Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
129 tokens/sec
GPT-4o
28 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

DKiS: Decay weight invertible image steganography with private key (2311.18243v2)

Published 30 Nov 2023 in cs.MM, cs.CR, cs.CV, and cs.LG

Abstract: Image steganography, defined as the practice of concealing information within another image, traditionally encounters security challenges when its methods become publicly known or are under attack. To address this, a novel private key-based image steganography technique has been introduced. This approach ensures the security of the hidden information, as access requires a corresponding private key, regardless of the public knowledge of the steganography method. Experimental evidence has been presented, demonstrating the effectiveness of our method and showcasing its real-world applicability. Furthermore, a critical challenge in the invertible image steganography process has been identified by us: the transfer of non-essential, or `garbage', information from the secret to the host pipeline. To tackle this issue, the decay weight has been introduced to control the information transfer, effectively filtering out irrelevant data and enhancing the performance of image steganography. The code for this technique is publicly accessible at https://github.com/yanghangAI/DKiS, and a practical demonstration can be found at http://yanghang.site/hidekey.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (42)
  1. Ntire 2017 challenge on single image super-resolution: Dataset and study. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 126–135, 2017.
  2. Mohammed Abbas Fadhil Al-Husainy and Diaa Mohammed Uliyan. A secret-key image steganography technique using random chain codes. International Journal of Technology, 10(4):731–740, 2019.
  3. Image steganography using a dynamic symmetric key. In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), pages 1507–1513. IEEE, 2018.
  4. Shumeet Baluja. Hiding Images in Plain Sight: Deep Steganography. 2017.
  5. Shumeet Baluja. Hiding images within images. IEEE transactions on pattern analysis and machine intelligence, 42(7):1685–1697, 2019.
  6. Improved wavelet-based watermarking through pixel-wise masking. IEEE transactions on image processing, 10(5):783–791, 2001.
  7. Hiding data in images by simple lsb substitution. Pattern recognition, 37(3):469–474, 2004.
  8. Reversible image steganography scheme based on a u-net structure. IEEE Access, 7:9314–9323, 2019.
  9. High-capacity image steganography based on improved xception. Sensors, 20(24):7253, 2020.
  10. High-capacity image steganography based on improved fc-densenet. IEEE Access, 8:170174–170182, 2020.
  11. Detecting lsb steganography in color, and gray-scale images. IEEE multimedia, 8(4):22–28, 2001.
  12. Steganalysis attacks on stego-images using stego-signatures and statistical image properties. In 2004 IEEE Region 10 Conference TENCON 2004., pages 104–107. IEEE, 2004.
  13. Hidden digital watermarks in images. IEEE Transactions on image processing, 8(1):58–68, 1999.
  14. Multibit embedding algorithm for steganography of palette-based images. In Image and Video Technology: 6th Pacific-Rim Symposium, PSIVT 2013, Guanajuato, Mexico, October 28-November 1, 2013. Proceedings 6, pages 99–110. Springer, 2014.
  15. Afcihnet: Attention feature-constrained network for single image information hiding. Engineering Applications of Artificial Intelligence, 126:107105, 2023.
  16. Hinet: Deep image hiding by invertible network. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 4733–4742, 2021.
  17. Exploring steganography: Seeing the unseen. Computer, 31(2):26–34, 2 1998.
  18. Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing, 335:299–326, 2019.
  19. A new approach for lsb based image steganography using secret key. In 14th international conference on computer and information technology (ICCIT 2011), pages 286–291. IEEE, 2011.
  20. An Overview of Steganography, pages 51–107. Elsevier, 2011.
  21. Deep multi-image steganography with private keys. Electronics, 10(16):1906, 2021.
  22. Glenn M Lilly. Device for and method of one-way cryptographic hashing, December 7 2004. US Patent 6,829,355.
  23. Microsoft COCO: common objects in context. CoRR, abs/1405.0312, 2014.
  24. Large-capacity image steganography based on invertible neural networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 10816–10825, 2021.
  25. Edge adaptive image steganography based on lsb matching revisited. IEEE Transactions on information forensics and security, 5(2):201–214, 2010.
  26. Multi bit plane image steganography. In Digital Watermarking: 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006. Proceedings 5, pages 61–70. Springer, 2006.
  27. OpenAI. Chatgpt: A language model for conversational agents. OpenAI Blog, 2021.
  28. Image steganography method based on pvd and modulus function. In 2011 International Conference on Electronics, Communications and Control (ICECC), pages 282–284. IEEE, 2011.
  29. Phase watermarking of digital images. In Proceedings of 3rd IEEE International Conference on Image Processing, volume 3, pages 239–242. IEEE, 1996.
  30. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–252, 2015.
  31. De Rosal Igantius Moses Setiadi. Psnr vs ssim: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6):8423–8444, 2021.
  32. Ssgan: Secure steganography based on generative adversarial networks. In Advances in Multimedia Information Processing–PCM 2017: 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I 18, pages 534–544. Springer, 2018.
  33. Hiding an image inside another image using variable-rate steganography. International Journal of Advanced Computer Science and Applications (IJACSA), 4(10), 2013.
  34. Reversible image hiding scheme using predictive coding and histogram shifting. Signal processing, 89(6):1129–1143, 2009.
  35. Invertible image rescaling. In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part I 16, pages 126–144. Springer, 2020.
  36. Robust invertible image steganography. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 7875–7884, 2022.
  37. Pris: Practical robust invertible network for image steganography. arXiv preprint arXiv:2309.13620, 2023.
  38. Steganogan: High capacity image steganography with gans. arXiv preprint arXiv:1901.03892, 2019.
  39. Udh: Universal deep hiding for steganography, watermarking, and light field messaging. Advances in Neural Information Processing Systems, 33:10223–10234, 2020.
  40. A lsb steganography detection algorithm. In 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003., volume 3, pages 2780–2783. IEEE, 2003.
  41. Publaynet: largest dataset ever for document layout analysis. In 2019 International Conference on Document Analysis and Recognition (ICDAR), pages 1015–1022. IEEE, Sep. 2019.
  42. Hidden: Hiding data with deep networks. In Proceedings of the European conference on computer vision (ECCV), pages 657–672, 2018.

Summary

We haven't generated a summary for this paper yet.