Enhancing JPEG Steganography using Iterative Adversarial Examples

Convolutional Neural Networks (CNN) based methods have significantly improved the performance of image ste-ganalysis compared with conventional ones based on hand-crafted features. However, many existing literatures on computer vision have pointed out that those effective CNN-based methods can be easily fooled by adversarial examples [1]. In this paper, we propose a steganography method based on adversarial example in an iterative manner. The proposed method first starts from an existing embedding cost, such as J-UNIWARD [2] in this work, and then updates the cost iteratively based on adversarial examples derived from a series of steganalytic networks until achieving satisfactory results. We carefully analyze two important factors that would affect the security performance of the proposed framewrork, i.e., the percentage of selected gradients with larger amplitude and the adversarial intensity to modify embedding cost. The experimental results evaluated on three modern steganalytic models, including GFR, SCA-GFR and SRNet, show that the proposed method is very promising to enhance the security performances of JPEG steganography.

[1]  Xianfeng Zhao,et al.  Weakening the Detecting Capability of CNN-based Steganalysis , 2018, ArXiv.

[2]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[3]  Marc Chaumont,et al.  Technical points about adaptive steganography by oracle (ASO) , 2012, 2012 Proceedings of the 20th European Signal Processing Conference (EUSIPCO).

[4]  Bolin Chen,et al.  Fast and Effective Global Covariance Pooling Network for Image Steganalysis , 2019, IH&MMSec.

[5]  Yi Zhang,et al.  Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters , 2015, IH&MMSec.

[6]  Jessica J. Fridrich,et al.  Steganalysis Features for Content-Adaptive JPEG Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[8]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[9]  Yun Q. Shi,et al.  Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Marc Chaumont,et al.  Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[11]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[12]  Bin Li,et al.  CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.

[13]  Jessica J. Fridrich,et al.  Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.

[14]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[15]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[16]  Peijia Zheng,et al.  Enhancing Steganography via Stego Post-processing by Reducing Image Residual Difference , 2019, IH&MMSec.

[17]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[18]  John Klein,et al.  Exploiting Adversarial Embeddings for Better Steganography , 2019, IH&MMSec.

[19]  Kejiang Chen,et al.  Adversarial Examples Against Deep Neural Network based Steganalysis , 2018, IH&MMSec.