Papers
Topics
Authors
Recent
Search
2000 character limit reached

A Novel Residual-guided Learning Method for Image Steganography

Published 2 Dec 2023 in cs.CR | (2312.01080v1)

Abstract: Traditional steganographic techniques have often relied on manually crafted attributes related to image residuals. These methods demand a significant level of expertise and face challenges in integrating diverse image residual characteristics. In this paper, we introduce an innovative deep learning-based methodology that seamlessly integrates image residuals, residual distances, and image local variance to autonomously learn embedding probabilities. Our framework includes an embedding probability generator and three pivotal guiding components: Residual guidance strives to facilitate embedding in complex-textured areas. Residual distance guidance aims to minimize the residual differences between cover and stego images. Local variance guidance effectively safeguards against modifications in regions characterized by uncomplicated or uniform textures. The three components collectively guide the learning process, enhancing the security performance. Comprehensive experimental findings underscore the superiority of our approach when compared to traditional steganographic methods and randomly initialized ReLOAD in the spatial domain.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (22)
  1. “Practical methods for minimizing embedding impact in steganography,” in Security, Steganography, and Watermarking of Multimedia Contents IX. SPIE, 2007, vol. 6505, pp. 13–27.
  2. “Minimizing additive distortion in steganography using syndrome-trellis codes,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 920–935, 2011.
  3. “Using high-dimensional image models to perform highly undetectable steganography,” in International Workshop on Information Hiding. Springer, 2010, pp. 161–177.
  4. “Sequential pattern mining using a bitmap representation,” in Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2002, pp. 429–435.
  5. “Designing steganographic distortion using directional filters,” in IEEE International Workshop on Information Forensics and Security. IEEE, 2012, pp. 234–239.
  6. “Universal distortion function for steganography in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, pp. 1–13, 2014.
  7. “A new cost function for spatial image steganography,” in IEEE International Conference on Image Processing. IEEE, 2014, pp. 4206–4210.
  8. “Automatic steganographic distortion learning using a generative adversarial network,” IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547–1551, 2017.
  9. “An embedding cost learning framework using GAN,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 839–851, 2020.
  10. “An automatic cost learning framework for image steganography using deep reinforcement learning,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 952–967, 2021.
  11. “CNN-based adversarial embedding for image steganography,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2074–2087, 2019.
  12. “Explicit optimization of min max steganographic game,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 812–823, 2020.
  13. “Ensemble stego selection for enhancing image steganography,” IEEE Signal Processing Letters, vol. 29, pp. 702–706, 2022.
  14. “Reload: Using reinforcement learning to optimize asymmetric distortion for additive steganography,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1524–1538, 2023.
  15. “Content-adaptive steganography by minimizing statistical detectability,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 221–234, 2015.
  16. “‘Break our steganographic system’: the ins and outs of organizing boss,” in International workshop on information hiding. Springer, 2011, pp. 59–70.
  17. “Universal stego post-processing for enhancing image steganography,” Journal of Information Security and Applications, vol. 55, pp. 102664, 2020.
  18. “Rich models for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868–882, 2012.
  19. “Yedroudj-Net: An efficient CNN for spatial steganalysis,” in IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, 2018, pp. 2092–2096.
  20. “Deep residual network for steganalysis of digital images,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 5, pp. 1181–1193, 2018.
  21. “Fast and effective global covariance pooling network for image steganalysis,” in ACM Workshop on Information Hiding and Multimedia Security. ACM, 2019, pp. 230–234.
  22. “Improving steganographic security by synchronizing the selection channel,” in ACM Workshop on Information Hiding and Multimedia Security. ACM, 2015, pp. 5–14.
Citations (1)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.