2019
DOI: 10.1109/tifs.2019.2891237
|View full text |Cite
|
Sign up to set email alerts
|

CNN-Based Adversarial Embedding for Image Steganography

Abstract: Historically, steganographic schemes were designed in a way to preserve image statistics or steganalytic features. Since most of the state-of-the-art steganalytic methods employ a machine learning (ML) based classifier, it is reasonable to consider countering steganalysis by trying to fool the ML classifiers. However, simply applying perturbations on stego images as adversarial examples may lead to the failure of data extraction and introduce unexpected artefacts detectable by other classifiers. In this paper,… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
139
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 239 publications
(139 citation statements)
references
References 43 publications
0
139
0
Order By: Relevance
“…However, simply adding perturbations directly to a stego images can also result in instability of message extraction. Tang et al [88] proposed a steganography scheme called adversarial embedding (ADV-EMB),…”
Section: Embedding As Adversarial Samplesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, simply adding perturbations directly to a stego images can also result in instability of message extraction. Tang et al [88] proposed a steganography scheme called adversarial embedding (ADV-EMB),…”
Section: Embedding As Adversarial Samplesmentioning
confidence: 99%
“…[82]and [14] train a generator of modification probabilities matrix for minimizing a suitably defined additive distortion function. [15,78,88,89] learning a whole cover modification steganographic algorithm using GAN. They focus on the adversarial game between steganography and steganalysis.…”
Section: Summary On Cover Modificationmentioning
confidence: 99%
“…Beyond this limit, they produce artifacts that can be easily detected by deep learning based steganalysis framework and, in extreme cases, it can also be detected by the human eyes. Advances in deep learning over the last few decades a new class of image steganographic frameworks based on deep learning are emerging [62][63][64][65]. In 2018, Zhu et al [66] proposed end to end deep learning framework for data hiding in digital images.…”
Section: Adversarial Examples In Deep Learning Based Steganographymentioning
confidence: 99%
“…WIFS'2019, December, [9][10][11][12]2019, Delft, Netherlands. XXX-X-XXXX-XXXX-X/XX/$XX.00 c 2019 IEEE.…”
Section: Introductionmentioning
confidence: 99%
“…Experimental results show that the proposed framework can significantly enhance the existing JPEG steganography evaluated on both deep learning based steganalyzers and the conventional ones. Please note that although both our method and the method in [10] aim to enhance J-UNIWARD based on adversarial examples, there are some important differences between them: 1) With iterative adversarial attacks, we aim to update embedding costs multiple times, while the method [10] aims to find a proper amount of adjust elements; 2) We embed the whole secret message into JPEG directly, while the method [ We just update those embedding costs with larger gradient amplitudes rather than a random way in [10]; 4) For updating embedding cost, we use an additive way instead of multiplicative one in [10]. The rest of this paper is arranged as follows.…”
Section: Introductionmentioning
confidence: 99%