Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks

by   Yan Ke, et al.

The distortion in steganography that usually comes from the modification or recoding on the cover image during the embedding process leaves the steganalyzer with possibility of discriminating. Faced with such a risk, we propose generative steganography with Kerckhoffs' principle (GSK) in this letter. In GSK, the secret messages are generated by a cover image using a generator rather than embedded into the cover, thus resulting in no modifications in the cover. To ensure the security, the generators are trained to meet Kerckhoffs' principle based on generative adversarial networks (GAN). Everything about the GSK system, except the extraction key, is public knowledge for the receivers. The secret messages can be outputted by the generator if and only if the extraction key and the cover image are both inputted. In the generator training procedures, there are two GANs, Message- GAN and Cover-GAN, designed to work jointly making the generated results under the control of the extraction key and the cover image. We provide experimental results on the training process and give an example of the working process by adopting a generator trained on MNIST, which demonstrate that GSK can use a cover image without any modification to generate messages, and without the extraction key or the cover image, only meaningless results would be obtained.



There are no comments yet.


page 4


Recent Advances of Image Steganography with Generative Adversarial Networks

In the past few years, the Generative Adversarial Network (GAN) which pr...

Generative Reversible Data Hiding by Image to Image Translation via GANs

The traditional reversible data hiding technique is based on cover image...

Generative Steganography by Sampling

In this paper, a new data-driven information hiding scheme called genera...

Spatial Image Steganography Based on Generative Adversarial Network

With the recent development of deep learning on steganalysis, embedding ...

Invisible Steganography via Generative Adversarial Networks

Nowadays, there are plenty of works introducing convolutional neural net...

The Reincarnation of Grille Cipher: A Generative Approach

In order to keep the data secret, various techniques have been implement...

Steganography of Complex Networks

Steganography is one of the information hiding techniques, which conceal...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.