DeepAI AI Chat
Log In Sign Up

Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks

by   Yan Ke, et al.

The distortion in steganography that usually comes from the modification or recoding on the cover image during the embedding process leaves the steganalyzer with possibility of discriminating. Faced with such a risk, we propose generative steganography with Kerckhoffs' principle (GSK) in this letter. In GSK, the secret messages are generated by a cover image using a generator rather than embedded into the cover, thus resulting in no modifications in the cover. To ensure the security, the generators are trained to meet Kerckhoffs' principle based on generative adversarial networks (GAN). Everything about the GSK system, except the extraction key, is public knowledge for the receivers. The secret messages can be outputted by the generator if and only if the extraction key and the cover image are both inputted. In the generator training procedures, there are two GANs, Message- GAN and Cover-GAN, designed to work jointly making the generated results under the control of the extraction key and the cover image. We provide experimental results on the training process and give an example of the working process by adopting a generator trained on MNIST, which demonstrate that GSK can use a cover image without any modification to generate messages, and without the extraction key or the cover image, only meaningless results would be obtained.


Recent Advances of Image Steganography with Generative Adversarial Networks

In the past few years, the Generative Adversarial Network (GAN) which pr...

Hiding Images in Deep Probabilistic Models

Data hiding with deep neural networks (DNNs) has experienced impressive ...

Generative Steganography Network

Steganography usually modifies cover media to embed secret data. A new s...

Generative Steganography by Sampling

In this paper, a new data-driven information hiding scheme called genera...

Cover Reproducible Steganography via Deep Generative Models

Whereas cryptography easily arouses attacks by means of encrypting a sec...

Spatial Image Steganography Based on Generative Adversarial Network

With the recent development of deep learning on steganalysis, embedding ...

Invisible Steganography via Generative Adversarial Networks

Nowadays, there are plenty of works introducing convolutional neural net...