Steganography using a 3 player game

Image steganography aims to securely embed secret information into cover images. Until now, adaptive embedding algorithms such as S-UNIWARD or Mi-POD, are among the most secure and most used methods for image steganography. With the arrival of deep learning and more specifically the Generative Adversarial Networks (GAN), new techniques have appeared. Among these techniques, there is the 3 player game approaches, where three networks compete against each this http URL this paper, we propose three different architectures based on the 3 player game. The first-architecture is proposed as a rigorous alternative to two recent publications. The second takes into account stego noise power. Finally, our third architecture enriches the second one with a better interaction between the embedding and extracting networks. Our method achieves better results compared to the existing works GSIVAT, HiDDeN, and paves the way for future research on this topic.

[1]  Bin Li,et al.  CNN-Based Adversarial Embedding for Image Steganography , 2019, IEEE Transactions on Information Forensics and Security.

[2]  Feng Zhu,et al.  Efficient feature learning and multi-size image steganalysis based on CNN , 2018, ArXiv.

[3]  Bolin Chen,et al.  Fast and Effective Global Covariance Pooling Network for Image Steganalysis , 2019, IH&MMSec.

[4]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[5]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[6]  Patrick Bas,et al.  Computing Dependencies between DCT Coefficients for Natural Steganography in JPEG Domain , 2019, IH&MMSec.

[7]  Rainer Böhme,et al.  Moving steganography and steganalysis from the laboratory into the real world , 2013, IH&MMSec '13.

[8]  Marc Chaumont,et al.  Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch , 2015, Media Watermarking, Security, and Forensics.

[9]  Marc Chaumont,et al.  Deep learning in steganography and steganalysis , 2020 .

[10]  Marc Chaumont,et al.  Adaptive steganography by oracle (ASO) , 2013, 2013 IEEE International Conference on Multimedia and Expo (ICME).

[11]  Marc Chaumont,et al.  Yedroudj-Net: An Efficient CNN for Spatial Steganalysis , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Martín Abadi,et al.  Learning to Protect Communications with Adversarial Neural Cryptography , 2016, ArXiv.

[13]  Rainer Böhme,et al.  A Game-Theoretic Approach to Content-Adaptive Steganography , 2012, Information Hiding.

[14]  Bin Li,et al.  A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.

[15]  Bin Li,et al.  Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.

[16]  Bin Li,et al.  ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image Steganalysis , 2018, IEEE Signal Processing Letters.

[17]  Jessica Fridrich Steganography in Digital Media: Preface , 2009 .

[18]  Rainer Böhme,et al.  Game Theory and Adaptive Steganography , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Marc Chaumont,et al.  Pixels-off: Data-augmentation Complementary Solution for Deep-learning Steganalysis , 2020, IH&MMSec.

[20]  Marc Chaumont,et al.  How to augment a small learning set for improving the performances of a CNN-based steganalyzer? , 2018, Media Watermarking, Security, and Forensics.

[21]  Jessica J. Fridrich,et al.  Minimizing embedding impact in steganography using trellis-coded quantization , 2010, Electronic Imaging.

[22]  David Megías,et al.  Unsupervised steganalysis based on artificial training sets , 2016, Eng. Appl. Artif. Intell..

[23]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[24]  Thomas Brox,et al.  U-Net: Convolutional Networks for Biomedical Image Segmentation , 2015, MICCAI.

[25]  Jianyi Liu,et al.  Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis , 2020, IEEE Transactions on Information Forensics and Security.

[26]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[27]  Gustavus J. Simmons,et al.  The Subliminal Channel and Digital Signature , 1985, EUROCRYPT.

[28]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[29]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[30]  Marc Chaumont,et al.  Deep Learning in steganography and steganalysis from 2015 to 2018 , 2019, Digital Media Steganography.

[31]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[32]  Simmons,et al.  The Subliminal Channel and Digital Signatures , 2022 .

[33]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[34]  Andrew L. Maas Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .

[35]  Mo Chen,et al.  Deep Residual Network for Steganalysis of Digital Images , 2019, IEEE Transactions on Information Forensics and Security.

[36]  Vojtech Holub,et al.  On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.