• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

High-Capacity Robust Image Steganography via Adversarial Network

Vol. 14, No. 1, January 31, 2020
10.3837/tiis.2020.01.020, Download Paper (Free):


Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.


Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.

Cite this article

[IEEE Style]
B. Chen, J. Wang, Y. Chen, Z. Jin, H. J. Shim, Y. Shi, "High-Capacity Robust Image Steganography via Adversarial Network," KSII Transactions on Internet and Information Systems, vol. 14, no. 1, pp. 366-381, 2020. DOI: 10.3837/tiis.2020.01.020.

[ACM Style]
Beijing Chen, Jiaxin Wang, Yingyue Chen, Zilong Jin, Hiuk Jae Shim, and Yun-Qing Shi. 2020. High-Capacity Robust Image Steganography via Adversarial Network. KSII Transactions on Internet and Information Systems, 14, 1, (2020), 366-381. DOI: 10.3837/tiis.2020.01.020.

[BibTeX Style]
@article{tiis:23237, title="High-Capacity Robust Image Steganography via Adversarial Network", author="Beijing Chen and Jiaxin Wang and Yingyue Chen and Zilong Jin and Hiuk Jae Shim and Yun-Qing Shi and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2020.01.020}, volume={14}, number={1}, year="2020", month={January}, pages={366-381}}