Skip to main content

NAS-StegNet: Lightweight Image Steganography Networks via Neural Architecture Search

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13625))

Included in the following conference series:

Abstract

Deep steganography describes the task of hiding a full image in another for secret communication, and such a model usually consists of hide (H) network for secret hiding followed by revealing (R) network for secret revealing. To guarantee the hiding effect for the secret communication applications (e.g., watermarking and light field messaging), most of existing deep steganography models design complex network architecture for H and R, increasing the challenge for model deployment. To achieve a better trade-off between steganography effect and model complexity, in this paper, we explore the idea of neural architecture search to learn a more practical deep steganography network, which is able to produce powerful steganography results but with much less parameters. Specifically, our automatically-learned network, termed as NAS-StegaNet, has 26\(\times \) fewer parameters and requires 2\(\times \) fewer GFLOPs when compared with the most powerful model. Codes are available at https://github.com/wang-MIG-CFM-UESTC/nas_stegan.git.

Supported by the National Natural Science Foundation of China under grant 62102069, U20B2063 and 62220106008, the Sichuan Science and Technology Program under grant 2022YFG0032, and the Dongguan Songshan Lake Introduction Program of Leading Innovative and Entrepreneurial Talents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mondal, S., Ling, Y., Ambikapathi, A.: H-Stegonet: a hybrid deep learning framework for robust steganalysis. In: 2021 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6 (2021)

    Google Scholar 

  2. Baluja, S.: Hiding images in plain sight: deep steganography. In: Advances in Neural Information Processing Systems (NIPS), vol. 30 (2017)

    Google Scholar 

  3. Hussain, M., Wahab, A., Idris, Y., Ho, A., Jung, K.: Image steganography in spatial domain: a survey. In: Signal Processing: Image Communication, vol. 65, pp. 46–66 (2018)

    Google Scholar 

  4. Byrnes, O., La, W., Wang, H., Ma, C., Xue, M., Wu, Q.: Data hiding with deep learning: a survey unifying digital watermarking and steganography. In: arXiv preprint, arXiv:2107.09287 (2021)

  5. Pevný, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol. 6387, pp. 161–177. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-16435-4_13

    Chapter  Google Scholar 

  6. Das, A., Wahi, J.S., Anand, M., Rana, Y.: Multi-image steganography using deep neural networks. In: arXiv preprint, arXiv:2101.00350 (2021)

  7. Khan, N., Haan, R., Boktor, G., McComas, M., Daneshi, R.: Steganography GAN: cracking steganography with cycle generative adversarial networks. In: arXiv preprint, arXiv:2006.04008 (2020)

  8. Dinh, L., David, K., Yoshua, B.: Nice: non-linear independent components estimation. In: arXiv preprint, arXiv:1410.8516 (2014)

  9. Lu, S., Wang, R., Zhong, T., Rosin, P.: Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10816–10825 (2021)

    Google Scholar 

  10. Zhang, C., Benz, P., Karjauv, A., Sun, G., Kweon, I.: UDH: universal deep hiding for steganography, watermarking, and light field messaging. In: Advances in Neural Information Processing Systems (NIPS), vol. 33, pp. 10223–10234 (2020)

    Google Scholar 

  11. Zhu, J., Kaplan, R., Johnson, J., Li, F., Jung, K.: HiDDeN: hiding data with deep networks. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 657–672 (2018)

    Google Scholar 

  12. Wu P., Yang Y., Li, X.: StegNet: mega image steganography capacity with deep convolutional network. In: Future Internet, vol. 10 (2018)

    Google Scholar 

  13. Liu, H., Simonyan, K., Yang, Y.: DARTS: differentiable architecture search. In: arXiv preprint, arXiv:1806.09055 (2018)

  14. Xu, Y., et al.: PC-DARTS: partial channel connections for memory-efficient architecture search. In: arXiv preprint, arXiv:1907.05737 (2019)

  15. Weng, Y., Zhou, T., Li, Y., Qiu, X.: NAS-Unet: neural architecture search for medical image segmentation. In: IEEE Access, vol. 7, pp. 44247–44257 (2019)

    Google Scholar 

  16. Liu, C., et al.: Auto-deeplab: hierarchical neural architecture search for semantic image segmentation. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 82–92 (2019)

    Google Scholar 

  17. Deng, J., Dong, W., Socher, R., Li, J., Li, K., Li, F.: ImageNet: a large-scale hierarchical image database. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 248–255 (2009)

    Google Scholar 

  18. Alex, K.: Learning multiple layers of features from tiny images. In: Citeseer (2009)

    Google Scholar 

  19. Kessler, G., Hosmer, C.: An overview of steganography. In: Advances in Computers, vol. 83, pp. 51–107 (2011)

    Google Scholar 

  20. Isola, P., Zhu, J., Zhou, T., Efros, A.: Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1125–1134 (2017)

    Google Scholar 

  21. Boroumand, M., Mehdi, C., Fridrich, J.: Deep residual network for steganalysis of digital images. In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 14, pp. 1181–1193 (2018)

    Google Scholar 

  22. Zhang, R., Zhu, F., Liu, J., Liu, G.: Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. In: IEEE Transactions on Information Forensics and Security (TIFS), vol. 15, pp. 1138–1150 (2019)

    Google Scholar 

  23. Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 234–241 (2015)

    Google Scholar 

  24. Pham, H., Guan, M., Zoph, B., Le, Q., Dean, J.: Efficient neural architecture search via parameters sharing. In: International Conference on Machine Learning (ICML), pp. 4095–4104 (2018)

    Google Scholar 

  25. Elsken, T., Metzen, J., Hutter, F.: Neural architecture search: a survey. In: The Journal of Machine Learning Research, vol. 20, pp. 1997–2017 (2019)

    Google Scholar 

  26. Real, E., Aggarwal, A., Huang, Y., Le, Q.: Regularized evolution for image classifier architecture search. In: Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI), vol. 33, pp. 4780–4789 (2019)

    Google Scholar 

  27. Zhang, K., Alfredo, C., Xu, L., Veeramachaneni, K.: SteganoGAN: high capacity image steganography with GANs. In: arXiv preprint, arXiv:1901.03892 (2019)

  28. Zhu, J., Park, T., Isola, P., Efros, A.: Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 2223–2232 (2017)

    Google Scholar 

  29. Jing, J., Deng, X., Xu, M., Wang, J., Guan, Z.: HiNet: deep image hiding by invertible network. In: Proceedings of the IEEE International Conference on Computer Vision (ICCV), pp. 4733–4742 (2021)

    Google Scholar 

  30. Lu, S., Wang, R., Zhang, T., Rosin, P.: Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 10816–10825 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guoqing Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Z., Wang, G., Yang, Y. (2023). NAS-StegNet: Lightweight Image Steganography Networks via Neural Architecture Search. In: Tanveer, M., Agarwal, S., Ozawa, S., Ekbal, A., Jatowt, A. (eds) Neural Information Processing. ICONIP 2022. Lecture Notes in Computer Science, vol 13625. Springer, Cham. https://doi.org/10.1007/978-3-031-30111-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30111-7_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30110-0

  • Online ISBN: 978-3-031-30111-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics