A Novel Residual-guided Learning Method for Image Steganography
Abstract: Traditional steganographic techniques have often relied on manually crafted attributes related to image residuals. These methods demand a significant level of expertise and face challenges in integrating diverse image residual characteristics. In this paper, we introduce an innovative deep learning-based methodology that seamlessly integrates image residuals, residual distances, and image local variance to autonomously learn embedding probabilities. Our framework includes an embedding probability generator and three pivotal guiding components: Residual guidance strives to facilitate embedding in complex-textured areas. Residual distance guidance aims to minimize the residual differences between cover and stego images. Local variance guidance effectively safeguards against modifications in regions characterized by uncomplicated or uniform textures. The three components collectively guide the learning process, enhancing the security performance. Comprehensive experimental findings underscore the superiority of our approach when compared to traditional steganographic methods and randomly initialized ReLOAD in the spatial domain.
- “Practical methods for minimizing embedding impact in steganography,” in Security, Steganography, and Watermarking of Multimedia Contents IX. SPIE, 2007, vol. 6505, pp. 13–27.
- “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920–935, 2011.
- “Using high-dimensional image models to perform highly undetectable steganography,” in International Workshop on Information Hiding. Springer, 2010, pp. 161–177.
- “Sequential pattern mining using a bitmap representation,” in Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2002, pp. 429–435.
- “Designing steganographic distortion using directional filters,” in IEEE International Workshop on Information Forensics and Security. IEEE, 2012, pp. 234–239.
- “Universal distortion function for steganography in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, pp. 1–13, 2014.
- “A new cost function for spatial image steganography,” in IEEE International Conference on Image Processing. IEEE, 2014, pp. 4206–4210.
- “Automatic steganographic distortion learning using a generative adversarial network,” IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547–1551, 2017.
- “An embedding cost learning framework using GAN,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 839–851, 2020.
- “An automatic cost learning framework for image steganography using deep reinforcement learning,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 952–967, 2021.
- “CNN-based adversarial embedding for image steganography,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2074–2087, 2019.
- “Explicit optimization of min max steganographic game,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 812–823, 2020.
- “Ensemble stego selection for enhancing image steganography,” IEEE Signal Processing Letters, vol. 29, pp. 702–706, 2022.
- “Reload: Using reinforcement learning to optimize asymmetric distortion for additive steganography,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1524–1538, 2023.
- “Content-adaptive steganography by minimizing statistical detectability,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 221–234, 2015.
- “‘Break our steganographic system’: the ins and outs of organizing boss,” in International workshop on information hiding. Springer, 2011, pp. 59–70.
- “Universal stego post-processing for enhancing image steganography,” Journal of Information Security and Applications, vol. 55, pp. 102664, 2020.
- “Rich models for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868–882, 2012.
- “Yedroudj-Net: An efficient CNN for spatial steganalysis,” in IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2018, pp. 2092–2096.
- “Deep residual network for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181–1193, 2018.
- “Fast and effective global covariance pooling network for image steganalysis,” in ACM Workshop on Information Hiding and Multimedia Security. ACM, 2019, pp. 230–234.
- “Improving steganographic security by synchronizing the selection channel,” in ACM Workshop on Information Hiding and Multimedia Security. ACM, 2015, pp. 5–14.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.