Skip to main content
Log in

Enhancing the anti-steganalysis ability of steganography via adversarial examples

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography technology can effectively conceal secret information in the carrier medium, enable covert communication without drawing the attention of a third party, and ensure the safe and reliable transmission of confidential information. However, with the development of steganalysis technology, steganalysers based on deep learning can accurately identify the modification traces in the steganographic cover, which poses a huge threat to steganography. Therefore, the focus of the research is how to reduce the detection accuracy of deep learning-based steganalyzer. In this work, we design an Adversarial Example STeganography (AEST) method, which hides the secret grayscale image into the color cover image to obtain the stego image that is difficult to distinguish by the naked eye. Then, the attack module composed of the FGM and PGD adversarial attacks added small perturbations to generate adversarial steganographic images, reducing the detection accuracy of the steganalyzer. In addition, to reduce the impact of adversarial examples on secret information recovery, we designed a decoder based on adversarial training and the generative adversarial network. Finally, the experimental results show that AEST has a good performance of anti-steganalysis ability. For example, the adversarial steganographic image based on PGD attack can make the detection error rate of the XuNet steganalyzer reach 63.511%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Availability of data and materials

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

Code Availability

The code during the current study are available from the corresponding author on reasonable request.

References

  1. Baluja S (2017) Hiding images in plain sight: deep steganography. Advances in Neural Information Processing Systems, 30

  2. Brock A, Donahue J, Simonyan K (2018) Large scale gan training for high fidelity natural image synthesis. arXiv:1809.11096

  3. Chan C-K, Cheng L-M (2004) Hiding data in images by simple lsb substitution. Patt Recogn 37(3):469–474

    Article  Google Scholar 

  4. Chaumont M (2020) Deep learning in steganography and steganalysis. Digital Media Steganography

  5. Donahue J, Krähenbühl P, Darrell T (2016) Adversarial feature learning. arXiv:1605.09782

  6. Frid-Adar M, Diamant I, Klang E, Amitai M, Goldberger J, Greenspan H (2018) Gan-based synthetic medical image augmentation for increased cnn performance in liver lesion classification. Neurocomputing 321:321–331

    Article  Google Scholar 

  7. Ghamizi S, Cordy M, Papadakis M, Traon Y L (2021) Evasion attack steganography: turning vulnerability of machine learning to adversarial attacks into a real-world application. In: 2021 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW), pp 31–40

  8. Ghosal S K, Chatterjee A, Sarkar R (2021) Image steganography based on kirsch edge detection. Multimed Syst 27(1):73–87

    Article  Google Scholar 

  9. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2020) Generative adversarial networks. Commun ACM 63(11):139–144

    Article  MathSciNet  Google Scholar 

  10. Goodfellow I J, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. arXiv:1412.6572

  11. Holub V, Fridrich J J (2012) Designing steganographic distortion using directional filters. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp 234–239

  12. Holub V, Fridrich J J, Denemark T (2014) Universal distortion function for steganography in an arbitrary domain. EURASIP J Inf Secur 2014:1–13

    Article  Google Scholar 

  13. Huang G B, Mattar M A, Berg T L, Learned-Miller E (2008) Labeled faces in the wild: a database forstudying face recognition in unconstrained environments

  14. Hussain M, Wahab A W A, Idris Y I B, Ho ATS, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process: Image Commun 65:46–66

    Google Scholar 

  15. Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. J Inform Secur Applic 40:217–235

    Google Scholar 

  16. Kharrazi M, Sencar H T, Memon N (2006) Cover selection for steganographic embedding. In: 2006 International conference on image processing. IEEE, pp 117–120

  17. Kurakin A, Goodfellow I J, Bengio S (2016) Adversarial examples in the physical world. arXiv:1607.02533

  18. Li B, Wang M, Huang J, Li X (2014) A new cost function for spatial image steganography. In: 2014 IEEE International Conference on Image Processing (ICIP), pp 4206–4210

  19. Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput 19(2):897–911

    Google Scholar 

  20. Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: a review. Neurocomputing 335:238–250

    Article  Google Scholar 

  21. Liu J, Ke Y, Zhang Z, Lei Y, Li J, Zhang M, Yang X (2020) Recent advances of image steganography with generative adversarial networks. IEEE Access 8:60575–60597

    Article  Google Scholar 

  22. Liu X, Ma Z, Ma J, Zhang J, Schaefer G, Fang H (2022) Image disentanglement autoencoder for steganography without embedding. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 2303–2312

  23. Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2018) Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083

  24. Pan W, Yin Y, Wang X, Jing Y, Song M (2021) Seek-and-hide: adversarial steganography via deep reinforcement learning. IEEE Trans Pattern Anal Mach Intell 44(11):7871–7884

    Article  Google Scholar 

  25. Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Information hiding: 12th international conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, revised selected papers 12. Springer, pp 161–177

  26. Qian Y, Dong J, Wang W, Tan T (2015) Deep learning for steganalysis via convolutional neural networks. In: Electronic imaging

  27. Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE International Conference on Image Processing (ICIP). IEEE, pp 2752–2756

  28. Reinel T-S, Raul R-P, Gustavo I (2019) Deep learning applied to steganalysis of digital images: a systematic review. IEEE Access 7:68970–68990

    Article  Google Scholar 

  29. Ruan F, Zhang X, Zhu D, Xu Z, Wan S, Qi L (2020) Deep learning for real-time image steganalysis: a survey. J Real-Time Image Proc 17:149–160

    Article  Google Scholar 

  30. Subhedar M S, Mankar V H (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13:95–113

    Article  Google Scholar 

  31. Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: a review of the recent advances. IEEE access 9:23409–23423

    Article  Google Scholar 

  32. Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 2818–2826

  33. Tang W, Tan S, Li B, Huang J (2017) Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett 24(10):1547–1551

    Article  Google Scholar 

  34. Tang W, Li B, Tan S, Barni M, Huang J (2019) Cnn-based adversarial embedding for image steganography. IEEE Trans Inf Forensics Secur 14:2074–2087

    Article  Google Scholar 

  35. Tang W, Li B, Barni M, Li J, Huang J (2020) An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Trans Inf Forensics Secur 16:952–967

    Article  Google Scholar 

  36. Wang Z, Bovik A C, Sheikh H R, Simoncelli E P (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  37. Wu S, Zhong S, Liu Y (2018) Deep residual learning for image steganalysis. Multimed Tools Applic 77:10437–10453

    Article  Google Scholar 

  38. Wu C, Huang F, Dai J, Zhou N (2022) Quantum susan edge detection based on double chains quantum genetic algorithm. Physica A 605:128017

    Article  MathSciNet  Google Scholar 

  39. Xu G (2017) Deep convolutional neural network to detect j-uniward. In: Proceedings of the 5th ACM workshop on information hiding and multimedia security

  40. Yang J, Ruan D, Huang J, Kang X, Shi Y-Q (2019) An embedding cost learning framework using gan. IEEE Trans Inf Forensics Secur 15:839–851

    Article  Google Scholar 

  41. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12:2545–2557

    Article  Google Scholar 

  42. Yedroudj M, Comby F, Chaumont M (2018) Yedroudj-net: an efficient cnn for spatial steganalysis. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 2092–2096

  43. Zeng J, Tan S, Li B, Huang J (2018) Large-scale jpeg image steganalysis using hybrid deep-learning framework. IEEE Trans Inf Forensics Secur 13:1200–1214

    Article  Google Scholar 

  44. Zhang K A, Cuesta-Infante A, Xu L, Veeramachaneni K (2019) Steganogan: high capacity image steganography with gans. arXiv:1901.03892

  45. Zhang C, Benz P, Karjauv A, Kweon I S (2021) Universal adversarial perturbations through the lens of deep steganography: towards a fourier perspective. In: Proceedings of the AAAI conference on artificial intelligence, vol 35, pp 3296–3304

  46. Zhou N-R, Zhang T-F, Xie X-W, Wu J-Y (2023) Hybrid quantum–classical generative adversarial networks for image generation via learning discrete distribution. Signal Process: Image Commun 110:116891

    Google Scholar 

  47. Zhu J-Y, Park T, Isola P, Efros A A (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp 2223–2232

Download references

Funding

Nofunds, grants, or other support was received.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Ye Peng, GuoBin Fu, Qi Yu, YingGunag Luo, Jia Hu and ChaoFan Duan. The first draft of the manuscript was written by Ye Peng and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to YingGuang Luo.

Ethics declarations

Competing interests

The authors have no competing interests to declare that are relevant to the content of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, Y., Fu, G., Yu, Q. et al. Enhancing the anti-steganalysis ability of steganography via adversarial examples. Multimed Tools Appl 83, 6227–6247 (2024). https://doi.org/10.1007/s11042-023-15306-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15306-z

Keywords

Navigation