Image processing network-inverted identifiable secure natural steganography
- Vol. 28, Issue 3, Pages: 749-759(2023)
Published: 16 March 2023 ,
Accepted: 29 September 2022
DOI: 10.11834/jig.220529
移动端阅览
浏览全部资源
扫码关注微信
Published: 16 March 2023 ,
Accepted: 29 September 2022
移动端阅览
Jian Wang, Kejiang Chen, Weiming Zhang, Nenghai Yu. Image processing network-inverted identifiable secure natural steganography. [J]. Journal of Image and Graphics 28(3):749-759(2023)
目的
2
自然隐写是一种基于载体源转换的图像隐写方法,基本思想是使隐写后的图像具有另一种载体的特征,从而增强隐写安全性。但现有的自然隐写方法局限于对图像ISO(International Standardization Organization)感光度进行载体源转换,不仅复杂度高,而且无法达到可证安全性。为了提高安全性,本文结合基于标准化流的可逆图像处理模型,在隐空间完成载体源转换,同时通过消息映射的设计做到了可证安全的自然隐写。
方法
2
利用目前发展迅速的基于可逆网络的图像处理方法将图像可逆地映射到隐空间,通过替换使用的隐变量完成载体源的转换,从而避免对原始图像复杂的建模。同时,改进了基于拒绝采样的消息映射方法,简单地从均匀分布中采样以获得需要的条件分布,高效地将消息嵌入到隐变量中,并且保证了嵌入消息后的分布与原本使用的分布一致,从而实现了可证安全的自然隐写。
结果
2
针对图像质量、隐写容量、消息提取准确率、隐写安全性和运行时间进行了实验验证,结果表明在使用可逆缩放网络和可逆去噪网络时能够在每个像素值上平均嵌入5.625 bit消息,且具有接近99%的提取准确率,同时隐写分析网络SRNet(steganalysis residual network)和Zhu-Net的检测准确率都在50%附近,即相当于随机猜测。
结论
2
本文提出的隐写框架利用可逆图像处理网络实现了可证安全的自然隐写,在隐写容量和安全性上都具有很大优势。
Objective
2
Natural steganography is regarded as a cover-source switching based image steganography method. To enhance the steganographic security
its objective is focused on more steganographic image-related cover features. Natural steganography is originally designed for ISO (International Standardization Organization) sensitivity through adding noise to a low ISO image to yield a high ISO image feature
and modeling this noise signal to complete the message embedding. This approach is required for modeling the generation of ISO sensor noise
the development pipeline from raw sensor data stored in RAW format is commonly used like portable network graphics (PNG) or joint photographic experts group (JPEG) format images
which is very complex and not precise enough and the existing natural steganography approaches cannot be identified for safety inefficiently. To make the stylized images generated by steganography indistinguishable from other stylized images
some existing approaches are employed to explore steganography on the basis of image style transformation. However
it is challenged that the steganography-generated stylized image has the same distribution as the stylized image from another source
and none of them is as secure as traditional natural steganography. Actually
it is possible to achieve clarified security via using generated images as the cover image. Steganography is tackled for stronger invisibility than cryptography
but it has been difficult to achieve identifiable security
and most of methods are constrained of empirical security. Due to existing identifiable secure methods is required to obtain the distribution of cover datasets or the ability to sample from the cover distribution accurately
it is not feasible for traditional cover datasets. However
datasets-generated are easy to exact sampling because generative models random variables are required to be introduced to manipulate data generation. Therefore
to accomplish cover-source switching in latent space
and achieve identifiable secure natural steganography
the invertible image processing network is coordinated in terms of normalization flow.
Method
2
First
the image is mapped to the latent space in reverse using invertible neural networks-based image processing method
and the distribution of the latent variables are used to determine the cover features. To avoid modeling the original image features like ISO sensitivity
latent variable is configured as cover-source to switch and it can optimize the complexity of steganography significantly. At the same time
the identifiable secure steganography is implemented in the invertible image processing. The source switching-after cover is exactly the same as the cover of the other source
instead of the traditional natural steganography method
which can only be approximated in maximize. Since most of the invertible neural networks-based image processing methods use normal distribution-oriented latent variables to participate in recovery
conditional probability distribution of the stego latent variables about uniformly distributed messages can be designed. To enable message embedding and extraction
the stego latent variables can meet the requirement of normal distribution and the messages-linked correlation is obtained at the same time. To obtain the stego latent variable that matches the target conditional probability distribution
the inverse transform sampling-based message-embedding can be done efficiently via simplified regular distribution sampling. By keeping the stego latent variables with the same normal distribution as the latent variables used in normal image processing
the images involved in recovering or generating have the same distribution as well.
Result
2
Experiments are carried out in terms of image quality
steganographic capacity
message extraction accuracy
steganographic security
and its runtime. Using the same quality evaluation method with the original image processing network
there is almost no difference in peak signal-to-noise ratio and structural similarity between our Steganography and non-steganography images. To optimize steganographic capability
invertible de-noising and invertible rescaling network-based steganography methods are able to extract the message with about 99% accuracy while embedding 5.625 bits per pixel on the stego image. And
invertible de-colorization network-based steganography method achieves more than 99% extraction accuracy while embedding 0.67 bits of message per pixel. For steganographic security
we demonstrate the identifiable security of the proposed method
and neither of the two deep learning steganalysis networks used can distinguish the stego image from the cover image with better accuracy than random guesses. Furthermore
to reduce the time from the exponential growth of the latter to a constant time
our improved message mapping algorithm can be used to improve the efficiency compared to the rejection sampling approach.
Conclusion
2
An identifiable secure natural steganographic system is facilitated based on invertible image processing network
and the experimental results show that our method has its potentials for steganographic-related capacity and security.
隐写自然隐写可证安全隐写可逆神经网络(INN)图像处理
steganographynatural steganographyprovably secure steganographyinvertible neural network(INN)image processing
Abdelhamed A, Lin S and Brown M S. 2018. A high-quality denoising dataset for smartphone cameras//Proceedings of 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Salt Lake City, USA: IEEE: 1692-1700 [DOI: 10.1109/CVPR.2018.00182http://dx.doi.org/10.1109/CVPR.2018.00182]
Agustsson E and Timofte R. 2017. NTIRE 2017 Challenge on Single Image Super-Resolution: dataset and study//Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). Honolulu, USA: IEEE: 1122-1131 [DOI: 10.1109/CVPRW.2017.150http://dx.doi.org/10.1109/CVPRW.2017.150]
Bas P. 2016. Steganography via cover-source switching//Proceedings of 2016 IEEE International Workshop on Information Forensics and Security (WIFS). Abu Dhabi, United Arab Emirates: IEEE: 1-6 [DOI: 10.1109/WIFS.2016.7823905http://dx.doi.org/10.1109/WIFS.2016.7823905]
Bi X L, Yang X Y, Wang C and Liu J. 2021. High-capacity image steganography algorithm based on image style transfer. Security and Communication Networks, 2021: 4179340-1-4179340-14 [DOI: 10.1155/2021/4179340]
Boroumand M, Chen M and Fridrich J. 2019. Deep residual network for steganalysis of digital images. IEEE Transactions on Information Forensics and Security, 14(5): 1181-1193 [DOI: 10.1109/TIFS.2018.2871749]
Cachin C. 1998. An information-theoretic model for steganography//Proceedings of the 2nd International Workshop on Information Hiding. Portland, USA: Springer: 306-318 [DOI: 10.1007/3-540-49380-8_21http://dx.doi.org/10.1007/3-540-49380-8_21]
Chen K J, Zhou H, Zhao H Q, Chen D D, Zhang W M and Yu N H. 2022. Distribution-preserving steganography based on text-to-speech generative models. IEEE Transactions on Dependable and Secure Computing, 19(5): 3343-3356 [DOI: 10.1109/TDSC.2021.3095072]
Denemark T, Bas P and Fridrich J. 2018. Natural steganography in JPEG compressed images. Electronic Imaging, 30(7): #316 [DOI: 10.2352/ISSN.2470-1173.2018.07.MWSF-316]
Denemark T and Fridrich J. 2015. Side-informed steganography with additive distortion//Proceedings of 2015 IEEE International Workshop on Information Forensics and Security (WIFS). Roma, Italy: IEEE: 1-6 [DOI: 10.1109/WIFS.2015.7368589http://dx.doi.org/10.1109/WIFS.2015.7368589]
Dinh L, Sohl-Dickstein J and Bengio S. 2017. Density estimation using Real NVP//Proceedings of the 5th International Conference on Learning Representations. Toulon, France: OpenReview. net
Filler T, Judas J and Fridrich J. 2011. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3): 920-935 [DOI: 10.1109/TIFS.2011.2134094]
Franzen R. 1999. Kodak lossless true color image suite [DB/OL]. [2022-05-20].http://r0k.us/graphics/kodakhttp://r0k.us/graphics/kodak
Hopper N J, Langford J and Von Ahn L. 2002. Provably secure steganography//Proceedings of the 22nd Annual International Cryptology Conference. Santa Barbara, USA: Springer: 77-92 [DOI: 10.1007/3-540-45708-9_6http://dx.doi.org/10.1007/3-540-45708-9_6]
Kaptchuk G, Jois T M, Green M and Rubin A D. 2021. Meteor: cryptographically secure steganography for realistic distributions//Proceedings of 2021 ACM SIGSAC Conference on Computer and Communications Security. Virtual Event, Korea(South): ACM: 1529-1548 [DOI: 10.1145/3460120.3484550http://dx.doi.org/10.1145/3460120.3484550]
LiB, Wang M, Huang J W and Li X L. 2014. A new cost function for spatial image steganography//Proceedings of 2014 IEEE International Conference on Image Processing (ICIP). Paris, France: IEEE: 4206-4210 [DOI: 10.1109/ICIP.2014.7025854http://dx.doi.org/10.1109/ICIP.2014.7025854]
Liu Y, Qin Z Y, Anwar S, Ji P, Kim D, Caldwell S and Gedeon T. 2021. Invertible denoising network: a light solution for real noise removal//Proceedings of 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Nashville, USA: IEEE: 13360-13369 [DOI: 10.1109/CVPR46437.2021.01316http://dx.doi.org/10.1109/CVPR46437.2021.01316]
Taburet T, Bas P, Sawaya W and Fridrich J. 2019. A natural steganography embedding scheme dedicated to color sensors in the JPEG domain. Electronic Imaging, 31(5): #542 [DOI: 10.2352/ISSN.2470-1173.2019.5.MWSF-542]
Taburet T, Bas P, Sawaya W and Fridrich J. 2021. Natural steganography in JPEG domain with a linear development pipeline. IEEE Transactions on Information Forensics and Security, 16: 173-186 [DOI: 10.1109/TIFS.2020.3007354]
Wang Z H, Gao N, Wang X, Xiang J and Liu G Q. 2019. STNet: a style transformation network for deep image steganography//Proceedings of the 26th International Conference on Neural Information Processing. Sydney, Australia: Springer: 3-14 [DOI: 10.1007/978-3-030-36711-4_1http://dx.doi.org/10.1007/978-3-030-36711-4_1]
Xiao M Q, Zheng S X, Liu C, Wang Y L, He D, Ke G L, Bian J, Lin Z C and Liu T Y. 2020. Invertible image rescaling//Proceedings of 16th European Conference on Computer Vision. Glasgow, UK: Springer: 126-144 [DOI: 10.1007/978-3-030-58452-8_8http://dx.doi.org/10.1007/978-3-030-58452-8_8]
Yang K, Chen K J, Zhang W M and Yu N H. 2019. Provably secure generative steganography based on autoregressive model//Proceedings of the 17th International Workshop on Digital Watermarking. Jeju Island, Korea (South): Springer: 55-68 [DOI: 10.1007/978-3-030-11389-6_5http://dx.doi.org/10.1007/978-3-030-11389-6_5]
Zhang R, Zhu F, Liu J Y and Liu G S. 2020. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Transactions on Information Forensics and Security, 15: 1138-1150 [DOI: 10.1109/TIFS.2019.2936913]
Zhang S Y, Yang Z L, Yang J S and Huang Y F. 2021. Provably secure generative linguistic steganography//Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021. Bangkok, Thailand: ACL: 3046-3055 [DOI: 10.18653/v1/2021.findings-acl.268http://dx.doi.org/10.18653/v1/2021.findings-acl.268]
Zhao R, Liu T S, Xiao J, Lun D P K and Lam K M. 2021. Invertible image decolorization. IEEE Transactions on Image Processing, 30: 6081-6095 [DOI: 10.1109/TIP.2021.3091902]
Zhao X, Wang Y F, Chen K J, Zhang W M and Yu N H. 2022. Spatial image steganography based on side information estimated by super resolution. Journal of Image and Graphics, 27(1): 226-237
赵鑫, 王垚飞, 陈可江, 张卫明, 俞能海. 2022. 引入超分辨率下采样误差的图像边信息估计隐写. 中国图象图形学报, 27(1): 226-237 [DOI: 10.11834/jig.210433]
Zhong N, Qian Z X, Wang Z C and Zhang X P. 2019. Steganography in stylized images. Journal of Electronic Imaging, 28(3): #033005 [DOI: 10.1117/1.JEI.28.3.033005]
相关作者
相关机构