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[12]  Pietro Perona,et al.  Microsoft COCO: Common Objects in Context , 2014, ECCV.

[13]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[14]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[15]  In-So Kweon,et al.  UDH: Universal Deep Hiding for Steganography, Watermarking, and Light Field Messaging , 2020, NeurIPS.

[16]  Mai Xu,et al.  HiNet: Deep Image Hiding by Invertible Network , 2021, 2021 IEEE/CVF International Conference on Computer Vision (ICCV).

[17]  Peyman Milanfar,et al.  DVMark: A Deep Multiscale Framework for Video Watermarking , 2021, IEEE transactions on image processing : a publication of the IEEE Signal Processing Society.

[18]  Paul L. Rosin,et al.  Large-capacity Image Steganography Based on Invertible Neural Networks , 2021, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).

[19]  Peyman Milanfar,et al.  Distortion Agnostic Deep Watermarking , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).