EncryptGAN: Image Steganography with Domain Transform

by   Ziqiang Zheng, et al.

We propose an image steganographic algorithm called EncryptGAN, which disguises private image communication in an open communication channel. The insight is that content transform between two very different domains (e.g., face to flower) allows one to hide image messages in one domain (face) and communicate using its counterpart in another domain (flower). The key ingredient in our method, unlike related approaches, is a specially trained network to extract transformed images from both domains and use them as the public and private keys. We ensure the image communication remain secret except for the intended recipient even when the content transformation networks are exposed. To communicate, one directly pastes the `message' image onto a larger public key image (face). Depending on the location and content of the message image, the `disguise' image (flower) alters its appearance and shape while maintaining its overall objectiveness (flower). The recipient decodes the alternated image to uncover the original image message using its message image key. We implement the entire procedure as a constrained Cycle-GAN, where the public and the private key generating network is used as an additional constraint to the cycle consistency. Comprehensive experimental results show our EncryptGAN outperforms the state-of-arts in terms of both encryption and security measures.


page 4

page 5

page 7

page 8

page 9


The Reincarnation of Grille Cipher: A Generative Approach

In order to keep the data secret, various techniques have been implement...

Using Chaotic Stream Cipher to Enhance Data Hiding in Digital Images

The growing potential of modern communications needs the use of secure m...

Digital Cardan Grille: A Modern Approach for Information Hiding

In this paper, a new framework for construction of Cardan grille for inf...

A Public-Key Cryptosystem Using Cyclotomic Matrices

Confidentiality and Integrity are two paramount objectives of asymmetric...

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

The modified Paillier cryptosystem has become extremely popular and appl...

Public key cryptosystems based on Iterated Functions Systems

Let f=(f_0,f_1,…, f_ν-1) be a collection of one-to-one functions from so...

Distributed Computations in Fully-Defective Networks

We address fully-defective asynchronous networks, in which all links are...

Please sign up or login with your details

Forgot password? Click here to reset