Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Implicit Steganography Beyond the Constraints of Modality (2312.05496v3)

Published 9 Dec 2023 in cs.CR and cs.LG

Abstract: Cross-modal steganography is committed to hiding secret information of one modality in another modality. Despite the advancement in the field of steganography by the introduction of deep learning, cross-modal steganography still remains to be a challenge to the field. The incompatibility between different modalities not only complicate the hiding process but also results in increased vulnerability to detection. To rectify these limitations, we present INRSteg, an innovative cross-modal steganography framework based on Implicit Neural Representations (INRs). We introduce a novel network allocating framework with a masked parameter update which facilitates hiding multiple data and enables cross modality across image, audio, video and 3D shape. Moreover, we eliminate the necessity of training a deep neural network and therefore substantially reduce the memory and computational cost and avoid domain adaptation issues. To the best of our knowledge, in the field of steganography, this is the first to introduce diverse modalities to both the secret and cover data. Detailed experiments in extreme modality settings demonstrate the flexibility, security, and robustness of INRSteg.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (31)
  1. Shumeet Baluja. Hiding images in plain sight: Deep steganography. In Advances in Neural Information Processing Systems, 2017.
  2. Hidden: Hiding data with deep networks. In Proceedings of the European conference on computer vision (ECCV), 2018.
  3. Image steganography: A review of the recent advances. IEEE Access, 2021.
  4. Video steganography: A review. Neurocomputing, 2019.
  5. Three-dimensional mesh steganography and steganalysis: A review. IEEE Transactions on Visualization and Computer Graphics, 2022.
  6. Deep neural networks based invisible steganography for audio-into-image algorithm. In 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), 2019.
  7. Deep cross-modal steganography using neural representations. In 2023 IEEE International Conference on Image Processing (ICIP), 2023.
  8. Hiding video in audio via reversible generative models. In 2019 IEEE/CVF International Conference on Computer Vision (ICCV), 2019.
  9. From data to functa: Your data point is a function and you can treat it like one. arXiv preprint arXiv:2201.12204, 2022.
  10. Meta-learning sparse implicit neural representations. Advances in Neural Information Processing Systems, 2021.
  11. Deepsdf: Learning continuous signed distance functions for shape representation. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019.
  12. Ssgan: Secure steganography based on generative adversarial networks. In Advances in Multimedia Information Processing – PCM 2017, 2018.
  13. Spatial image steganography based on generative adversarial network. arXiv preprint arXiv:1804.07939, 2018.
  14. A survey on bias and fairness in machine learning. ACM Comput. Surv., 2021.
  15. Deepmih: Deep invertible network for multiple image hiding. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023.
  16. Gustavus J. Simmons. The subliminal channel and digital signatures. In Advances in Cryptology, 1985.
  17. A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys. In International Journal of Computer Science and Security (IJCSS), 2010.
  18. Image steganography using pixel-value differencing. In 2009 Second International Symposium on Electronic Commerce and Security, 2009.
  19. Steganogan: High capacity image steganography with gans. arXiv preprint arXiv:1901.03892, 2019.
  20. Channel attention image steganography with generative adversarial networks. IEEE Transactions on Network Science and Engineering, 2022.
  21. Learning iterative neural optimizers for image steganography. In The Eleventh International Conference on Learning Representations, 2022.
  22. A siamese cnn for image steganalysis. IEEE Transactions on Information Forensics and Security, 2021.
  23. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters, 2016.
  24. Steganerf: Embedding invisible information within neural radiance fields. In Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023.
  25. Implicit neural representations with periodic activation functions. Advances in neural information processing systems, 2020.
  26. Guanshuo Xu. Deep convolutional neural network to detect j-uniward. In Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017.
  27. Imagenet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, 2009.
  28. G. Tzanetakis and P. Cook. Musical genre classification of audio signals. IEEE Transactions on Speech and Audio Processing, 2002.
  29. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 2004.
  30. The unreasonable effectiveness of deep features as a perceptual metric. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2018.
  31. Learned initializations for optimizing coordinate-based neural representations. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021.
Citations (3)

Summary

We haven't generated a summary for this paper yet.