scispace - formally typeset
Open AccessJournal ArticleDOI

Adversarial Learning for Invertible Steganography

Ching-Chun Chang
- 30 Oct 2020 - 
- Vol. 8, pp 198425-198435
Reads0
Chats0
TLDR
This paper revisits the regular-singular method and shows that this elegant but obsolete invertible steganographic method can be reinvigorated and brought forwards to modern generation via neuralisation, and introduces adversarial learning to capture the regularity of natural images automatically in contrast to handcrafted discrimination functions based on heuristic image prior.
Abstract
Deep neural networks have revolutionised the research landscape of steganography. However, their potential has not been explored in invertible steganography, a special class of methods that permits the recovery of distorted objects due to steganographic perturbations to their pristine condition. In this paper, we revisit the regular-singular (RS) method and show that this elegant but obsolete invertible steganographic method can be reinvigorated and brought forwards to modern generation via neuralisation . Towards developing a renewed RS method, we introduce adversarial learning to capture the regularity of natural images automatically in contrast to handcrafted discrimination functions based on heuristic image prior. Specifically, we train generative adversarial networks (GANs) to predict bit-planes that have been used to carry hidden information. We then form a synthetic image and use it as a reference to provide guidance on data embedding and image recovery. Experimental results showed a significant improvement over the prior implementation of the RS method based on large-scale statistical evaluations.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Neural Reversible Steganography with Long Short-Term Memory

TL;DR: In this article, the authors proposed to refine the prior estimation from a conventional linear predictor through a neural network model and explore a leading-edge neuroscience-inspired low-level vision model based on long short-term memory with a brief discussion of its biological plausibility.
Journal ArticleDOI

A Watermarking Scheme for Color Image Using Quaternion Discrete Fourier Transform and Tensor Decomposition

TL;DR: The experimental results indicate that the proposed scheme has better fidelity and stronger robustness for common image-processing and geometric attacks, can effectively resist each color channel exchange attack, and achieves better performance.
Journal ArticleDOI

High-Capacity Reversible Data Hiding in Encrypted Images Based on Hierarchical Quad-Tree Coding and Multi-MSB Prediction

TL;DR: A new RDHEI method on the basis of hierarchical quad-tree coding and multi-MSB (most significant bit) prediction is proposed, which shows that the average embedding rates of the proposed method can separately reach higher than some state-of-the-art methods.
Journal ArticleDOI

Reversible Data Hiding Scheme Based on VQ Prediction and Adaptive Parametric Binary Tree Labeling for Encrypted Images

TL;DR: Li et al. as mentioned in this paper proposed a reversible data hiding scheme for the encrypted images (RDHEI) based on vector quantization (VQ) prediction and parametric binary tree labeling (PBTL).
Journal ArticleDOI

An Authenticatable (2, 3) Secret Sharing Scheme Using Meaningful Share Images Based on Hybrid Fractal Matrix

TL;DR: Wang et al. as discussed by the authors proposed a (2, 3) SIS scheme based on a fractal matrix, where the secret data can be distributed into three shares which are indistinguishable from their corresponding cover images.
References
More filters
Proceedings Article

Adam: A Method for Stochastic Optimization

TL;DR: This work introduces Adam, an algorithm for first-order gradient-based optimization of stochastic objective functions, based on adaptive estimates of lower-order moments, and provides a regret bound on the convergence rate that is comparable to the best known results under the online convex optimization framework.
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book ChapterDOI

U-Net: Convolutional Networks for Biomedical Image Segmentation

TL;DR: Neber et al. as discussed by the authors proposed a network and training strategy that relies on the strong use of data augmentation to use the available annotated samples more efficiently, which can be trained end-to-end from very few images and outperforms the prior best method (a sliding-window convolutional network) on the ISBI challenge for segmentation of neuronal structures in electron microscopic stacks.
Journal ArticleDOI

Generative Adversarial Nets

TL;DR: A new framework for estimating generative models via an adversarial process, in which two models are simultaneously train: a generative model G that captures the data distribution and a discriminative model D that estimates the probability that a sample came from the training data rather than G.
Journal Article

Dropout: a simple way to prevent neural networks from overfitting

TL;DR: It is shown that dropout improves the performance of neural networks on supervised learning tasks in vision, speech recognition, document classification and computational biology, obtaining state-of-the-art results on many benchmark data sets.
Related Papers (5)