Published June 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

Removal of Image Steganography using Generative Adversarial Network

  • 1. Department of Computer Engineering, K.J. Somaiya Institute of Engineering and Information Technology, Mumbai (Maharashtra), India.
  • 2. Assistant Professor, Department of Computer Engineering, K.J. Somaiya Institute of Engineering and Information Technology, Mumbai (Maharashtra), India.

Contributors

Contact person:

  • 1. Department of Computer Engineering, K.J. Somaiya Institute of Engineering and Information Technology, Mumbai (Maharashtra), India.

Description

Abstract: Secret messages can be concealed in ordinary media like audio, video and images. This is called as Steganography. Steganography is used by cyber attackers to send malicious content that could harm victims. Digital steganography, or steganography in photographs, is exceedingly difficult to detect. The detection of steganography in images, has been investigated in thoroughly by a variety of parties. The use of steganographic techniques to send more malware to a compromised host in order to undertake different post-exploitation operations that affect the exploited system. Many steganalysis algorithms, on the other hand, are limited to working with a subset of all potential photos in the wild or have a high false positive rate. As a result, barring any suspected image becomes an arbitrary policy. Filtering questionable photos before they are received by the host machine is a more practical policy. In this paper, a Generative Adversarial Network based model is proposed that may be optimized to delete steganographic content while maintaining the original image's perceptual quality. For removing steganography from photos while keeping the maximum visual image quality, a model is built utilizing a combination of Generative Adversarial Network (GAN) and Image Processing. In the future, utilizing a generator to synthesize a picture will become more popular, and detection of steganography in images will become very difficult. In comparison to other models that have been addressed further, the proposed model is able to give a mean square error of 5.4204 between the generated image and the cover image, as well as better outcomes based on several metrics. As a result, a GAN-based steganography eradication method will aid in this endeavor.

Notes

Published By: Lattice Science Publication (LSP) © Copyright: All rights reserved.

Files

D1054062422.pdf

Files (606.9 kB)

Name Size Download all
md5:e7673c7ec173a9e4f7b540fb1d31f287
606.9 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2582-7626 (ISSN)

References

  • 1. Fridrich, Jessica. Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, 2009. [CrossRef] 2. Marvel, Lisa M., Charles T. Retter, and Charles G. Boncelet Jr. "Hiding Information in Images." ICIP (2). 1998. 3. Hamid, Nagham, et al. "Image steganography techniques: an overview." International Journal of Computer Science and Security (IJCSS) 6.3 (2012): 168-187. 4. Ameen, Siddeeq Y., and Muthana R. Al-Badrany. "Optimal image steganography content destruction techniques." International Conference on Systems, Control, Signal Processing and Informatics. 2013. 5. Shrestha, Pradhumna Lal, et al. "A general attack method for steganography removal using pseudo-cfa re-interpolation." 2011 International Conference for Internet Technology and Secured Transactions. IEEE, 2011. 6. Quan, Xiaomei. "JPEG Steganalysis Based on Local Dimension Estimation." 2021 6th International Conference on Image, Vision and Computing (ICIVC). IEEE, 2021. [CrossRef] 7. Amritha, P. P., M. Sethumadhavan, and R. Krishnan. "On the Removal of Steganographic Content from Images." Defense Science Journal 66.6 (2016). [CrossRef] 8. Zou, Ying, Ge Zhang, and Leian Liu. "Research on image steganography analysis based on deep learning." Journal of Visual Communication and Image Representation 60 (2019): 266-275. [CrossRef] 9. Ke, Qi, Liu Dong Ming, and Zhang Daxing. "Image steganalysis via multi-column convolutional neural network." 2018 14th IEEE International Conference on signal processing (ICSP). IEEE, 2018. [CrossRef] 10. Tang, Yong-He, et al. "A review on deep learning-based image steganalysis." 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2018. [CrossRef] 11. Qian, Yinlong, et al. "Deep learning for steganalysis via convolutional neural networks." Media Watermarking, Security, and Forensics 2015. Vol. 9409. SPIE, 2015. [CrossRef] 12. Xu, Guanshuo, Han-Zhou Wu, and Yun-Qing Shi. "Structural design of convolutional neural networks for steganalysis." IEEE Signal Processing Letters 23.5 (2016): 708-712. [CrossRef] 13. Aggarwal, Alankrita, Mamta Mittal, and Gopi Battineni. "Generative adversarial network: An overview of theory and applications." International Journal of Information Management Data Insights 1.1 (2021): 100004. [CrossRef] 14. Liu, Jia, et al. "Recent advances of image steganography with generative adversarial networks." IEEE Access 8 (2020): 60575-60597. [CrossRef] 15. Zhang, Zhuo, et al. "A generative method for steganography by cover synthesis with auxiliary semantics." Tsinghua Science and Technology 25.4 (2020): 516-527. [CrossRef] 16. Naito, Hiroshi, and Qiangfu Zhao. "A new steganography method based on generative adversarial networks." 2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST). IEEE, 2019. [CrossRef] 17. Zhou, Lingchen, et al. "On security enhancement of steganography via generative adversarial image." IEEE Signal Processing Letters 27 (2019): 166-170. [CrossRef] 18. Corley, Isaac, Jonathan Lwowski, and Justin Hoffman. "Destruction of image steganography using generative adversarial networks." arXiv preprint arXiv:1912.10070 (2019). 19. Wang, Huaqi, et al. "Defeating data hiding in social networks using generative adversarial networks." EURASIP Journal on Image and Video Processing 2020.1 (2020): 1-13. [CrossRef] 20. Ledig, Christian, et al. "Photo-realistic single image super-resolution using a generative adversarial network." Proceedings of the IEEE conference on computer vision and pattern recognition. 2017. [CrossRef] 21. Bas, Patrick, Tomáš Filler, and Tomáš Pevný."" Break our steganographic system": the ins and outs of organizing BOSS." International workshop on information hiding. Springer, Berlin, Heidelberg, 2011. [CrossRef] 22. Jung, Dahuin, et al. "Pixelsteganalysis: Destroying hidden information with a low degree of visual degradation." arXiv preprint arXiv:1902.11113 (2019). 23. Zhang, Ru, Shiqi Dong, and Jianyi Liu. "Invisible steganography via generative adversarial networks." Multimedia tools and applications 78.7 (2019): 8559-8575. [CrossRef] 24. Baluja, Shumeet. "Hiding images in plain sight: Deep steganography." Advances in neural information processing systems 30 (2017). 25. Pevný, Tomáš, Tomáš Filler, and Patrick Bas. "Using high-dimensional image models to perform highly undetectable steganography." International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2010. [CrossRef] 26. Holub, Vojtěch, Jessica Fridrich, and Tomáš Denmark. "Universal distortion function for steganography in an arbitrary domain." EURASIP Journal on Information Security 2014.1 (2014): 1-13. [CrossRef] 27. Holub, Vojtěch, and Jessica Fridrich. "Designing steganographic distortion using directional filters." 2012 IEEE International workshop on information forensics and security (WIFS). IEEE, 2012. [CrossRef]

Subjects

ISSN
gnd:2582-7626 (Online)
Retrieval Number
100.1/ijainn.D1054062422
Journal Website
https://www.ijainn.latticescipub.com/