DeepAI AI Chat
Log In Sign Up

EncryptGAN: Image Steganography with Domain Transform

05/28/2019
by   Ziqiang Zheng, et al.
0

We propose an image steganographic algorithm called EncryptGAN, which disguises private image communication in an open communication channel. The insight is that content transform between two very different domains (e.g., face to flower) allows one to hide image messages in one domain (face) and communicate using its counterpart in another domain (flower). The key ingredient in our method, unlike related approaches, is a specially trained network to extract transformed images from both domains and use them as the public and private keys. We ensure the image communication remain secret except for the intended recipient even when the content transformation networks are exposed. To communicate, one directly pastes the `message' image onto a larger public key image (face). Depending on the location and content of the message image, the `disguise' image (flower) alters its appearance and shape while maintaining its overall objectiveness (flower). The recipient decodes the alternated image to uncover the original image message using its message image key. We implement the entire procedure as a constrained Cycle-GAN, where the public and the private key generating network is used as an additional constraint to the cycle consistency. Comprehensive experimental results show our EncryptGAN outperforms the state-of-arts in terms of both encryption and security measures.

READ FULL TEXT

page 4

page 5

page 7

page 8

page 9

04/18/2018

The Reincarnation of Grille Cipher: A Generative Approach

In order to keep the data secret, various techniques have been implement...
01/04/2021

Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images

The growing potential of modern communications needs the use of secure m...
03/25/2018

Digital Cardan Grille: A Modern Approach for Information Hiding

In this paper, a new framework for construction of Cardan grille for inf...
06/17/2019

A Public-Key Cryptosystem Using Cyclotomic Matrices

Confidentiality and Integrity are two paramount objectives of asymmetric...
12/19/2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

The modified Paillier cryptosystem has become extremely popular and appl...
09/05/2019

A Private and Unlinkable Message Exchange Using a Public bulletin board in Opportunistic Networks

We plan to simulate a private and unlinkable exchange of messages by usi...
10/01/2018

TZC: Efficient Inter-Process Communication for Robotics Middleware with Partial Serialization

Inter-process communication (IPC) is one of the core functions of modern...