Adaptive spatial steganography based on adversarial examples

被引:19
|
作者
Ma, Sai [1 ,2 ]
Zhao, Xianfeng [1 ,2 ]
Liu, Yaqi [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
关键词
Steganography; Adversarial attack; Deep learning; Steganalysis; IMAGE; STEGANALYSIS;
D O I
10.1007/s11042-019-07994-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the researchers start to apply adversarial attack to enhance the security of steganographic algorithms. The typical deep learning model is vulnerable to adversarial attack. Such attack is generating special instance via neural network. The generated instance can increase the detection error of the steganalyzer. In this paper, we propose a practical adversarial method to enhance the security of typical distortion-minimizing steganographic algorithms. The proposed method is an adaptation of the Fast Gradient Sign Method in the steganography. We utilize the gradients back-propagated from the deep-learning steganalyzer to control the changing direction of the pixels. This kind of steganaographic modification in the image helps to improve the security towards the steganalysis. The experimental results prove that the proposed method can enhance the security of typical distortion-minimizing steganaographic algorithms.
引用
收藏
页码:32503 / 32522
页数:20
相关论文
共 50 条
  • [1] Adaptive spatial steganography based on adversarial examples
    Sai Ma
    Xianfeng Zhao
    Yaqi Liu
    [J]. Multimedia Tools and Applications, 2019, 78 : 32503 - 32522
  • [2] Steganalytic feature based adversarial embedding for adaptive JPEG steganography
    Ma, Sai
    Zhao, Xianfeng
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2021, 76
  • [3] Spatial adaptive steganography based on Gabor wavelet
    Wang L.
    Guo J.
    [J]. Guo, Jichang (jcguo@tju.edu.cn), 2017, Harbin Institute of Technology (49): : 73 - 79
  • [4] Enhancing JPEG Steganography using Iterative Adversarial Examples
    Mo, Huaxiao
    Song, Tingting
    Chen, Bolin
    Luo, Weiqi
    Huang, Jiwu
    [J]. 2019 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2019,
  • [5] Enhancing the Security of Deep Learning Steganography via Adversarial Examples
    Shang, Yueyun
    Jiang, Shunzhi
    Ye, Dengpan
    Huang, Jiaqing
    [J]. MATHEMATICS, 2020, 8 (09)
  • [6] Towards secured image steganography based on content-adaptive adversarial perturbation
    Sharma, Vipal Kumar
    Mir, Roohie Naaz
    Rout, Ranjeet Kumar
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [7] Enhancing the anti-steganalysis ability of steganography via adversarial examples
    Peng, Ye
    Fu, GuoBin
    Yu, Qi
    Luo, YingGuang
    Hu, Jia
    Duan, ChaoFan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 6227 - 6247
  • [8] Enhancing the anti-steganalysis ability of steganography via adversarial examples
    Ye Peng
    GuoBin Fu
    Qi Yu
    YingGuang Luo
    Jia Hu
    ChaoFan Duan
    [J]. Multimedia Tools and Applications, 2024, 83 : 6227 - 6247
  • [9] Adaptive spatial steganography based on Canny's edge detection
    Han, Tao
    Zhu, Yue-Fei
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (05): : 1266 - 1270
  • [10] Adversarial transformation network with adaptive perturbations for generating adversarial examples
    Zhang, Guoyin
    Da, Qingan
    Li, Sizhao
    Sun, Jianguo
    Wang, Wenshan
    Hu, Qing
    Lu, Jiashuai
    [J]. INTERNATIONAL JOURNAL OF BIO-INSPIRED COMPUTATION, 2022, 20 (02) : 94 - 103