Deep Convolutional Generative Adversarial Network for Image Steganography Enhancement

Authors

  • Syeda Imrana Fatima, Yugandhar Gara

Keywords:

Adversarial Attacks, Convolutional Neural Network, Deep Convolutional Generative Adversarial Network, Discriminator and Image Steganography

Abstract

In recent times, safeguarding data has emerged as a paramount global issue demanding the utmost attention and concern. The secret data is exposed to potential hacks when transmitted via conventional communication channels. The image steganalysis development based on the Convolutional Neural Network (CNN) has become challenging for image steganography. However, the recent steganographic approaches are complex to resist the detection of CNN-based steganalyzers. To address this issue, this research proposed the image steganographic plan based on a Deep Convolutional Generative Adversarial network (DCGAN) with adversarial attack. The proposed method utilized the MNIST steganography dataset to estimate the performance of DCGAN. This is performed to generate the secure DCGAN result, which has greater robustness to adversarial data operations. The experimental results show that the proposed method achieves greater performance and achieves the stego accuracy of 0.9155, discriminator loss of 0.0307 as well as similitude loss of 0.00167 when compared to the existing methods like GAN and Information-driven GAN (IDGAN). The proposed approach can efficiently protect the sensitive data even affecting the quality of image data as well as outperforms the compared existing methods.

Downloads

Download data is not yet available.

Author Biography

Syeda Imrana Fatima, Yugandhar Gara

Syeda Imrana Fatima*1, Yugandhar Garapati2

_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

1 Department of Computer Science & Engineering, GITAM (Deemed to be University), Hyderabad, India

2 Department of Computer Science & Engineering, GITAM (Deemed to be University), Hyderabad, India

ORCID ID: 0000-0003-2708-9714

* Corresponding Author Email: isyeda@gitam.in

References

Y. Chen, Q. Gao, and X. Wang, “Inferential Wasserstein generative adversarial networks,” J. R. Stat. Soc. B, vol. 84, no. 1, pp. 83-113, Feb. 2022. https://doi.org/10.48550/arXiv.2109.05652

N. A. Mashudi, N. Ahmad, and N. M. Noor, “LiWGAN: A Light Method to Improve the Performance of Generative Adversarial Network,” IEEE Access, vol. 10, pp. 93155-93167, Aug. 2022. https://doi.org/10.1109/ACCESS.2022.3203065

S. Zhang, K. Huang, Z. Qian, R. Zhang, and A. Hussain, “Improving generative adversarial networks with simple latent distributions,” Neural Comput. Appl., vol. 33, pp. 13193-13203, Oct. 2021. https://doi.org/10.1007/s00521-021-05946-3

G. Baykal, F. Ozcelik, and G. Unal, “Exploring deshufflegans in self-supervised generative adversarial networks,” Pattern Recognit., vol. 122, p. 108244, Feb. 2022. https://doi.org/10.1016/j.patcog.2021.108244

M. Lupo Pasini, V. Gabbi, J. Yin, S. Perotto, and N. Laanait, “Scalable balanced training of conditional generative adversarial neural networks on image data,” The Journal of Supercomputing, vol. 77, no. 11, pp. 13358-13384, Nov. 2021. https://doi.org/10.48550/arXiv.2102.10485

P. Shamsolmoali, M. Zareapoor, L. Shen, A. H. Sadka, and J. Yang, “Imbalanced data learning by minority class augmentation using capsule adversarial networks,” Neurocomputing, vol. 459, pp. 481-493, Oct. 2021. https://doi.org/10.48550/arXiv.2004.02182

M. Mohebbi Moghaddam, B. Boroomand, M. Jalali, A. Zareian, A. Daeijavad, M. H. Manshaei, and M. Krunz, “Games of GANs: Game-theoretical models for generative adversarial networks,” Artif. Intell. Rev., vol. 56, pp. 9771-9807, Feb. 2023. https://doi.org/10.1007/s10462-023-10395-6

S. Ke and W. Liu, “Consistency of multiagent distributed generative adversarial networks,” IEEE Trans. Cybern., vol. 52, no. 6, pp. 4886-4896, Oct. 2020. https://doi.org/10.1109/TCYB.2020.3022695

S. Agarwal, C. Kim, and K. H. Jung, “Steganalysis of Context-Aware Image Steganography Techniques Using Convolutional Neural Network,” Appl. Sci., vol. 12, no. 21, p. 10793, Oct. 2022. https://doi.org/10.3390/app122110793

J. Luo, P. He, J. Liu, H. Wang, C. Wu, C. Yuan, and Q. Xia, “Improving security for image steganography using content-adaptive adversarial perturbations,” Appl. Intell., vol. 53, no. 12, pp. 16059-16076, Jun. 2023. https://doi.org/10.1007/s10489-022-04321-6

R. Huang, C. Lian, Z. Dai, Z. Li, and Z. Ma, “A novel hybrid image synthesis-mapping framework for steganography without embedding,” IEEE Access, Oct. 2023. https://doi.org/10.1109/ACCESS.2023.3324050

L. Li, W. Zhang, C. Qin, K. Chen, W. Zhou, and N. Yu, “Adversarial batch image steganography against CNN-based pooled steganalysis,” Signal Process., vol. 181, p. 107920, Apr. 2021. https://doi.org/10.1016/j.sigpro.2020.107920

A. P. P. Aung, X. Wang, R. Yu, B. An, S. Jayavelu, and X. Li, “DO-GAN: A Double Oracle Framework for Generative Adversarial Networks,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2022, pp. 11275-11284. https://doi.org/10.48550/arXiv.2102.08577

V. Costa, N. Lourenço, J. Correia, and P. Machado, “Improved evolution of generative adversarial networks,” in Proceedings of the genetic and evolutionary computation conference companion, 2021, pp. 145-146. https://doi.org/10.1145/3449726.3459448

Y. H. Li, C. C. Chang, G. D. Su, K. L. Yang, M. S. Aslam, and Y. Liu, “Coverless image steganography using morphed face recognition based on convolutional neural network,” EURASIP J. Wireless Commun. Networking, vol. 2022, p. 28, Dec. 2022. https://doi.org/10.1186/s13638-022-02107-5

A. Martín, A. Hernández, M. Alazab, J. Jung, and D. Camacho, “Evolving Generative Adversarial Networks to improve image steganography,” Expert Syst. Appl., vol. 222, p. 119841, Jul. 2023. https://doi.org/10.1016/j.eswa.2023.119841

F. Peng, G. Chen, and M. Long, “A robust coverless steganography based on generative adversarial networks and gradient descent approximation,” IEEE Trans. Circuits Syst. Video Technol., vol. 32, no. 9, pp. 5817-5829, Mar. 2022. https://doi.org/10.1109/TCSVT.2022.3161419

C. Zhang, X. Gao, X. Liu, W. Hou, G. Yang, T. Xue, L. Wang, and L. Liu, “IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography,” Electronics, vol. 12, no. 13, p. 2881, Jun. 2023. https://doi.org/10.3390/electronics12132881

M. M. Fadel, W. Said, E. A. Hagras, and R. Arnous, “A Fast and Low Distortion Image Steganography Framework Based on Nature-Inspired Optimizers,” IEEE Access, vol. 11, pp. 125768-125789, Oct. 2023. https://doi.org/10.1109/ACCESS.2023.3326709

L. Wang, Y. Song, and D. Xia, “Deep neural network watermarking based on a reversible image hiding network,” Pattern Anal. Appl., vol. 26, pp. 861-874, Feb. 2023. https://doi.org/10.1007/s10044-023-01140-4

E. Nazari, P. Branco, and G. V. Jourdan, “AutoGAN: An Automated Human-Out-of-the-Loop Approach for Training Generative Adversarial Networks,” Mathematics, vol. 11, no. 4, p. 977, Feb. 2023. https://doi.org/10.3390/math11040977

C. Yuan, H. Wang, P. He, J. Luo, and B. Li, “GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion,” Multimedia Tools Appl., vol. 81, no. 5, pp. 6681-6701, Feb. 2022. https://doi.org/10.1007/s11042-021-11778-z

MNIST dataset link: https://www.kaggle.com/code/manthansolanki/image-classification-with-mnist-dataset.

Downloads

Published

16.03.2024

How to Cite

Yugandhar Gara, S. I. F. . (2024). Deep Convolutional Generative Adversarial Network for Image Steganography Enhancement. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 793–801. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/5358

Issue

Section

Research Article