AdvSGAN: Adversarial image Steganography with adversarial networks

Steganalysers based on deep learning achieve state-of-the-art performance. However, due to the difficulty of capturing the distribution of the high-dimensional covers, traditional steganography schemes construct more complex artificial rules within expert knowledge, which is usually challenging to obtain to counter these powerful steganalysers. Adversarial learning is a valuable potential for steganography. There have some steganography schemes through playing an adversarial game within deep neural networks. However, there is a vast security margin needed to reduce. In this paper, we propose AdvSGAN, which learns an image steganography scheme represented by a restricted neural coder from scratch by playing an adversarial game between the restricted neural coder and adversaries in the adversary model, i.e., In-Training and Out-Training adversaries. The restricted neural coder is implemented by two neural networks named SE and SD are to perform encoding and decoding transformation respectively, and a flexible restriction model to constrain the covers’ embedding space to improve the performance. The In-Training adversary is implemented by another network of discriminator named Eve in the GANs model. The Out-Training adversary is implemented by the targeted CNN based steganalyser. By playing adversarial game jointly with Eve, SE and SD are evolving to find the possible transformation. Meanwhile, by attacking the Out-Training adversary in a white-box setting, the obtained gradient provides instructive guidance for evolving to find the optimal steganographic scheme. Experiments demonstrate that the proposed steganographic scheme achieves better security performance even in high capacity against targeted steganalyser, and still has some transferability to other unaware steganalysers.

[1]  Benedikt Boehm,et al.  StegExpose - A Tool for Detecting LSB Steganography , 2014, ArXiv.

[2]  Tomás Pevný,et al.  Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Nasir D. Memon,et al.  On steganalysis of random LSB embedding in continuous-tone images , 2002, Proceedings. International Conference on Image Processing.

[4]  Bin Li,et al.  CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.

[5]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[6]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[7]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[8]  Lei Xu,et al.  SteganoGAN: High Capacity Image Steganography with GANs , 2019, ArXiv.

[9]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[10]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Zhou Wang,et al.  Why is image quality assessment so difficult? , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[12]  Marc Chaumont,et al.  Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[13]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[14]  Jessica J. Fridrich,et al.  Steganalysis in resized images , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[15]  Yun Q. Shi,et al.  JPEG image steganalysis utilizing both intrablock and interblock correlations , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[16]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[17]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[18]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[19]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[20]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[21]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[22]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[23]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[24]  Bin Li,et al.  Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.

[25]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[26]  Marc Chaumont,et al.  Deep Learning in steganography and steganalysis from 2015 to 2018 , 2019, Digital Media Steganography.

[27]  Samy Bengio,et al.  Adversarial examples in the physical world , 2016, ICLR.

[28]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[29]  Marc Chaumont,et al.  Steganography using a 3 player game , 2019, J. Vis. Commun. Image Represent..

[30]  Yang Yang,et al.  Image-into-Image Steganography Using Deep Convolutional Network , 2018, PCM.

[31]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[32]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[33]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[34]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[35]  Kejiang Chen,et al.  Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.