2019 IEEE International Workshop on Information Forensics and Security (WIFS) 2019
DOI: 10.1109/wifs47025.2019.9035101
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing JPEG Steganography using Iterative Adversarial Examples

Abstract: Convolutional Neural Networks (CNN) based methods have significantly improved the performance of image steganalysis compared with conventional ones based on hand-crafted features. However, many existing literatures on computer vision have pointed out that those effective CNN-based methods can be easily fooled by adversarial examples [1]. In this paper, we propose a novel steganography framework based on adversarial example in an iterative manner. The proposed framework first starts from an existing embedding c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…Under the wave of deep learning, some pioneering approaches leveraged deep networks to hide and extract information with robustness and information capacity. Mo et al [18] proposed a generic network against embedding to improve the security and effectiveness of JPEG steganography, which can resist detection by steganalysers. Liu et al [19] developed a two-stage deep learning network for blind watermarking, using the encoder-decoder network to embed the copyright information, which can achieve resistance to high-intensity noise and enhance network stability.…”
Section: Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Under the wave of deep learning, some pioneering approaches leveraged deep networks to hide and extract information with robustness and information capacity. Mo et al [18] proposed a generic network against embedding to improve the security and effectiveness of JPEG steganography, which can resist detection by steganalysers. Liu et al [19] developed a two-stage deep learning network for blind watermarking, using the encoder-decoder network to embed the copyright information, which can achieve resistance to high-intensity noise and enhance network stability.…”
Section: Motivationsmentioning
confidence: 99%
“…Mo et al. [18] proposed a generic network against embedding to improve the security and effectiveness of JPEG steganography, which can resist detection by steganalysers. Liu et al.…”
Section: Introductionmentioning
confidence: 99%
“…This work was supported in part by the National Science Foundation of China (61972430), in part by the Natural Science Foundation of Guangdong (2019A1515011549) methods are symmetric, meaning that the costs of two directions (i.e., ±1) are exactly the same for every embedding unit. Recently, some asymmetric methods such as [6,7,8,9] and CNN-based methods (e.g., ADV-EMB [10], MinMax [11] [12], JS-IAE [13]) have been proposed. These methods take the direction of modifications into account and further improve security.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, ADV-EMB [10] divides all D-CT coefficients into two non-overlapping parts: one for traditional embedding; the other for adversarial embedding. JS-IAE [13] updates existing embedding cost iteratively based on adversarial examples derived from a series of pretrained networks. In addition, the method [14] improves existing symmetric steganography methods by constructing enhance covers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation