EncryptGAN: Image Steganography with Domain Transform

05/28/2019
by   Ziqiang Zheng, et al.
0

We propose an image steganographic algorithm called EncryptGAN, which disguises private image communication in an open communication channel. The insight is that content transform between two very different domains (e.g., face to flower) allows one to hide image messages in one domain (face) and communicate using its counterpart in another domain (flower). The key ingredient in our method, unlike related approaches, is a specially trained network to extract transformed images from both domains and use them as the public and private keys. We ensure the image communication remain secret except for the intended recipient even when the content transformation networks are exposed. To communicate, one directly pastes the `message' image onto a larger public key image (face). Depending on the location and content of the message image, the `disguise' image (flower) alters its appearance and shape while maintaining its overall objectiveness (flower). The recipient decodes the alternated image to uncover the original image message using its message image key. We implement the entire procedure as a constrained Cycle-GAN, where the public and the private key generating network is used as an additional constraint to the cycle consistency. Comprehensive experimental results show our EncryptGAN outperforms the state-of-arts in terms of both encryption and security measures.

READ FULL TEXT

page 4

page 5

page 7

page 8

page 9

research
04/18/2018

The Reincarnation of Grille Cipher: A Generative Approach

In order to keep the data secret, various techniques have been implement...
research
01/04/2021

Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images

The growing potential of modern communications needs the use of secure m...
research
03/25/2018

Digital Cardan Grille: A Modern Approach for Information Hiding

In this paper, a new framework for construction of Cardan grille for inf...
research
06/17/2019

A Public-Key Cryptosystem Using Cyclotomic Matrices

Confidentiality and Integrity are two paramount objectives of asymmetric...
research
12/19/2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

The modified Paillier cryptosystem has become extremely popular and appl...
research
09/12/2023

Public key cryptosystems based on Iterated Functions Systems

Let f=(f_0,f_1,…, f_ν-1) be a collection of one-to-one functions from so...
research
05/23/2022

Distributed Computations in Fully-Defective Networks

We address fully-defective asynchronous networks, in which all links are...

Please sign up or login with your details

Forgot password? Click here to reset