Enhancing JPEG Steganography using Iterative Adversarial Examples

被引:20
|
作者
Mo, Huaxiao [1 ]
Song, Tingting [1 ]
Chen, Bolin [1 ]
Luo, Weiqi [1 ]
Huang, Jiwu [2 ]
机构
[1] Sun Yat Sen Univ, Guangdong Key Lab Informat Secur, Guangzhou, Peoples R China
[2] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen Key Lab Media Secur, Shenzhen, Peoples R China
关键词
D O I
10.1109/wifs47025.2019.9035101
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Convolutional Neural Networks (CNN) based methods have significantly improved the performance of image steganalysis compared with conventional ones based on hand-crafted features. However, many existing literatures on computer vision have pointed out that those effective CNN-based methods can be easily fooled by adversarial examples [1]. In this paper, we propose a steganography method based on adversarial example in an iterative manner. The proposed method first starts from an existing embedding cost, such as J-UNIWARD [2] in this work, and then updates the cost iteratively based on adversarial examples derived from a series of steganalytic networks until achieving satisfactory results. We carefully analyze two important factors that would affect the security performance of the proposed framewrork, i.e., the percentage of selected gradients with larger amplitude and the adversarial intensity to modify embedding cost. The experimental results evaluated on three modern steganalytic models, including GFR, SCA-GFR and SRNet, show that the proposed method is very promising to enhance the security performances of JPEG steganography.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [1] Enhancing the Security of Deep Learning Steganography via Adversarial Examples
    Shang, Yueyun
    Jiang, Shunzhi
    Ye, Dengpan
    Huang, Jiaqing
    MATHEMATICS, 2020, 8 (09)
  • [2] Enhancing the anti-steganalysis ability of steganography via adversarial examples
    Peng, Ye
    Fu, GuoBin
    Yu, Qi
    Luo, YingGuang
    Hu, Jia
    Duan, ChaoFan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 6227 - 6247
  • [3] Enhancing the anti-steganalysis ability of steganography via adversarial examples
    Ye Peng
    GuoBin Fu
    Qi Yu
    YingGuang Luo
    Jia Hu
    ChaoFan Duan
    Multimedia Tools and Applications, 2024, 83 : 6227 - 6247
  • [4] Adaptive spatial steganography based on adversarial examples
    Ma, Sai
    Zhao, Xianfeng
    Liu, Yaqi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (22) : 32503 - 32522
  • [5] Adaptive spatial steganography based on adversarial examples
    Sai Ma
    Xianfeng Zhao
    Yaqi Liu
    Multimedia Tools and Applications, 2019, 78 : 32503 - 32522
  • [6] Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples
    Liu, Guanxiong
    Khalil, Issa
    Khreishah, Abdallah
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 17 - 27
  • [7] JPEG Steganography Using BPCS
    Andrieux, Flavien
    Deltel, Clement
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 163 - 163
  • [8] Steganalytic feature based adversarial embedding for adaptive JPEG steganography
    Ma, Sai
    Zhao, Xianfeng
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2021, 76
  • [9] Adversarial robust image steganography against lossy JPEG compression
    Liu, Minglin
    Fan, Hangyu
    Wei, Kangkang
    Luo, Weiqi
    Lu, Wei
    SIGNAL PROCESSING, 2022, 200
  • [10] Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training
    Yang J.
    Shang F.
    Liao Y.
    Chen Y.
    Security and Communication Networks, 2023, 2023