Abstract

Recently, convolutional neural network has been introduced to information hiding and deep net- work has shown great potential in steganography. However, one drawback of deep network is that it’s sensitive to small fluctuations. In previous works, the encoder-decoder structure is trained end-to-end, but in practice, encoder and decoder should be used separately. Therefore, end-to-end trained steganography networks are vulnerable to fluctuations and the secret decoded from those networks suffers from unpleasant noise. In this work, we present an image-in-image steganog- raphy method called TISGAN to achieve better results, both in image quality and security. In particular, we divide the training process into two parts. Moreover, perceptual loss is applied to encoder, to improve security in our work. We also append a denoising structure to the end of de- coder to achieve better image quality. Finally, the adversarial structure with useful techniques employed is also used in secret revealed process.

Highlights

  • Steganography is a technology in the field of information hiding

  • End-to-end-trained steganography networks are vulnerable to fluctuations, and the secret decoded from those networks suffers from unpleasant noise

  • We introduced two-step image-in-image steganography via GAN, a new trainable framework for imagein-image steganography, to solve problems existing in their work

Read more

Summary

Introduction

Steganography is a technology in the field of information hiding. It is defined as concealing a file, message, image, or video within another carrier medium. We focus on steganography in image, one of the most commonly used medium. In an image steganography case (Abadi & Andersen, 2016), Alice encodes a secret message in an image and send it through the public channel to Bob, who can decode the image and extract secret message from it. Eve can’t distinguish whether the image Alice sent contains secret or not. Eve’s detecting stego image is called steganalysis, a technology against steganography

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.