Adversarial Learning for Invertible Steganography

Deep neural networks have revolutionised the research landscape of steganography. However, their potential has not been explored in invertible steganography, a special class of methods that permits the recovery of distorted objects due to steganographic perturbations to their pristine condition. In this paper, we revisit the regular-singular (RS) method and show that this elegant but obsolete invertible steganographic method can be reinvigorated and brought forwards to modern generation via neuralisation. Towards developing a renewed RS method, we introduce adversarial learning to capture the regularity of natural images automatically in contrast to handcrafted discrimination functions based on heuristic image prior. Specifically, we train generative adversarial networks (GANs) to predict bit-planes that have been used to carry hidden information. We then form a synthetic image and use it as a reference to provide guidance on data embedding and image recovery. Experimental results showed a significant improvement over the prior implementation of the RS method based on large-scale statistical evaluations.

[1]  Jia Liu,et al.  Steganography Security: Principle and Practice , 2018, IEEE Access.

[2]  Seyed-Mohsen Moosavi-Dezfooli,et al.  Universal Adversarial Perturbations , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[3]  Narendra Ahuja,et al.  Deep Laplacian Pyramid Networks for Fast and Accurate Super-Resolution , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[4]  Xinpeng Zhang,et al.  Reversible Data Hiding in Encrypted Image , 2011, IEEE Signal Processing Letters.

[5]  Ioan-Catalin Dragoi,et al.  Local-Prediction-Based Difference Expansion Reversible Watermarking , 2014, IEEE Transactions on Image Processing.

[6]  Bin Li,et al.  CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.

[7]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[8]  Bin Li,et al.  General Framework to Histogram-Shifting-Based Reversible Data Hiding , 2013, IEEE Transactions on Image Processing.

[9]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[10]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[11]  Seyed-Mohsen Moosavi-Dezfooli,et al.  DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[12]  Glen G. Langdon,et al.  An Introduction to Arithmetic Coding , 1984, IBM J. Res. Dev..

[13]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[14]  Taghi M. Khoshgoftaar,et al.  A survey on Image Data Augmentation for Deep Learning , 2019, Journal of Big Data.

[15]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[16]  Yoshua Bengio,et al.  Deep Sparse Rectifier Neural Networks , 2011, AISTATS.

[17]  Chang-Tsun Li,et al.  Privacy-Preserving Reversible Information Hiding Based on Arithmetic of Quadratic Residues , 2019, IEEE Access.

[18]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[19]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[20]  Jeho Nam,et al.  Reversible Watermarking Algorithm Using Sorting and Prediction , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Ton Kalker,et al.  The VIVA project: digital watermarking for broadcast monitoring , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[22]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[23]  Guorui Feng,et al.  On Security Enhancement of Steganography via Generative Adversarial Image , 2020, IEEE Signal Processing Letters.

[24]  William Puech,et al.  An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images , 2018, IEEE Transactions on Information Forensics and Security.

[25]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[26]  Sergey Ioffe,et al.  Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift , 2015, ICML.

[27]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[28]  Samy Bengio,et al.  Adversarial examples in the physical world , 2016, ICLR.

[29]  Jiwu Huang,et al.  New Framework for Reversible Data Hiding in Encrypted Domain , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Bin Ma,et al.  Reversible data hiding: Advances in the past two decades , 2016, IEEE Access.

[31]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[32]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[33]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[34]  Charu C. Aggarwal,et al.  On the Surprising Behavior of Distance Metrics in High Dimensional Spaces , 2001, ICDT.

[35]  C. Duchon Lanczos Filtering in One and Two Dimensions , 1979 .

[36]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[37]  Alexei A. Efros,et al.  Image-to-Image Translation with Conditional Adversarial Networks , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[38]  Weiming Zhang,et al.  Reversible Data Hiding Under Inconsistent Distortion Metrics , 2018, IEEE Transactions on Image Processing.

[39]  Minqing Zhang,et al.  Recent Advances of Image Steganography With Generative Adversarial Networks , 2019, IEEE Access.

[40]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[41]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[42]  Xin Chen,et al.  Multiple Histograms-Based Reversible Data Hiding: Framework and Realization , 2020, IEEE Transactions on Circuits and Systems for Video Technology.

[43]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[44]  Jessica J. Fridrich,et al.  Distortion-Free Data Embedding for Images , 2001, Information Hiding.

[45]  Christian Ledig,et al.  Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[46]  Ton Kalker,et al.  Capacity bounds and constructions for reversible data-hiding , 2003, IS&T/SPIE Electronic Imaging.

[47]  Bin Ma,et al.  A Reversible Data Hiding Scheme Based on Code Division Multiplexing , 2016, IEEE Transactions on Information Forensics and Security.

[48]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[49]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[50]  Dinu Coltuc,et al.  Low distortion transform for reversible watermarking , 2012, IEEE Transactions on Image Processing.

[51]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[52]  Nora Cuppens-Boulahia,et al.  Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.

[53]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[54]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[55]  Nitish Srivastava,et al.  Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..

[56]  Kejiang Chen,et al.  Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.

[57]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[58]  Bin Li,et al.  A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.

[59]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[60]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[61]  Raymond Y. K. Lau,et al.  Least Squares Generative Adversarial Networks , 2016, 2017 IEEE International Conference on Computer Vision (ICCV).

[62]  Jianhua Yang,et al.  An Embedding Cost Learning Framework Using GAN , 2020, IEEE Transactions on Information Forensics and Security.

[63]  Andrew L. Maas Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .

[64]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[65]  Andrea Vedaldi,et al.  Deep Image Prior , 2017, International Journal of Computer Vision.

[66]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[67]  Bin Li,et al.  Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.

[68]  Léon Bottou,et al.  Wasserstein Generative Adversarial Networks , 2017, ICML.

[69]  Weiming Zhang,et al.  Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers , 2012, IEEE Transactions on Image Processing.

[70]  Rajendra Bharti,et al.  Lossless and Reversible Data Hiding in Encrypted Images With Public Key Cryptography , 2017, RICE.

[71]  Xiaoou Tang,et al.  Image Super-Resolution Using Deep Convolutional Networks , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[72]  Wen Gao,et al.  Deep Reconstruction of Least Significant Bits for Bit-Depth Expansion , 2019, IEEE Transactions on Image Processing.

[73]  Lei Zhang,et al.  Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising , 2016, IEEE Transactions on Image Processing.

[74]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[75]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[76]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[77]  Chang-Tsun Li,et al.  Privacy-Aware Reversible Watermarking in Cloud Computing Environments , 2018, IEEE Access.

[78]  Weiming Zhang,et al.  Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption , 2013, IEEE Transactions on Information Forensics and Security.