MDRSteg: large-capacity image steganography based on multi-scale dilated ResNet and combined chi-square distance loss

Abstract. Image steganography has emerged as a method of hiding secret data within an image file to ensure the security of the transmitted data. In this study, we propose an architecture named MDRSteg to unobtrusively hide a large-size image in another image based on a residual neural network with dilated convolution and multi-scale fusion. The architecture consists of an embedding network to hide the secret image in the cover-image and a revealing network to reveal the secret image from the stego-image, both networks are made up of fully convolutional residual modules. The networks are jointly trained with a loss function which is the combination of chi-square distance (CSD) and mean-square error. The proposed MDRSteg are trained and tested on three datasets, Labeled Faces in the Wild, Pascal visual object classes, and ImageNet. Extensive experiments have been done and the experimental results suggest that the proposed model can not only hide a large size image in another image with good invisibility and large hiding capacity (24 bits-per-pixel), but also exhibits good generalization ability. The experimental results also show that dilated convolution, multi-scale fusion, and combined CSD loss function have positive effects on the delicate image steganography results and proves that the model is practically useful for many applications.

[1]  Tomás Pevný,et al.  Steganalysis by Subtractive Pixel Adjacency Matrix , 2009, IEEE Transactions on Information Forensics and Security.

[2]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[3]  Jing Dong,et al.  SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.

[4]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[5]  Jianyi Liu,et al.  Invisible steganography via generative adversarial networks , 2018, Multimedia Tools and Applications.

[6]  Xingming Sun,et al.  A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .

[7]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[8]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[9]  Djemel Ziou,et al.  Image Quality Metrics: PSNR vs. SSIM , 2010, 2010 20th International Conference on Pattern Recognition.

[10]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[11]  Sébastien Ourselin,et al.  Automatic Brain Tumor Segmentation Using Cascaded Anisotropic Convolutional Neural Networks , 2017, BrainLes@MICCAI.

[12]  Yang Yang,et al.  StegNet: Mega Image Steganography Capacity with Deep Convolutional Network , 2018, Future Internet.

[13]  Jianhua Yang,et al.  An Embedding Cost Learning Framework Using GAN , 2020, IEEE Transactions on Information Forensics and Security.

[14]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[15]  Rafia Rahim,et al.  End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.

[16]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[17]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[18]  Léon Bottou,et al.  Wasserstein Generative Adversarial Networks , 2017, ICML.

[19]  Ankur Saxena,et al.  DCT/DST-Based Transform Coding for Intra Prediction in Image/Video Coding , 2013, IEEE Transactions on Image Processing.

[20]  Ross B. Girshick,et al.  Fast R-CNN , 2015, 1504.08083.

[21]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[22]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[23]  Nasrin M. Makbol,et al.  Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition , 2013 .

[24]  Chuan Qin,et al.  Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.

[25]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[26]  Mohammad Mehdi Rashidi,et al.  Increasing image compression rate using steganography , 2013, Expert Syst. Appl..

[27]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[28]  P. Albrecht,et al.  On the correct use of the chi-square goodness-of-fit test , 1980 .

[29]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[30]  FridrichJessica,et al.  Rich Models for Steganalysis of Digital Images , 2012 .

[31]  Swaminathan Ramakrishnan,et al.  Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission , 2014, Journal of Medical Systems.

[32]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[33]  Li Fei-Fei,et al.  ImageNet: A large-scale hierarchical image database , 2009, CVPR.

[34]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[35]  Trevor Darrell,et al.  Fully Convolutional Networks for Semantic Segmentation , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[36]  Yuan Yu,et al.  TensorFlow: A system for large-scale machine learning , 2016, OSDI.

[37]  Luc Van Gool,et al.  The Pascal Visual Object Classes (VOC) Challenge , 2010, International Journal of Computer Vision.