Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








26 Hits in 2.1 sec

Adaptive Spatial Steganography Based on Probability-Controlled Adversarial Examples [article]

Sai Ma and Qingxiao Guan and Xianfeng Zhao and Yaqi Liu
2019 arXiv   pre-print
With deep learning based steganalysis methods, we can enhance the security of existing steganographic methods via adversarial method.  ...  Besides steganalysis, GAN(Generative Adversarial Network) based steganography is also proposed. The first GAN based steganography is [17] . [17] is generating cover image from noise via GAN.  ... 
arXiv:1804.02691v3 fatcat:q4zfofimqfhp3mdkipoavl5k7q

High-Capacity Robust Image Steganography via Adversarial Network

2020 KSII Transactions on Internet and Information Systems  
The secure and robust model is the most robust against some attacks.  ...  In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network.  ...  [28] proposed ISGAN (Invisible Steganography via Generative Adversarial Networks) by introducing the steganalysis network proposed by Xu et al.  ... 
doi:10.3837/tiis.2020.01.020 fatcat:ko2xyinesnfklbltpslwvpvd2m

A Brief Survey on Deep Learning Based Data Hiding [article]

Chaoning Zhang, Chenguo Lin, Philipp Benz, Kejiang Chen, Weiming Zhang, In So Kweon
2022 arXiv   pre-print
., capacity, security and robustness), and outline three commonly used architectures.  ...  Finally, further insight into deep hiding is provided by incorporating the perspective of adversarial attack.  ...  The work of Hayes and Danezis [2017] has shown that supervised training of the adversarial model can produce a robust steganalyzer.  ... 
arXiv:2103.01607v2 fatcat:z4kyyy234vgltp3kpdhq5h5wsu

CNN-based Adversarial Embedding for Image Steganography

Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang
2019 IEEE Transactions on Information Forensics and Security  
Experiments demonstrate that the proposed steganographic scheme achieves better security performance against the target adversary-unaware steganalyzer by increasing its missed detection rate.  ...  neural network (CNN)-based steganalyzer.  ...  The stego images generated in this way are robust against the detection of the target steganalyzer.  ... 
doi:10.1109/tifs.2019.2891237 fatcat:yqbmvu5qsnf3rfmfvgh4azfz7u

CNN Based Adversarial Embedding with Minimum Alteration for Image Steganography [article]

Weixuan Tang, Bin Li, Shunquan Tan, Mauro Barni, Jiwu Huang
2018 arXiv   pre-print
In this way, the so called adversarial stego images are generated. Experiments demonstrate that the proposed steganographic scheme is secure against the targeted adversary-unaware steganalyzer.  ...  network (CNN) based steganalyzer.  ...  In order to prevent over-adapted to the targeted steganalyzer and enhance the security performance against other advanced steganalyzers, the number of adjustable elements is minimized, resulting in a minimization  ... 
arXiv:1803.09043v1 fatcat:qzyihlpun5fbhbeds36co2iyvm

Invisible Steganography via Generative Adversarial Networks [article]

Ru Zhang, Shiqi Dong, Jianyi Liu
2018 arXiv   pre-print
There are three contributions in our work: (i) we improve the invisibility by hiding the secret image only in the Y channel of the cover image; (ii) We introduce the generative adversarial networks to  ...  There are also several works based on deep learning to do image steganography, but these works still have problems in capacity, invisibility and security.  ...  Inspired by Baluja's work, we proposed an invisible steganography via generative adversarial network named ISGAN.  ... 
arXiv:1807.08571v3 fatcat:424numo7enga3on5nrv3ozadru

Invisible steganography via generative adversarial networks

Ru Zhang, Shiqi Dong, Jianyi Liu
2018 Multimedia tools and applications  
There are three contributions in our work: (i) we improve the invisibility by hiding the secret image only in the Y channel of the cover image; (ii) We introduce the generative adversarial networks to  ...  There are also several works based on deep learning to do image steganography, but these works still have problems in capacity, invisibility and security.  ...  Inspired by Baluja's work, we proposed an invisible steganography via generative adversarial network named ISGAN.  ... 
doi:10.1007/s11042-018-6951-z fatcat:vb5sgbpyx5ebvmcbqe26h3lc3m

Universal Stego Post-processing for Enhancing Image Steganography [article]

Bolin Chen, Weiqi Luo, Peijia Zheng, Jiwu Huang
2020 arXiv   pre-print
Unlike existing works, we propose a novel framework to enhance the steganography security via post-processing on the embedding units (i.e., pixel values and DCT coefficients) of stego directly.  ...  Since the steganography artifacts are typically reflected on image residuals, we try to reduce the residual distance between cover and the modified stego in order to enhance steganography security.  ...  which shows the robustness of STCs against the modification ∆ in this case.  ... 
arXiv:1912.03878v2 fatcat:n5vb3lqucvgbjg2udgbyw5usha

Secret-to-Image Reversible Transformation for Generative Steganography [article]

Zhili Zhou, Yuecheng Su, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi
2022 arXiv   pre-print
Furthermore, a separate encoding-based S2IRT (SE-S2IRT) scheme is also proposed to improve the robustness to common image attacks.  ...  To address this issue, we propose a secret-to-image reversible transformation (S2IRT) scheme for generative steganography.  ...  Since the secret information is concealed without modification, generative steganography could achieve promising performance against the detection of steganalyzers.  ... 
arXiv:2203.06598v1 fatcat:fndno2oeuvhalfuaeyl3e3skli

Recent Advances of Image Steganography with Generative Adversarial Networks

Jia Liu, Yan Ke, Zhuo Zhang, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang
2020 IEEE Access  
INDEX TERMS Image steganography, generative adversarial nets, cover synthesis, generative model.  ...  In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success.  ...  They focus on the adversarial game between steganography and steganalysis. They both introduce a steganalyzer against the steganography either explicitly or implicitly.  ... 
doi:10.1109/access.2020.2983175 fatcat:fdakxe2m2rbcjdcebszweripta

Steganographic secret sharing via AI-generated photorealistic images

Kai Gao, Ching-Chun Chang, Ji-Hwei Horng, Isao Echizen
2022 EURASIP Journal on Wireless Communications and Networking  
Experimental results confirm the robustness of the proposed scheme against various steganalysis and tampering attacks.  ...  All coverless image steganography schemes can be used to achieve steganographic secret sharing, but our detection mechanism can further improve the robustness of these schemes.  ...  Also, the (k, n)-secret sharing and the authentication mechanism proposed in our scheme are more robust than that of other schemes.  ... 
doi:10.1186/s13638-022-02190-8 fatcat:hfqo3mhzw5c3tp5uu6lhnk37ae

A Survey on Image Steganography Techniques

Kamred UdhamSingh
2014 International Journal of Computer Applications  
Objectives of steganography are Undetectability, robustness and capacity of the concealed data, these key factors that separate it from related techniques like cryptography and watermarking.  ...  Steganography is an important technique for information hiding in any digital object.  ...  YASS-like method to increase the security performance of YASS via enhancing block randomization proposed by Yu et al [48] .  ... 
doi:10.5120/17105-7746 fatcat:wzcy2v44njemhanl6eb5f5xrxq

Securing Information for Commercial File Sharing by Combining Raster Graphic and Vector Graphic Steganographies

2019 International Journal of Engineering and Advanced Technology  
To implement this model an android application is developed that shares files by securing it in aforesaid fashion and transferring them via Wi-Fi Direct.  ...  The proposed model is designed so that limitations present in raster and vector steganographies each can be counterfeited to produce a secure solution that can be offered in digital image steganography  ...  Integrity check via steganography is a new emerging domain like K.  ... 
doi:10.35940/ijeat.f8005.088619 fatcat:bft5j45oajajparhqfwowz56xa

Self-Contained Stylization via Steganography for Reverse and Serial Style Transfer [article]

Hung-Yu Chen, I-Sheng Fang, Wei-Chen Chiu
2020 arXiv   pre-print
We realize that these issues are originated from the content inconsistency between the original image and its stylized output.  ...  Therefore, in this paper we advance to keep the content information of the input image during the process of style transfer by the power of steganography, with two approaches proposed: a two-stage model  ...  [7] proposes to train the steganographic algorithm and steganalyzer jointly via an adversarial scheme between threeplayers.  ... 
arXiv:1812.03910v3 fatcat:ndowt5uirzgr3lhfqcjr626fqi

Cover Reproducible Steganography via Deep Generative Models [article]

Kejiang Chen, Hang Zhou, Yaofei Wang, Menghan Li, Weiming Zhang, Nenghai Yu
2022 arXiv   pre-print
Fortunately, deep generative models and the robust semantic of generated data make it possible for the receiver to perfectly reproduce the cover signal from the stego signal.  ...  Minimal distortion steganography, one of the mainstream steganography frameworks, embeds messages while minimizing the distortion caused by the modification on the cover elements.  ...  ACKNOWLEDGMENTS The authors would like to thank DDE Laboratory of SUNY Binghamton for sharing the source code of steganography on the webpage (http://dde.binghamton.edu/download/).  ... 
arXiv:2210.14632v1 fatcat:ofkav7l2eja4thery4wdvzl2o4
« Previous Showing results 1 — 15 out of 26 results