Abstract
Traditional Steganography need to modify the carrier image to hide information, which will leave traces of rewriting, then eventually be perceived by the enemy. In this paper, an information hiding scheme based on Auxiliary Classifier Generative Adversarial Networks (AC-GANs) model is proposed for Steganography. This method designs and trains the networks model based on AC-GANs by constructing a dedicated dictionary and image database. The sender can map the secret information into the category labels through the dictionary, and then use the labels generate the real looking images to be sent through the model. On the contrary, the receiver can identify the image label through the model and obtain the secret information. Through experiments, the feasibility of this method is verified and the reliability of the algorithm is analyzed. This method transmits secret messages by generating images without overwriting the carrier images. It can effectively solve the problem of modification of carrier images in traditional information hiding.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: Survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)
Wu, H.C., Wu, N., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based onpixel-value differencing and LSB replacement methods. Proc. Vis. Image Signal Process. 152(5), 611–615 (2005)
Mielikainen, J.: LSB matching revisited. IEEE Signal Process. Lett. 13(5), 285–287 (2006)
Yang, C.H., Weng, C.Y., Wang, S.J.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensics Secur. 3(3), 488–497 (2008)
Cox, I.J., Kilian, J., Leighton, F.T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (2010)
Ruanaidh, J.J.K.O., Dowling, W.J., Boland, F.M.: Phase watermarking of digital images. In: International Conference on Image Processing, pp. 239–242 (1996)
Sun, Q.D., Guan, P., Qiu, Y., Yan, W.Y.: DWT domain information hiding approach using detail sub-band feature adjustment. Telkomnika Indones. J. Electr. Eng. 11(7) (2013)
Zhou, Z.L., Sun, H.Y., Harit, R.: Coverless image steganography without embedding. In: ICCCS 2015. LNCS, vol. 9483, pp. 123–132 (2015)
Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2010)
Odena, A., Olah, C., Shlens, J.: Conditional image synthesis with auxiliary classifier GANs. In: Proceedings of the 34th International Conference on Machine Learning, Sydney, Australia, PMLR, vol. 70 (2017)
Ian, G., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N.D., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol. 27, pp. 2672–2680 (2014)
The MNIST Database of Handwritten Digits. http://yann.lecun.com/exdb/mnist/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, Z., Fu, G., Liu, J., Fu, W. (2020). Generative Information Hiding Method Based on Adversarial Networks. In: Liu, Q., Mısır, M., Wang, X., Liu, W. (eds) The 8th International Conference on Computer Engineering and Networks (CENet2018). CENet2018 2018. Advances in Intelligent Systems and Computing, vol 905. Springer, Cham. https://doi.org/10.1007/978-3-030-14680-1_29
Download citation
DOI: https://doi.org/10.1007/978-3-030-14680-1_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14679-5
Online ISBN: 978-3-030-14680-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)