HAG-NET: Hiding Data and Adversarial Attacking with Generative Adversarial Network

Author:

Fan Haiju1,Wang Jinsong1

Affiliation:

1. College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, China

Abstract

Recent studies on watermarking techniques based on image carriers have demonstrated new approaches that combine adversarial perturbations against steganalysis with embedding distortions. However, while these methods successfully counter convolutional neural network-based steganalysis, they do not adequately protect the data of the carrier itself. Recognizing the high sensitivity of Deep Neural Networks (DNNs) to small perturbations, we propose HAG-NET, a method based on image carriers, which is jointly trained by the encoder, decoder, and attacker. In this paper, the encoder generates Adversarial Steganographic Examples (ASEs) that are adversarial to the target classification network, thereby providing protection for the carrier data. Additionally, the decoder can recover secret data from ASEs. The experimental results demonstrate that ASEs produced by HAG-NET achieve an average success rate of over 99% on both the MNIST and CIFAR-10 datasets. ASEs generated with the attacker exhibit greater robustness in terms of attack ability, with an average increase of about 3.32%. Furthermore, our method, when compared with other generative stego examples under similar perturbation strength, contains significantly more information according to image information entropy measurements.

Publisher

MDPI AG

Reference26 articles.

1. CNN-based adversarial embedding for image steganography;Tang;IEEE Trans. Inf. Forensics Secur.,2019

2. Fan, Z., Chen, K., Qin, C., Zeng, K., Zhang, W., and Yu, N. (2023, January 4–10). Image Adversarial Steganography Based on Joint Distortion. Proceedings of the ICASSP 2023—IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Rhodes Island, Greece.

3. Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I.J., and Fergus, R. (2014, January 14–16). Intriguing Properties of Neural Networks. Proceedings of the ICLR 2014—International Conference on Learning Representations, Banff, AB, Canada.

4. Goodfellow, I.J., Shlens, J., and Szegedy, C. (2015, January 7–9). Explaining and Harnessing AE. Proceedings of the ICLR 2015—International Conference on Learning Representations, San Diego, CA, USA.

5. Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. (May, January 30). Towards Deep Learning Models Resistant to Adversarial Attacks. Proceedings of the ICLR 2018—International Conference on Learning Representations, Vancouver, BC, Canada.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3