JPEG Steganography with Embedding Cost Learning and Side-Information Estimation

07/28/2021
by   Jianhua Yang, et al.
0

A great challenge to steganography has arisen with the wide application of steganalysis methods based on convolutional neural networks (CNNs). To this end, embedding cost learning frameworks based on generative adversarial networks (GANs) have been proposed and achieved success for spatial steganography. However, the application of GAN to JPEG steganography is still in the prototype stage; its anti-detectability and training efficiency should be improved. In conventional steganography, research has shown that the side-information calculated from the precover can be used to enhance security. However, it is hard to calculate the side-information without the spatial domain image. In this work, an embedding cost learning framework for JPEG Steganography via a Generative Adversarial Network (JS-GAN) has been proposed, the learned embedding cost can be further adjusted asymmetrically according to the estimated side-information. Experimental results have demonstrated that the proposed method can automatically learn a content-adaptive embedding cost function, and use the estimated side-information properly can effectively improve the security performance. For example, under the attack of a classic steganalyzer GFR with quality factor 75 and 0.4 bpnzAC, the proposed JS-GAN can increase the detection error 2.58 side-information aided version JS-GAN(ESI) can further increase the security performance by 11.25

READ FULL TEXT

page 1

page 8

research
10/26/2018

Building Footprint Generation Using Improved Generative Adversarial Networks

Building footprint information is an essential ingredient for 3-D recons...
research
08/26/2019

End-to-End Conditional GAN-based Architectures for Image Colourisation

In this work recent advances in conditional adversarial networks are inv...
research
04/21/2018

Spatial Image Steganography Based on Generative Adversarial Network

With the recent development of deep learning on steganalysis, embedding ...
research
08/26/2020

An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network

As a widely deployed security scheme, text-based CAPTCHAs have become mo...
research
10/25/2021

GANash – A GAN approach to steganography

Data security is of the utmost concern of a communication system. Since ...
research
08/20/2021

Zoom, Enhance! Measuring Surveillance GAN Up-sampling

Deep Neural Networks have been very successfully used for many computer ...
research
06/17/2021

Deep HDR Hallucination for Inverse Tone Mapping

Inverse Tone Mapping (ITM) methods attempt to reconstruct High Dynamic R...

Please sign up or login with your details

Forgot password? Click here to reset