Skip to main content

Image Steganography Using GANs

  • Chapter
  • First Online:
Computer and Information Science 2021—Summer (ICIS 2021)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 985))

Included in the following conference series:

Abstract

Secure transmission of information across networks is of esteem importance to meet confidentiality and privacy goals and therefore is a huge concern to modern society. To prevent information from being compromised during communication, many steganography or data hiding algorithms have been introduced in recent years. Steganography refers to hiding secret information into cover files like text, images, audio etc., to secure communications. The term Image Steganography is used to describe steganography processes where images are used as cover files. Conventional steganography algorithms are observed to impose high risk of being deciphered by intelligent systems. This paper proposes a system that eliminates such a risk by hiding secret information inside stego images generated using Generative Adversarial Networks (GANs) and then safely reproducing it using an Extractor model. The experimental results of the proposed system demonstrated an accuracy of 92.34% achieved by the extractor model while retrieving the hidden information from the stego images and an overall steganography capacity of 93.75e−3 bytes/pixel for the entire system. Thus, the proposed system reduces the probability of any external intelligent system intercepting the communication and stealing information, like in the case of systems following traditional algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Liu, J., et al.: Recent advances of image steganography with generative adversarial networks. IEEE Access 8, 60575–60597 (2020). https://doi.org/10.1109/ACCESS.2020.2983175

    Article  Google Scholar 

  2. Cachin, C.: An information-theoretic model for steganography. In: Information Hiding, pp. 306–318. Springer, Berlin, Germany (1998). [Online]. Available: https://doi.org/10.1007/3-540-49380-8_21

  3. Reed, S., Akata, Z., Yan, X., Logeswaran, L., Schiele, B., Lee, H.: Generative adversarial text to image synthesis (2016), [Online]. Available: https://arxiv.org/abs/1605.05396

  4. Volkhonskiy, D., Borisenko, B., Burnaev, E.: Steganographic generative adversarial networks. CoRR abs/1703.05502 (2017), [Online]. Available: http://arxiv.org/abs/1703.05502

  5. Liu, M.-M., Zhang, M.-Q., Liu, J., Gao, P.-X., Zhang, Y.-N.: Coverless information hiding based on generative adversarial networks. Yingyong Kexue Xuebao/J. Appl. Sci. 36, 371–382 (2018). https://doi.org/10.3969/j.issn.0255-8297.2018.02.015

    Article  Google Scholar 

  6. Li, J., Niu, K., Liao, L., Wang, L., Liu, J., Lei, Y., Zhang, M.: A generative steganography method based on WGAN-GP (2020). https://doi.org/10.1007/978-981-15-8083-3_34

  7. Zhang, Z., et al.: Generative steganography by sampling. IEEE Access 7, 118586–118597 (2019). https://doi.org/10.1109/ACCESS.2019.2920313

    Article  Google Scholar 

  8. Zhang, Z., Fu, G., Di, F., Li, C., Liu, J.: Generative reversible data hiding by image-to-image translation via GANs. Secur. Commun. Networks 2019, 1–10 (2019). https://doi.org/10.1155/2019/4932782

    Article  Google Scholar 

  9. Sarkar, T., Sanyal, S.: Reversible and irreversible data hiding technique (2014)

    Google Scholar 

  10. Pibre, L., Jérôme, P., Ienco, D., Chaumont, M.: Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch (2015), [Online]. Available: https://arxiv.org/abs/1511.04855

  11. Ke, Y., Zhang, M., Liu, J., Su, T., Yang, X.: Generative steganography with Kerckhoffs’ principle based on generative adversarial networks (2018). https://arxiv.org/abs/1711.04916

  12. Hu, D., Wang, L., Jiang, W., Zheng, S., Li, B.: A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6, 38303–38314 (2018). https://doi.org/10.1109/ACCESS.2018.2852771

    Article  Google Scholar 

  13. Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Proceedings of International Conference on Cloud Computing Security, pp. 123–132 (2015)

    Google Scholar 

  14. Zhou, Z.-L., Cao, Y., Sun, X.-M.: Coverless information hiding based on bag-of-words model of image. J. Appl. Sci. 34(5), 527–536 (2016)

    Google Scholar 

  15. Zheng, S., Wang, L., Ling, B., Hu, D.: Coverless information hiding based on robust image hashing. In: Intelligent Computing Methodologies, pp. 536–547. Springer, Cham, Switzerland (2017). https://doi.org/10.1007/978-3-319-63315-2_47

  16. Otori, H., Kuriyama, S.: Texture synthesis for mobile data communications. IEEE Comput. Graph. Appl. 29(6), 74–81 (2009)

    Article  Google Scholar 

  17. Xu, J., et al.: Hidden message in a deformation-based texture. Vis. Comput. Int. J. Comput. Graph. 31(12), 1653–1669 (2015)

    Google Scholar 

  18. Wu, K.-C., Wang, C.-M.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130–139 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ketan Ramaneti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ramaneti, K., Kakani, P., Krishna, C., Rajkumar, S. (2021). Image Steganography Using GANs. In: Lee, R. (eds) Computer and Information Science 2021—Summer . ICIS 2021. Studies in Computational Intelligence, vol 985. Springer, Cham. https://doi.org/10.1007/978-3-030-79474-3_12

Download citation

Publish with us

Policies and ethics