Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding

08/03/2023
by   Hangcheng Liu, et al.
0

Deep hiding, embedding images with others using deep neural networks, has demonstrated impressive efficacy in increasing the message capacity and robustness of secret sharing. In this paper, we challenge the robustness of existing deep hiding schemes by preventing the recovery of secret images, building on our in-depth study of state-of-the-art deep hiding schemes and their vulnerabilities. Leveraging our analysis, we first propose a simple box-free removal attack on deep hiding that does not require any prior knowledge of the deep hiding schemes. To improve the removal performance on the deep hiding schemes that may be enhanced by adversarial training, we further design a more powerful removal attack, efficient box-free removal attack (EBRA), which employs image inpainting techniques to remove secret images from container images. In addition, to ensure the effectiveness of our attack and preserve the fidelity of the processed container images, we design an erasing phase based on the locality of deep hiding to remove secret information and then make full use of the visual information of container images to repair the erased visual content. Extensive evaluations show our method can completely remove secret images from container images with negligible impact on the quality of container images.

READ FULL TEXT

page 3

page 4

page 6

page 8

page 11

page 12

page 15

page 17

research
06/05/2021

PEEL: A Provable Removal Attack on Deep Hiding

Deep hiding, embedding images into another using deep neural networks, h...
research
02/28/2019

PixelSteganalysis: Pixel-wise Hidden Information Removal with Low Visual Degradation

It is difficult to detect and remove secret images that are hidden in na...
research
06/30/2011

Visual Secret Sharing Scheme using Grayscale Images

Pixel expansion and the quality of the reconstructed secret image has be...
research
11/18/2022

Potential Auto-driving Threat: Universal Rain-removal Attack

The problem of robustness in adverse weather conditions is considered a ...
research
10/28/2022

Learning to Immunize Images for Tamper Localization and Self-Recovery

Digital images are vulnerable to nefarious tampering attacks such as con...
research
12/27/2007

Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images

Visual secrete sharing (VSS) is an encryption technique that utilizes hu...
research
07/13/2021

Multitask Identity-Aware Image Steganography via Minimax Optimization

High-capacity image steganography, aimed at concealing a secret image in...

Please sign up or login with your details

Forgot password? Click here to reset