Adversarial Steganography Embedding Via Stego Generation and Selection
Adversarial Steganography Embedding Via Stego Generation and Selection
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
Abstract—The recent literature has shown that adversarial embedding has promise for enhancing the security of steganography.
However, existing methods achieve the final stego mainly based on a pre-trained Convolutional Neural Network (CNN)-based
steganalyzer without considering any other steganalytic features. When the steganalyzer is re-trained, its performance usually drops
significantly. We propose a novel adversarial embedding method via stego generation and selection. To improve the diversity of the
stego images, this method firstly randomly generates many candidate stegos according to the amplitudes of the gradients and
embedding costs of a given cover. Since the image residuals are the commonly used low-level features in many steganalyzers, the
proposed method carefully designs different adaptive high-pass filters to calculate the image residuals, and then selects a final stego
from among those candidate stegos which can successfully fool the pre-trained steganalyzer, according to the residual distance
between stego and the cover. Extensive experimental evaluations on re-trained CNN-based and traditional steganalyzers demonstrate
that the proposed method can significantly enhance the security of the modern steganographic methods in both spatial and JPEG
domains, and achieve much better performance than related adversarial embedding methods.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
TABLE 1
The main differences between existing steganographic methods based on adversarial examples.
TABLE 2
The main differences between the algorithm design of the proposed method and that in our previous paper [1].
the original embedding costs according to the amplitudes • In Stego Generation: To further improve the diversity
and signs of the gradients. Min-Max [26, 27] is an iterative of the generated stegos, we employ two independent
version of ADV-EMB [24], which mainly uses a min-max random variables (i.e., p1 , p2 rather than two equal
strategy to select good stegos for training steganalyzers variables in method [1]) and expand the range of
during the iterations. JS-IAE [28] and the method of [29] parameters into (0, 1) to control the magnitude of the
employ another way to cluster the cost modifications in gradients and original embedding costs for selecting
previous iterations. Usually, iterative methods can further the embedding units. Unlike the additive way in [1],
improve the non-iterative ones. However, they are usually we employ multiplication to adjust the correspond-
time consuming. ing costs of the selected embedding units.
• In Stego Selection: The proposed method for se-
lecting the stegos consists of two parts: selecting
The existing adversarial embedding methods just use via fooling the targeted steganalyzer and selecting
the gradients from a pre-trained CNN-based steganalyzer via minimizing the residual distance. In addition,
(or, in iterative methods, several steganalyzers) to construct new sets of high-pass filters are designed for JPEG
the final stego. Other steganalytic features have not been steganography. In this way, both the high-level (i.e.,
fully explored. In [1], we previously proposed an adver- fooling a targeted steganalyzer) and the low-level
sarial steganography embedding via stego generation and (i.e., image residuals) steganalytic features can be
selection. The main differences of the existing adversarial considered simultaneously in the proposed method.
embedding methods from our previous method [1] are
illustrated in Table 1. This method firstly generates many
candidate stegos based on the gradients and embedding In addition to the above improvements in the algorithm
costs to improve the diversity of the stegos. In this way, it is design, we provide more experimental results and analysis
expected that the steganalyzers have more difficulty catch- in this paper. For instance, parameter analysis about the
ing the steganographic pattern. Furthermore, the method adversarial magnitude α and the number of generated ste-
selects a final stego from among all the candidate stegos gos N (see Section 4.1); comparative studies about different
to minimize the residual distance between the stego and designs in the stego generation and selection modules (see
the cover. In this way, the security can be enhanced, since Section 4.2); comparison of execution times (see 4.8). To
many steganalyzers focus on analyzing the steganography show the effectiveness of the proposed method, a compari-
artifacts in the image residual domain. The experimental son is carried out with some adversarial embedding meth-
results show that this method is very effective in the spatial ods (see Section 4.5) rather than just considering original
domain. However, the performance is far from satisfactory steganography in our previous method [1]. Furthermore,
in the JPEG domain (see Table 9). In this paper, we have different partition on BOSSBase + BOWS2 (see Section 4.6)
further improved its performance in the spatial domain and and the bigger ALASKA2 dataset (see Section 4.7) are also
extend its generality in the JPEG domain. As illustrated in included in order to evaluate the security. Extensive results
Table 2, the main differences, in terms of the design of the show that the proposed method can significantly enhance
algorithm, between the proposed method in this paper and the security of modern steganographic methods both in the
our previous method [1] are as follows: spatial and JPEG domains, and perform much better than
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
those in our previous method [1] and than related methods 2.2 Iterative Adversarial Embedding Methods
based on adversarial examples. Typically, adversarial embedding methods as described in
The rest of this paper is organized as follows. Section 2 the previous section 2.1 find it easy to fool a fixed CNN-
presents a brief overview of related steganographic meth- based steganalyzer due to the vulnerability of the CNN.
ods based on adversarial examples. Section 3 presents the However, when the targeted steganalyzer is re-trained
proposed method in detail. Section 4 presents comparative based on the resulting stegos, the steganography security
results and discussions. Concluding remarks and prospects usually drops significantly. Iterative adversarial embedding,
for future research are presented in Section 5. such as [26–29], may be an effective way to deal with this
problem. In each iteration, this kind of method firstly com-
putes the gradients according to the steganalytic networks
2 R ELATED R ESEARCH
in the previous iterations, and then generates stegos based
Recently, several adversarial embedding methods have been on the gradients and updates the targeted steganalyzer.
proposed for enhancing the security of existing steganogra- The above operations are repeated until the resulting stegos
phy. The existing methods have to train a targeted CNN- converge to satisfactory results. Taking Min-Max [26, 27] for
based steganalyzer in advance, and then select embedding example, in each iteration, it uses the main algorithm of
units for subsequent cost modification according to the ADV-EMB to generate adversarial examples, and selects the
gradients from the pre-trained steganalyzer. Multiplication least detectable stegos evaluated by the best steganalyzer
and addition are two typical methods for adjusting the among all the steganalyzers in previous iterations to train a
embedding costs. Note that if the targeted steganalyzer is new steganalyzer. JS-IAE [28] and the method of [29] update
iteratively updated, we call the corresponding adversarial the original embedding costs by superimposing cost modi-
embedding methods ‘iterative’. Otherwise, they are called fications in all previous iterations. The experimental results
‘non-iterative,’ even if some embedding costs have been show that these iterative adversarial embedding methods
iteratively updated, such as ADV-EMB [24]. Table 1 shows are improvements of the corresponding non-iterative ones.
the main differences regarding some typical adversarial However, they are quite time consuming, especially when
embedding methods. We will describe them briefly in the the number of iterations is large.
following.
3 T HE P ROPOSED M ETHOD
2.1 Non-Iterative Adversarial Embedding Methods In this paper, we propose a non-iterative adversarial
Non-iterative adversarial embedding methods, such as [23– embedding method to enhance the security of the steganog-
25], mainly depend on a fixed pre-trained targeted stegana- raphy. As illustrated in Fig. 1, the framework of the pro-
lyzer. For instance, the method of [23] iteratively constructs posed steganography includes three steps: steganalytic net-
enhanced covers based on adversarial examples, and then work pre-training, stego generation, and stego selection.
embeds the secret messages into the enhanced covers until Like most related methods, the proposed method firstly
the corresponding stego can mislead the targeted stegan- trains a targeted CNN-based steganalyzer according to the
alyzer. The results in [23] show that the resulting stegos steganography to be enhanced. Note that existing non-
can successfully fool the pre-trained steganalyzer. However, iterative methods (or iterative methods in each iteration)
they are easily detected by some traditional steganalyzers usually generate only one stego to fool a targeted ste-
based on hand-crafted features. ADV-EMB firstly randomly ganalyzer. To improve the diversity of the stego, the pro-
divides the cover image into two groups. It then embeds posed method firstly generates many candidate stegos by
part of the secret message into the first group, and ob- adjusting some embedding costs according to the cover
tains the corresponding gradients based on a pre-trained gradients and embedding costs of a given cover. For those
steganalyzer. After adjusting the embedding costs in the generated stegos which can fool the targeted steganalyzer,
second group according to the gradient signs, it finally the corresponding steganography modifications are usually
embeds the remaining part of the message into the second different even though exactly the same secret message is
group to get the final stego. ADV-EMB iteratively adjusts being embedded. Thus, their security performances against
the proportion between the two groups, and repeats the re-trained targeted steganalyzer and/or other ones are also
above operations until the final stego is able to fool the pre- different. To select a better stego from among these can-
trained steganalyzer. The experimental results in [24] show didates, the proposed method takes into consideration the
that ADV-EMB can effectively improve the steganography residual distance between the stego and the cover. It is
security both in the spatial and JPEG domains even if expected that the smaller the distance, the smaller the sta-
the steganalyzers are re-trained or other steganalyzers are tistical difference between the cover and stego, and thus the
used for evaluating the security. AEN [25] employs another greater the security of the resulting stego. In the following,
method to adaptively adjust the embedding costs according we will give these three steps of the proposed method in
to the signs and amplitudes of the gradients based on the detail.
pre-trained steganalyzer. The experimental results in [25]
show that AEN can improve the security of some modern 3.1 Pre-Training the Steganalytic Network
steganography in the spatial domain. In [1], we proposed In this step, we firstly collect a set CT of cover images and
an adversarial embedding method via stego generation and obtain the corresponding set ST of stego images according
selection, and showed that it can significantly improve to an existing steganographic method F (e.g., HILL and J-
steganography security in the spatial domain. UNIWARD) to be enhanced for a given embedding payload
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
as follows: For any given cover c ∈ CT , the cost function t = 0 in order to make the resulting images more likely to
ρ0 is firstly computed via the steganography F , and then be judged as covers by the targeted steganalyzer NT . Here,
the corresponding stego image s0 can be obtained via em- L is a binary cross entropy loss function.
bedding the secret messages m into cover image c using the To select good embedding units for the subsequent
STC embedding simulator [2] as follows. cost updating, two important maps that significantly affect
the steganography security are considered in the proposed
s0 = hemb (c, m, ρ0 + , ρ0 − ). (1)
method, that is, the gradient map Gc and the original cost
+ − map ρ0 . According to the property of gradients, those em-
Note that ρ0 = ρ0 = ρ0 . Then we divide the image sets
CT and ST into two parts: a training set and a validation bedding units located at larger magnitudes of the gradient
set. Note that there is no need for a testing set since we (i.e., |Gc |) have a greater effect on the classification perfor-
aim to pre-train a CNN-based steganalyzer in this step. The mance of the targeted steganalyzer NT . According to the
targeted steganalyzer NT is trained on the training set, and definition of embedding cost, those embedding units with
the best validation snapshot in the last epochs will be taken smaller embedding costs (i.e., ρ0 ) introduce less detectable
as the result of the training. All the training details follow artifacts into the resulting stegos. Based on our experi-
the original settings in the original papers. Any given image ments, the numbers of selected embedding units affect the
x is predicted based on the output value of the steganalyzer steganography security, and the optimal numbers are differ-
NT , as follows, ent for different images. In the proposed method, therefore,
we introduce a pair (p1 , p2 ) of parameters to control the
x is cover, if NT (x) < 0.5,
(2) corresponding modification rates based on the two issues:
x is stego, if NT (x) ≥ 0.5,
selecting those embedding units with the larger p1 magni-
where NT (x) ∈ [0, 1] is the classification probability of x tude of gradients (denoted by T op|Gc | (p1 )) and with smaller
using steganalyzer NT , the label of the cover is set to be 0, p2 embedding costs (denoted by Bottomρ0 (p2 )) simulta-
and the label of the stego is set to be 1. neously, where (p1 , p2 ) is a bivariate continuous random
variable and 0 ≤ p1 ≤ 1, 0 ≤ p2 ≤ 1. Note that here both
the relation between p1 and p2 and their distributions could
3.2 Stego Generation
affect the steganography security. Based on our extensive
For any cover image c ∈ CA , where CA ∩ CT = ∅, we firstly experiments, we have found that one obtains better security
compute its original cost function ρ0 by F . We then feed the when p1 and p2 are independent and the following joint
cover image c into the pre-trained steganalyzer NT obtained distribution of the two random variables is used in the
in Step #1 to calculate the gradient map Gc of cover c using proposed method.
a back propagation algorithm as follows,
Gc = ∇c L(c, t; NT ), 1, 0 ≤ p1 ≤ 1, 0 ≤ p2 ≤ 1,
(3) f (p1 , p2 ) = (4)
0, otherwise.
L(c, t; NT ) = −t log(NT (c)) − (1 − t) log(1 − NT (c)).
where the parameter t is the image label: t = 0 denotes the We generate N pairs of (p1 , p2 ) independently. For the k -th
cover, while t = 1 denotes the stego. Note that here we set pair (p1 , p2 )k , k = 1, 2, . . . , N , we firstly select the set Mρ of
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
embedding units according to the two parameters p1 and p2 3.3.2 Selecting via Minimizing the Residual Distance
as follows, Since many existing steganalytic methods focus on ana-
lyzing the steganography artifacts in the image residual
domain, it is expected that the smaller the residual distance
Mρ = {(i, j)|(i, j) ∈ T op|Gc | (p1 ) ∩ Bottomρ0 (p2 )}, (5) between the stego and the cover, the smaller the statistical
and then for any embedding unit (i, j) in Mp , we update the difference between them, and thus the greater the security
corresponding costs according to the signs of Gc as follows, of the resulting stego. Based on this assumption, we aim
to select the final stego from among Z = {z1 , z2 , . . . , zM }
+
+ ρ0 (i, j) ∗ α, if Gc (i, j) > 0, based on minimizing the residual distance.
ρk (i, j) =
ρ+
0 (i, j), otherwise, To measure the residual distance between the stego
(6) and the cover, we firstly obtain the set Hc of adaptive
high-pass filters for the given cover c, where Hc is con-
ρ−
ρ− 0 (i, j) ∗ α, if Gc (i, j) < 0, structed by a base filter B1×w of size 1 × w (denotes by
k (i, j) = ρ−
0 (i, j), otherwise, B1×w = [b1 , . . . , 0, . . . , bw ]). As in our previous paper [32],
where α denotes the adversarial magnitude (α > 1); ρ0 = let w be an odd number, and the central element of B1×w
(ρ+ − + − initially set to 0. Using the base filter B1×w , we predict
0 , ρ0 ), respectively, ρk = (ρk , ρk ) denote the original
cost map calculated by the steganography F and the k -th the cover c and its transposed version cT by a convolution
modified version. Note that some embedding costs in ρ0 will operation:
−
become asymmetric (i.e., ρ(i, j)+ k ̸= ρ(i, j)k ), when k > 0.
In addition, we update the embedding costs multiplicatively
ĉ = c ⊗ B1×w ; cˆT = cT ⊗ B1×w . (9)
rather than additively in our previous method [1]. Here, ⊗ denotes convolution. Then the other elements of
Based on the original cost map ρ0 and the N modified B can be determined by minimizing the mean square error
cost versions ρk , k = 1, 2, . . . , N , we finally generate N + 1 between [ĉ, cˆT ] and [c, cT ]:
candidate stegos (i.e., s0 , s1 , s2 , . . . , sN ) by embedding the
2
exact same secret message m into a given cover c with the B1×w = arg min
[c, cT ] − [ĉ, cˆT ]
. (10)
STC embedding simulator as follows: B1×w 2
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
Selected Embedding Units by 𝑇𝑜𝑝 𝐺𝑐 (𝑝1 ); Selected Embedding Units by 𝑀𝜌 ∩ (𝑆𝑖𝑔𝑛(𝐺𝑐 ) = +1)
Final Costs/Elements Modification Location Obtaining Cost Modification Locations 𝑀𝜌 with Equation (5) and
Updating Costs with Equation (6)
𝟑 −𝟒 𝟏𝟐 −𝟐 12 6 1 7
𝟑 −𝟒 −𝟏𝟐 −𝟐 𝟕 𝟏𝟓 𝟔 𝟏𝟎 4 22 15 16
Computing Gradients 𝟕 𝟏𝟓 𝟔 𝟏𝟎 𝟏𝟔 −𝟗 −𝟓 −𝟏𝟒 9 5 13 8
12 6 1 7
with Equation (3) 𝟏𝟔 −𝟗 −𝟓 −𝟏𝟒 𝟏𝟑 −𝟖 𝟏𝟏 −𝟏 14 3 10 2
4 11 15 16
𝟏𝟑 −𝟖 𝟏𝟏 −𝟏 𝑇𝑜𝑝 𝐺𝑐 (0.3) 𝜌1+
9 5 13 8
𝐺𝑐
12 6 1 7 14 3 10 2 12 6 2 7
5 3 17 1
4 2 15 16 𝑀𝜌 with (𝑝1 , 𝑝2 )1 4 11 15 16
16 5 11 12
9 5 13 8 9 5 13 8
8 2 10 7
14 3 10 11 14 3 10 2
18 4 2 10
12 6 1 7 𝐿𝑜𝑤𝜌0 (0.4) 𝜌1−
…
Part Cover 𝑐
Steganography 𝑭 4 11 15 16
Cover Image 9 5 13 8 𝟑 −𝟒 𝟏𝟐 −𝟐 12 6 1 7
14 3 10 2 𝟕 𝟏𝟓 𝟔 𝟏𝟎 8 22 15 16
𝜌0+ = 𝜌0− =𝜌0 𝟏𝟔 −𝟗 −𝟓 −𝟏𝟒 18 5 13 8
12 6 1 7
𝟏𝟑 −𝟖 𝟏𝟏 −𝟏 14 3 20 2
4 11 15 16
𝑇𝑜𝑝 𝐺𝑐 (0.8) 𝜌𝑁+
9 5 13 8
Sample from Equation (4): 12 12 2 7
12 6 1 7 14 3 10 2
(𝑝1 , 𝑝2 )1 = (0.3,0.4),
4 11 15 16
..., 4 2 15 16 𝑀𝜌 with (𝑝1 , 𝑝2 )𝑁
(𝑝1 , 𝑝2 )𝑁 = (0.8,0.7) 9 5 13 8 9 10 13 16
14 3 10 11 14 6 10 2
parts, viz., CT and CA . The set CT includes 10,000 images Image Example
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
8 6 8 2
H IL L 0 .4 b p p w it h S R M
8 4 8 0
H IL L 0 .4 b p p w it h D e n g -N e t
J -U N IW A R D 0 .4 b p n z a c w ith G F R O r ig in a l H I L L w ith D e n g -N e t
8 2
J -U N IW A R D 0 .4 b p n z a c w ith D e n g -N e t 7 8
)
)
8 0
D e te c tio n A c c u r a c y (%
D e te c tio n A c c u r a c y (%
7 6
7 8
7 4 H I L L w ith S R M
7 6
H I L L w ith D e n g -N e t
7 4 7 2 O r ig in a l H I L L w ith S R M
7 2 7 0
7 0 6 8
6 8
6 6
6 6
1 2 3 4 5 6 7 8 9 1 0 1 2 3 5 1 0 2 0 3 0 5 0 1 0 0 2 0 0 3 0 0 4 0 0 5 0 0
A d v e r s a r ia l M a g n itu d e N u m b e r o f G e n e r a te d S te g o s
(a) Average detection accuracy for HILL
Fig. 4. Average detection accuracies with increasing α from 1 to 10.
O r ig in a l J -U N I W A R D w ith D e n g -N e t
8 5
results in all the following experiments. J -U N I W A R D w ith G F R
J -U N I W A R D w ith D e n g -N e t
)
8 0
D e te c tio n A c c u r a c y (%
O r ig in a l J -U N I W A R D w ith G F R
4.1 Parameter Selection
There are two important parameters in the proposed
7 5
method: the adversarial magnitude α (where α > 1) for
adjusting the original costs, and the number of generated
stegos N . To obtain the optimal pair (α, N ) of parameters, 7 0
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
TABLE 3
Average detection accuracy (%) evaluated on the targeted steganalyzer (Deng-Net) in the spatial domain. Those values with an asterisk (*) are the
best results in the corresponding cases. The last column gives the average improvements over four payloads for a given steganography. The last
row gives the average improvements for a given payload.
TABLE 4
Average detection accuracy (%) evaluated on the targeted steganalyzer (Deng-Net) in the JPEG domain. Those values with an asterisk (*) are the
best results in the corresponding cases. The last column gives the average improvements over four payloads for a given steganography. The last
row denotes the average improvements over a given payload.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
TABLE 6
Average detection accuracy (%) evaluated on four re-trained steganalyzers in spatial domain. Those values with an asterisk (*) are the best results
in the corresponding cases. The last column gives the average improvements over four different steganalyzers for a given steganography and
payload.
TABLE 7
Average detection accuracy (%) evaluated on four re-trained steganalyzers in JPEG domain. Those values with an asterisk (*) are the best results
in the corresponding cases. The last column denotes the average improvements over four different steganalyzers for a given steganography and
payload.
• For a given steganographic method, the average ploys other steganalyzers for security evaluation. The av-
improvements usually increase with increasing pay- erage detection accuracies evaluated on some re-trained ste-
load. As shown in the “Average” rows in Table 3 ganalyzers are shown in Table 6 for spatial steganography
and Table 4, the average improvements in the spatial and Table 7 for JPEG steganography. These two tables lead
domain for 0.1 − 0.4 bpp are around 12%, 18%, 21% us to make the three following observations:
and 22%, respectively. The average improvements in
the JPEG domain for 0.1 − 0.4 bpnzac are around • The proposed method can enhance the security of
10%, 19%, 24% and 26% respectively. the original steganography in all cases, both in the
spatial domain and the JPEG domain. Taking Mi-
4.4 Security Evaluation on Re-Trained Steganalyzers POD at 0.4 bpp and J-UNIWARD (QF = 75) at
In real applications, the detector usually retrains the tar- 0.4 bpnzac, for example, the proposed method can
geted steganalytic network (viz., Deng-Net) and/or em- achieve improvements of over 5% and 13%, which
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
10
TABLE 8
Average detection accuracy (%) of the proposed method, ADV-EMB [24], AEN [25] and Method [1] in spatial domain. The last column gives the
average improvements for a given enhancement method. Those values with an asterisk (*) are the best results, while underlined values are the
worst results in the corresponding cases.
TABLE 9
Average detection accuracy (%) of the proposed method, ADV-EMB [24] and Method [1] in JPEG domain. The last column gives the average
improvements for a given enhancement method. Those values with an asterisk (*) are the best results, while underlined values are the worst
results in the corresponding cases.
are significant for modern steganography. Note that 6 and Table 7) become relatively smaller. However,
the proposed method is also effective for steganog- the proposed method also achieves improvements of
raphy with asymmetric embedding. Taking CMD- 4.93% in the spatial domain and 10.06% in the JPEG
HILL at 0.4bpp, for instance, the proposed method domain.
achieves over 4% improvement.
• The proposed method was originally designed to
fool a specific CNN-based steganalyzer (namely, 4.5 Comparison with Related Methods
Deng-Net in our experiments). The results in Table As shown in Table 1, there are several non-iterative meth-
6 and Table 7 show that it is also effective at fooling ods based on adversarial embedding. In this section, we
other CNN-based steganalyzers, such as Xu-Net and will compare the proposed method with our preliminary
SRNet and traditional steganalyzers based on hand- method, that of [1], and two recent methods: ADV-EMB [24]
crafted features, such as SRM and maxSRMd2 in the and AEN [25] in the spatial domain and ADV-EMB in the
spatial domain, and GFR and SCA-GFR in the JPEG JPEG domain. Note that the targeted steganalyzer of ADV-
domain. This is mainly due to the adversarial sample EMB and AEN is Xu-Net, while the targeted steganalyzer of
transferability [35–37], which is the property that the the proposed method is Deng-Net. For the sake of a fair
adversarial samples produced to mislead a special comparison, both Xu-Net and Deng-Net are used as the
model are able to mislead other models, so long as targeted steganalyzer in ADV-EMB and AEN, denoted by
those models were trained to perform the same task. ADV-EMB{Xu-Net}, ADV-EMB{Deng-Net}, AEN{Xu-Net}
and AEN{Deng-Net} respectively.
• Compared with the corresponding results in Table 3
and Table 4, the average improvements against the 4.5.1 Comparisons in the Spatial Domain
re-trained Deng-Net (i.e., the third column in Table Since the optimal parameters for S-UNIWARD and HILL
are given in AEN, the two steganographic methods are
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
11
TABLE 10
Average detection accuracy (%) of the proposed method, ADV-EMB [24] and Method [1] with different dataset division on BOSSBase and BOWS2
in spatial domain. The last column gives the average improvements for a given enhancement method. Those values with an asterisk (*) are the
best results, while underlined values are the worst results in the corresponding cases.
TABLE 11
Average detection accuracy (%) of the proposed method, ADV-EMB [24] and Method [1] with different dataset division on BOSSBase and BOWS2
in the JPEG domain. The last column gives the average improvements for a given enhancement method. Those values with an asterisk (*) are the
best results, while underlined values are the worst results in the corresponding cases.
considered in this section. The average detection accuracies method achieves an improvement of over 9.9%,
are shown in Table 8, which leads us to make the two while the current best method is ADV-EMB, which
following observations: achieves less than 7.2%. Note that our previous
method [1] just improves the original steganography
• The proposed method can achieve the best perfor- slightly (less than 0.65% on average). In some cases,
mance in almost every case. The average improve- it even works more poorly than the original ones.
ment of the proposed method for S-UNIWARD is
3.42% and for HILL it is 4.56%, while the current • Compared with Xu-Net, Deng-Net is a better tar-
best related method is our previous method [1], geted steganalytic network for ADV-EMB. Tak-
which achieves improvements of 1.90% and 3.40%. ing J-UNIWARD, for example, ADV-EMB{Xu-Net}
Although AEN also enhances the security of the achieves an average improvement 3.97%, which be-
steganography, the improvements are slight (less comes 7.15% for ADV-EMB{Deng-Net}.
than 0.75% in all cases).
• The targeted steganalyzer is one of the important fac-
tors that can affect the security performance. Based 4.6 Security Evaluation on Different Dataset Division
on our experiments, Deng-Net is better than Xu-Net on BOSSBase and BOWS2
both for ADV-EMB and AEN. Taking S-UNIWARD, Since different ways of dataset division probably affect the
for example, ADV-EMB{Xu-Net} achieves an av- security performance, in this section, we also give some
erage improvement of 0.52%, and AEN{Xu-Net} comparative results on another division of the dataset on
0.34%, and these increase to 1.56% and 0.71% when BOSSBase and BOWS2. As in [21, 22], the training set
their targeted steganalyzers are changed to Deng- consists of 14, 000 images (10,000 images from BOWS2
Net. and 4,000 images chosen at random from BOSSBase), the
validation set consists of 1, 000 images chosen at random
4.5.2 Comparisons in the JPEG domain from BOSSBase and the test set consists of the remaining
The comparisons are shown in Table 9. An examination of 5,000 images of BOSSBase. For simplicity, ADV-EMB{Deng-
Table 9 leads to two observations similar to those made in Net} and our previous method [1] are considered since
the previous subsection. they can obtain better improvements of the security than
the related methods (see Table 8 and Table 9 for details).
• The proposed method always achieves the best per- The comparative results are shown in Table 10 and Table
formance in every case. On average, the proposed 11. From these two tables, we observe that the proposed
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
12
TABLE 12
Average detection accuracy (%) of the proposed method, ADV-EMB [24] and Method [1] on ALASKA2 dataset in spatial domain. The last column
gives the average improvements for a given enhancement method. Those values with an asterisk (*) are the best results, while the underlined
values are the worst results in the corresponding cases.
TABLE 13
Average detection accuracy (%) of the proposed method, ADV-EMB [24] and Method [1] on ALASKA2 dataset in JPEG domain. The last column
gives the average improvements for a given enhancement method. Those values with an asterisk (*) are the best results, while underlined values
are the worst results in the corresponding cases.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
13
9 0
7 0
8 0
6 0
)
)
7 0
S u c c e ss R a te (%
S u c c e ss R a te (%
5 0
6 0
W O W
J -U N IW A R D w ith Q F = 7 5
S -U N IW A R D 4 0
5 0 J -U N IW A R D w ith Q F = 9 5
H IL L
U E R D w ith Q F = 7 5
M iP O D
U E R D w ith Q F = 9 5
4 0 C M D -H IL L 3 0
0 .1 0 .2 0 .3 0 .4 0 .1 0 .2 0 .3 0 .4
P a y lo a d (b p p ) P a y lo a d (b p n z a c )
(a) Success rate in spatial domain (b) Success rate in JPEG domain
Fig. 6. Average success rates (a) For five modern steganographic methods, namely, WOW, S-UNIWARD, MiPOD, HILL and CMD-HILL in spatial
domain; (b) For J-UNIWAED and UERD with different quality factors in JPEG domain and different payloads.
(a) HILL 0.2 bpp (b) J-UNIWARD (QF=75) 0.2 bpnzac (c) CMD-HILL 0.2 bpp
(d) HILL 0.4 bpp (e) J-UNIWARD (QF=75) 0.4 bpnzac (f) CMD-HILL 0.4 bpp
Fig. 7. Distributions of parameter pairs (p1 , p2 ) for HILL, J-UNIWRAD and CMD-HILL
and the proposed method, as shown by the results in Table 4.9.1 Analysis of Success Rate
8. In addition, AEN does not work in the JPEG domain at In addition to the original stego (s0 ), the proposed method
all. tries to generate other candidate stegos (s1 , s2 , . . . , sN ). If
the final stego is not s0 , we say that the proposed method
successfully generates stegos that are better than the original
4.9 Statistical Analysis one. Thus, we define the success rate as follows:
P
In this section, we firstly give an analysis for different I(s ̸= s0 )
c∈CA
cost updating rules, and we would provide two statistics Rs = , (14)
|CA |
about the proposed method: the success rate (to measure the
efficiency of the generated stegos) and the distribution of the where for a given cover c ∈ CA , s is the final stego with the
pairs (p1 , p2 ) of parameter used in the stego generation. proposed method, I is an indicator function, and |CA | is the
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
14
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Dependable and Secure Computing. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TDSC.2022.3182041
15
[14] J. Kodovsky, J. Fridrich, and V. Holub, “Ensemble clas- [30] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Er-
sifiers for steganalysis of digital media,” IEEE Trans. Inf. han, I. Goodfellow, and R. Fergus, “Intriguing proper-
Forensics Security, vol. 7, no. 2, pp. 432–444, 2011. ties of neural networks,” arXiv preprint arXiv:1312.6199,
[15] W. Tang, H. Li, W. Luo, and J. Huang, “Adaptive 2013.
steganalysis against WOW embedding algorithm,” in [31] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining
Proc. of the ACM Workshop Inf. Hiding and Multimedia and harnessing adversarial examples,” arXiv preprint
Secur. (IH&MMSec), 2014, pp. 91–96. arXiv:1412.6572, 2014.
[16] T. Denemark, V. Sedighi, V. Holub, R. Cogranne, and [32] B. Chen, W. Luo, P. Zheng, and J. Huang, “Universal
J. Fridrich, “Selection-channel-aware rich model for stego post-processing for enhancing image steganogra-
steganalysis of digital images,” in IEEE Inf. Workshop phy,” J. Inf. Secur. Appl., vol. 55, p. 102664, 2020.
Inf. Forensics and Secur. (WIFS), 2014, pp. 48–53. [33] P. Bas, T. Filler, and T. Pevny, “Break our stegano-
[17] W. Tang, H. Li, W. Luo, and J. Huang, “Adaptive ste- graphic system: the ins and outs of organizing BOSS,”
ganalysis based on embedding probabilities of pixels,” Inf. Workshop Inf. Hiding, pp. 59–70, 2011.
IEEE Trans. Inf. Forensics Security, vol. 11, no. 4, pp. 734– [34] P. Bas and T. Furon, “BOWS-2,” 2007.
745, 2016. [35] P. M. N. Papernot and I. Goodfellow, “Transferabil-
[18] T. D. Denemark, M. Boroumand, and J. Fridrich, “Ste- ity in machine learning: from phenomena to black-
ganalysis features for content-adaptive JPEG steganog- box attacks using adversarial samples,” arXiv preprint
raphy,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 8, arXiv:1605.07277, 2016.
pp. 1736–1746, 2016. [36] N. Carlini and D. Wagner, “Towards evaluating the ro-
[19] G. Xu, H. Wu, and Y. Shi, “Structural design of convo- bustness of neural networks,” in 2017 IEEE Symposium
lutional neural networks for steganalysis,” IEEE Signal Secur. and Privacy (SP), 2017, pp. 39–57.
Process. Lett., vol. 23, no. 5, pp. 708–712, 2016. [37] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B.
[20] G. Xu, “Deep convolutional neural network to detect Celik, and A. Swami, “The limitations of deep learning
J-UNIWARD,” in Proc. of the 5th ACM Workshop Inf. in adversarial settings,” in 2016 IEEE European Sympo-
Hiding and Multimedia Secur. (IH&MMSec), 2017, pp. 67– sium Secur. and Privacy (Euro SP), 2016, pp. 372–387.
73. [38] R. Cogranne, Q. Giboulot and P. Bas, “Alaska#2: Chal-
[21] X. Deng, B. Chen, W. Luo, and D. Luo, “Fast and lenging academic research on steganalysis with realistic
effective global covariance pooling network for image images,” in IEEE Inf. Workshop Inf. Forensics and Secur.,
steganalysis,” in Proc. of the ACM Workshop Inf. Hiding (WIFS), 2020, pp. 1–5.
and Multimedia Secur. (IH&MMSec), 2019, pp. 230–234.
[22] M. Boroumand, M. Chen, and J. Fridrich, “Deep resid-
ual network for steganalysis of digital images,” IEEE
Trans. Inf. Forensics Security, vol. 14, no. 5, pp. 1181–
1193, 2018.
[23] Y. Zhang, W. Zhang, K. Chen, J. Liu, Y. Liu, and N. Yu,
“Adversarial examples against deep neural network
based steganalysis,” in Proc. of the 6th ACM Workshop
Inf. Hiding and Multimedia Secur. (IH&MMSec), 2018, pp.
67–72.
[24] W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, “CNN-
based adversarial embedding for image steganogra-
phy,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 8,
pp. 2074–2087, 2019.
[25] S. Ma, X. Zhao, and Y. Liu, “Adaptive spatial steganog-
raphy based on adversarial examples,” Multim. Tools
Appl., vol. 78, no. 22, pp. 32 503–32 522, 2019.
[26] S. Bernard, T. Pevnỳ, P. Bas, and J. Klein, “Exploiting
adversarial embeddings for better steganography,” in
Proc. of the ACM Workshop Inf. Hiding and Multimedia
Secur. (IH&MMSec), 2019, pp. 216–221.
[27] S. Bernard, P. Bas, J. Klein, and T. Pevny, “Explicit
optimization of min max steganographic game,” IEEE
Trans. Inf. Forensics Security, vol. 16, pp. 812–823, 2021.
[28] H. Mo, T. Song, B. Chen, W. Luo, and J. Huang, “En-
hancing JPEG steganography using iterative adversar-
ial examples,” in IEEE Inf. Workshop Inf. Forensics and
Secur. (WIFS), 2019, pp. 1–6.
[29] J. Wu, B. Chen, W. Luo, and Y. Fang, “Audio steganog-
raphy based on iterative adversarial attacks against
convolutional neural networks,” IEEE Trans. Inf. Foren-
sics Security, vol. 15, pp. 2282–2294, 2020.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on October 12,2022 at 13:23:03 UTC from IEEE Xplore. Restrictions apply.