Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning

  • Haichao Shi
  • Xiao-Yu Zhang
  • Shupeng WangEmail author
  • Ge FuEmail author
  • Jianqi Tang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11537)


In this work, we mainly study the mechanism of learning the steganographic algorithm as well as combining the learning process with adversarial learning to learn a good steganographic algorithm. To handle the problem of embedding secret messages into the specific medium, we design a novel adversarial module to learn the steganographic algorithm, and simultaneously train three modules called generator, discriminator and steganalyzer. Different from existing methods, the three modules are formalized as a game to communicate with each other. In the game, the generator and discriminator attempt to communicate with each other using secret messages hidden in an image. While the steganalyzer attempts to analyze whether there is a transmission of confidential information. We show that through unsupervised adversarial training, the adversarial model can produce robust steganographic solutions, which acts like an encryption. Furthermore, we propose to utilize supervised adversarial training method to train a robust steganalyzer, which is utilized to discriminate whether an image contains secret information. Extensive experiments demonstrate the effectiveness of the proposed method on publicly available datasets.


Steganography Steganalysis Adversarial learning 



This work was supported by the National Natural Science Foundation of China (Grant 61871378), and the Open Project Program of National Laboratory of Pattern Recognition (Grant 201800018).


  1. 1.
    Abadi, M., Andersen, D.G.: Learning to protect communications with adversarial neural cryptography. CoRR, abs/1610.06918 (2016)Google Scholar
  2. 2.
    Holub, V., Fridrich, J.J.: Designing steganographic distortion using directional filters. In: IEEE International Workshop on Information Forensics and Security, WIFS 2012, Costa Adeje, Tenerife, Spain, pp. 234–239 (2012)Google Scholar
  3. 3.
    Holub, V., Fridrich, J.J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014, 1 (2014)CrossRefGoogle Scholar
  4. 4.
    Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). Scholar
  5. 5.
    Xu, G., Wu, H., Shi, Y.: Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 23(5), 708–712 (2016)CrossRefGoogle Scholar
  6. 6.
    Xu, G., Wu, H., Shi, Y.Q.: Ensemble of CNNs for steganalysis: an empirical study. In: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2016, Vigo, Galicia, Spain, pp. 103–107 (2016)Google Scholar
  7. 7.
    Goodfellow, I., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 27, pp. 2672–2680. Curran Associates Inc. (2014)Google Scholar
  8. 8.
    Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: IEEE International Conference on Computer Vision, ICCV 2015, Santiago, Chile, pp. 3730–3738 (2015)Google Scholar
  9. 9.
    Abadi, M., Agarwal, A., Barham, P., et al.: Tensorflow: large-scale machine learning on heterogeneous distributed systems. CoRR, abs/1603.04467 (2016)Google Scholar
  10. 10.
    Qian, Y., Dong, J., Wang, W., Tan, T.: Deep learning for steganalysis via convolutional neural networks. In: Media Watermarking, Security, and Forensics, San Francisco, CA, USA, Proceedings, p. 94090J (2015)Google Scholar
  11. 11.
    Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)CrossRefGoogle Scholar
  12. 12.
    Ker, A.D.: Resampling and the detection of LSB matching in color bitmaps. In: Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, Proceedings, pp. 1–15 (2005)Google Scholar
  13. 13.
    Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: Precup, D., Teh, Y.W. (eds.) Proceedings of the 34th International Conference on Machine Learning, volume 70 of Proceedings of Machine Learning Research, pp. 214–223. International Convention Centre, Sydney, Australia (2017). PMLRGoogle Scholar
  14. 14.
    Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. CoRR, abs/1511.06434 (2015)Google Scholar
  15. 15.
    Odena, A., Olah, C., Shlens, J.: Conditional image synthesis with auxiliary classifier GANs. In: Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, pp. 2642–2651 (2017)Google Scholar
  16. 16.
    Chen, X., Duan, Y., Houthooft, R., Schulman, J., Sutskever, I., Abbeel, P.: Infogan: interpretable representation learning by information maximizing generative adversarial nets. In: Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems, Barcelona, Spain, pp. 2172–2180 (2016)Google Scholar
  17. 17.
    Reed, S.E., Akata, Z., Yan, X., Logeswaran, L., Schiele, B., Lee, H.: Generative adversarial text to image synthesis. In: Proceedings of the 33rd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, pp. 1060–1069 (2016)Google Scholar
  18. 18.
    Zhang, X., Shi, H., Zhu, X., Li, P.: Active semi-supervised learning based on self-expressive correlation with generative adversarial networks. Neurocomputing 2019(01), 083 (2019). Scholar
  19. 19.
    Zhang, X.: Simultaneous optimization for robust correlation estimation in partially observed social network. Neurocomputing 205, 455–462 (2016)CrossRefGoogle Scholar
  20. 20.
    Zhang, X., Wang, S., Yun, X.: Bidirectional active learning: a two-way exploration into unlabeled and labeled dataset. IEEE Trans. Neural Netw. Learn. Syst. 26(12), 3034–3044 (2015)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Zhang, X., Wang, S., Zhu, X., Yun, X., Wu, G., Wang, Y.: Update vs. upgrade: modeling with indeterminate multi-class active learning. Neurocomputing 162, 163–170 (2015)CrossRefGoogle Scholar
  22. 22.
    Zhang, X.: Interactive patent classification based on multi-classifier fusion and active learning. Neurocomputing 127, 200–205 (2014)CrossRefGoogle Scholar
  23. 23.
    Zhang, X., Shi, H., Li, C., Zheng, K., Zhu, X., Duan, L.: Learning transferable self-attentive representations for action recognition in untrimmed videos with weak supervision. In: Proceedings of the 33rd AAAI Conference on Artificial Intelligence, pp. 1–8 (2019)Google Scholar
  24. 24.
    Zhang, X., Xu, C., Cheng, J., Lu, H., Ma, S.: Effective annotation and search for video blogs with integration of context and content analysis. IEEE Trans. Multimedia 11(2), 272–285 (2009)CrossRefGoogle Scholar
  25. 25.
    Liu, Y., Zhang, X., Zhu, X., Guan, Q., Zhao, X.: ListNet-based object proposals ranking. Neurocomputing 267, 182–194 (2017)CrossRefGoogle Scholar
  26. 26.
    Li, C., Liu, Q., Liu, J., Lu, H.: Ordinal distance metric learning for image ranking. IEEE Trans. Neural Networks 26(7), 1551–1559 (2015)MathSciNetCrossRefGoogle Scholar
  27. 27.
    Li, C., Wang, X., Dong, W., Yan, J., Liu, Q., Zha, H.: Joint active learning with feature selection via cur matrix decomposition. IEEE Trans. Pattern Anal. Mach. Intell. 41(6), 1382–1396 (2019)CrossRefGoogle Scholar
  28. 28.
    Li, C., Wei, F., Dong, W., Wang, X., Liu, Q., Zhang, X.: Dynamic structure embedded online multiple-output regression for streaming data. IEEE Trans. Pattern Anal. Mach. Intell. 41(2), 323–336 (2019)CrossRefGoogle Scholar
  29. 29.
    Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: SSGAN: secure steganography based on generative adversarial networks. In: Zeng, B., Huang, Q., El Saddik, A., Li, H., Jiang, S., Fan, X. (eds.) PCM 2017. LNCS, vol. 10735, pp. 534–544. Springer, Cham (2018). Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina
  3. 3.National Computer Network Emergency Response Technical Team/Coordination Center of ChinaBeijingChina

Personalised recommendations