Deep Convolutional Generative Adversarial Network for Image Steganography Enhancement
Keywords:
Adversarial Attacks, Convolutional Neural Network, Deep Convolutional Generative Adversarial Network, Discriminator and Image SteganographyAbstract
In recent times, safeguarding data has emerged as a paramount global issue demanding the utmost attention and concern. The secret data is exposed to potential hacks when transmitted via conventional communication channels. The image steganalysis development based on the Convolutional Neural Network (CNN) has become challenging for image steganography. However, the recent steganographic approaches are complex to resist the detection of CNN-based steganalyzers. To address this issue, this research proposed the image steganographic plan based on a Deep Convolutional Generative Adversarial network (DCGAN) with adversarial attack. The proposed method utilized the MNIST steganography dataset to estimate the performance of DCGAN. This is performed to generate the secure DCGAN result, which has greater robustness to adversarial data operations. The experimental results show that the proposed method achieves greater performance and achieves the stego accuracy of 0.9155, discriminator loss of 0.0307 as well as similitude loss of 0.00167 when compared to the existing methods like GAN and Information-driven GAN (IDGAN). The proposed approach can efficiently protect the sensitive data even affecting the quality of image data as well as outperforms the compared existing methods.
Downloads
References
Y. Chen, Q. Gao, and X. Wang, “Inferential Wasserstein generative adversarial networks,” J. R. Stat. Soc. B, vol. 84, no. 1, pp. 83-113, Feb. 2022. https://doi.org/10.48550/arXiv.2109.05652
N. A. Mashudi, N. Ahmad, and N. M. Noor, “LiWGAN: A Light Method to Improve the Performance of Generative Adversarial Network,” IEEE Access, vol. 10, pp. 93155-93167, Aug. 2022. https://doi.org/10.1109/ACCESS.2022.3203065
S. Zhang, K. Huang, Z. Qian, R. Zhang, and A. Hussain, “Improving generative adversarial networks with simple latent distributions,” Neural Comput. Appl., vol. 33, pp. 13193-13203, Oct. 2021. https://doi.org/10.1007/s00521-021-05946-3
G. Baykal, F. Ozcelik, and G. Unal, “Exploring deshufflegans in self-supervised generative adversarial networks,” Pattern Recognit., vol. 122, p. 108244, Feb. 2022. https://doi.org/10.1016/j.patcog.2021.108244
M. Lupo Pasini, V. Gabbi, J. Yin, S. Perotto, and N. Laanait, “Scalable balanced training of conditional generative adversarial neural networks on image data,” The Journal of Supercomputing, vol. 77, no. 11, pp. 13358-13384, Nov. 2021. https://doi.org/10.48550/arXiv.2102.10485
P. Shamsolmoali, M. Zareapoor, L. Shen, A. H. Sadka, and J. Yang, “Imbalanced data learning by minority class augmentation using capsule adversarial networks,” Neurocomputing, vol. 459, pp. 481-493, Oct. 2021. https://doi.org/10.48550/arXiv.2004.02182
M. Mohebbi Moghaddam, B. Boroomand, M. Jalali, A. Zareian, A. Daeijavad, M. H. Manshaei, and M. Krunz, “Games of GANs: Game-theoretical models for generative adversarial networks,” Artif. Intell. Rev., vol. 56, pp. 9771-9807, Feb. 2023. https://doi.org/10.1007/s10462-023-10395-6
S. Ke and W. Liu, “Consistency of multiagent distributed generative adversarial networks,” IEEE Trans. Cybern., vol. 52, no. 6, pp. 4886-4896, Oct. 2020. https://doi.org/10.1109/TCYB.2020.3022695
S. Agarwal, C. Kim, and K. H. Jung, “Steganalysis of Context-Aware Image Steganography Techniques Using Convolutional Neural Network,” Appl. Sci., vol. 12, no. 21, p. 10793, Oct. 2022. https://doi.org/10.3390/app122110793
J. Luo, P. He, J. Liu, H. Wang, C. Wu, C. Yuan, and Q. Xia, “Improving security for image steganography using content-adaptive adversarial perturbations,” Appl. Intell., vol. 53, no. 12, pp. 16059-16076, Jun. 2023. https://doi.org/10.1007/s10489-022-04321-6
R. Huang, C. Lian, Z. Dai, Z. Li, and Z. Ma, “A novel hybrid image synthesis-mapping framework for steganography without embedding,” IEEE Access, Oct. 2023. https://doi.org/10.1109/ACCESS.2023.3324050
L. Li, W. Zhang, C. Qin, K. Chen, W. Zhou, and N. Yu, “Adversarial batch image steganography against CNN-based pooled steganalysis,” Signal Process., vol. 181, p. 107920, Apr. 2021. https://doi.org/10.1016/j.sigpro.2020.107920
A. P. P. Aung, X. Wang, R. Yu, B. An, S. Jayavelu, and X. Li, “DO-GAN: A Double Oracle Framework for Generative Adversarial Networks,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 11275-11284. https://doi.org/10.48550/arXiv.2102.08577
V. Costa, N. Lourenço, J. Correia, and P. Machado, “Improved evolution of generative adversarial networks,” in Proceedings of the genetic and evolutionary computation conference companion, 2021, pp. 145-146. https://doi.org/10.1145/3449726.3459448
Y. H. Li, C. C. Chang, G. D. Su, K. L. Yang, M. S. Aslam, and Y. Liu, “Coverless image steganography using morphed face recognition based on convolutional neural network,” EURASIP J. Wireless Commun. Networking, vol. 2022, p. 28, Dec. 2022. https://doi.org/10.1186/s13638-022-02107-5
A. Martín, A. Hernández, M. Alazab, J. Jung, and D. Camacho, “Evolving Generative Adversarial Networks to improve image steganography,” Expert Syst. Appl., vol. 222, p. 119841, Jul. 2023. https://doi.org/10.1016/j.eswa.2023.119841
F. Peng, G. Chen, and M. Long, “A robust coverless steganography based on generative adversarial networks and gradient descent approximation,” IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 9, pp. 5817-5829, Mar. 2022. https://doi.org/10.1109/TCSVT.2022.3161419
C. Zhang, X. Gao, X. Liu, W. Hou, G. Yang, T. Xue, L. Wang, and L. Liu, “IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography,” Electronics, vol. 12, no. 13, p. 2881, Jun. 2023. https://doi.org/10.3390/electronics12132881
M. M. Fadel, W. Said, E. A. Hagras, and R. Arnous, “A Fast and Low Distortion Image Steganography Framework Based on Nature-Inspired Optimizers,” IEEE Access, vol. 11, pp. 125768-125789, Oct. 2023. https://doi.org/10.1109/ACCESS.2023.3326709
L. Wang, Y. Song, and D. Xia, “Deep neural network watermarking based on a reversible image hiding network,” Pattern Anal. Appl., vol. 26, pp. 861-874, Feb. 2023. https://doi.org/10.1007/s10044-023-01140-4
E. Nazari, P. Branco, and G. V. Jourdan, “AutoGAN: An Automated Human-Out-of-the-Loop Approach for Training Generative Adversarial Networks,” Mathematics, vol. 11, no. 4, p. 977, Feb. 2023. https://doi.org/10.3390/math11040977
C. Yuan, H. Wang, P. He, J. Luo, and B. Li, “GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion,” Multimedia Tools Appl., vol. 81, no. 5, pp. 6681-6701, Feb. 2022. https://doi.org/10.1007/s11042-021-11778-z
MNIST dataset link: https://www.kaggle.com/code/manthansolanki/image-classification-with-mnist-dataset.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.