Evaluating the Robustness of Image Steganography Techniques against Diverse Degradation Techniques

Show simple item record

dc.contributor.author Orpa, Lamiya Tahsin
dc.contributor.author Ferdous, Rahanuma Ryaan
dc.contributor.author Hasan, Umme Tasnim
dc.date.accessioned 2025-06-02T10:14:35Z
dc.date.available 2025-06-02T10:14:35Z
dc.date.issued 2024-06-30
dc.identifier.citation [1] E. Agustsson and R. Timofte, “Ntire 2017 challenge on single image super resolution: Dataset and study,” in Proceedings of the IEEE conference on com puter vision and pattern recognition workshops, 2017, pp. 126–135. [2] S. Baluja, “Hiding images in plain sight: Deep steganography,” Advances in neu ral information processing systems, vol. 30, 2017. [3] S. Baluja, “Hiding images within images,” IEEE transactions on pattern analysis and machine intelligence, vol. 42, no. 7, pp. 1685–1697, 2019. [4] M. Barni, F. Bartolini, and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE transactions on image processing, vol. 10, no. 5, pp. 783–791, 2001. [5] T. Bui, S. Agarwal, N. Yu, and J. Collomosse, “Rosteals: Robust steganography using autoencoder latent space,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023, pp. 933–942. [6] H. Chen, L. Song, Z. Qian, X. Zhang, and K. Ma, “Hiding images in deep prob abilistic models,” Advances in Neural Information Processing Systems, vol. 35, pp. 36 776–36 788, 2022. [7] X. Deng, C. Gao, and M. Xu, “Pirnet: Privacy-preserving image restoration net work via wavelet lifting,” in Proceedings of the IEEE/CVF International Confer ence on Computer Vision, 2023, pp. 22 368–22 377. [8] J. Fridrich, M. Goljan, and R. Du, “Detecting lsb steganography in color, and gray-scale images,” IEEE multimedia, vol. 8, no. 4, pp. 22–28, 2001. [9] S. Ghamizi, M. Cordy, M. Papadakis, and Y. Le Traon, “Evasion attack steganog raphy: Turning vulnerability of machine learning to adversarial attacks into a real-world application,” in Proceedings of the IEEE/CVF International Confer ence on Computer Vision, 2021, pp. 31–40. [10] J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” Advances in neural information processing systems, vol. 30, 2017. 61 [11] M. Heusel, H. Ramsauer, T. Unterthiner, B. Nessler, and S. Hochreiter, “Gans trained by a two time-scale update rule converge to a local nash equilibrium,” Advances in neural information processing systems, vol. 30, 2017. [12] V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in 2012 IEEE International workshop on information forensics and secu rity (WIFS), IEEE, 2012, pp. 234–239. [13] V. Holub, J. Fridrich, and T. Denemark, “Universal distortion function for steganog raphy in an arbitrary domain,” EURASIP Journal on Information Security, vol. 2014, pp. 1–13, 2014. [14] C.-T. Hsu and J.-L. Wu, “Hidden digital watermarks in images,” IEEE Transac tions on image processing, vol. 8, no. 1, pp. 58–68, 1999. [15] D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, “A novel image steganography method via deep convolutional generative adversarial networks,” IEEE access, vol. 6, pp. 38 303–38 314, 2018. [16] J. Jia, Z. Gao, K. Chen, et al., “Rihoop: Robust invisible hyperlinks in offline and online photographs,” IEEE Transactions on Cybernetics, vol. 52, no. 7, pp. 7094– 7106, 2020. [17] J. Jia, Z. Gao, D. Zhu, X. Min, G. Zhai, and X. Yang, “Learning invisible mark ers for hidden codes in offline-to-online photography,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 2273– 2282. [18] J. Jing, X. Deng, M. Xu, J. Wang, and Z. Guan, “Hinet: Deep image hiding by invertible network,” in Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), Oct. 2021, pp. 4733–4742. [19] T. Karras, S. Laine, and T. Aila, “A style-based generator architecture for gener ative adversarial networks,” in Proceedings of the IEEE/CVF conference on com puter vision and pattern recognition, 2019, pp. 4401–4410. [20] T. Karras, S. Laine, M. Aittala, J. Hellsten, J. Lehtinen, and T. Aila, “Analyzing and improving the image quality of stylegan,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2020, pp. 8110–8119. [21] D. Kim, C. Shin, J. Choi, D. Jung, and S. Yoon, “Diffusion-stego: Training-free diffusion generative steganography via message projection,” arXiv preprint arXiv:2305.18726, 2023. 62 [22] V. Kishore, X. Chen, Y. Wang, B. Li, and K. Q. Weinberger, “Fixed neural net work steganography: Train the images, not the network,” in International Con ference on Learning Representations, 2021. [23] D. Lerch-Hostalot and D. Megías, “Unsupervised steganalysis based on artificial training sets,” Engineering Applications of Artificial Intelligence, vol. 50, pp. 45– 59, 2016. [24] B. Li, M. Wang, J. Huang, and X. Li, “A new cost function for spatial image steganography,” in 2014 IEEE International conference on image processing (ICIP), IEEE, 2014, pp. 4206–4210. [25] J. Li, K. Niu, L. Liao, et al., “A generative steganography method based on wgan gp,” in Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I 6, Springer, 2020, pp. 386–397. [26] X. Liao, J. Yin, M. Chen, and Z. Qin, “Adaptive payload distribution in multiple images steganography based on image texture features,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 897–911, 2020. [27] T.-Y. Lin, M. Maire, S. Belongie, et al., “Microsoft coco: Common objects in context,” in Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, Springer, 2014, pp. 740– 755. [28] M.-m. Liu, M.-q. Zhang, J. Liu, Y.-n. Zhang, and Y. Ke, “Coverless information hiding based on generative adversarial networks,” arXiv preprint arXiv:1712.06951, 2017. [29] X. Liu, Z. Ma, J. Ma, J. Zhang, G. Schaefer, and H. Fang, “Image disentangle ment autoencoder for steganography without embedding,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Jun. 2022, pp. 2303–2312. [30] S.-P. Lu, R. Wang, T. Zhong, and P. L. Rosin, “Large-capacity image steganog raphy based on invertible neural networks,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2021, pp. 10 816–10 825. [31] W. Luo, F. Huang, and J. Huang, “Edge adaptive image steganography based on lsb matching revisited,” IEEE Transactions on information forensics and se curity, vol. 5, no. 2, pp. 201–214, 2010. [32] Q. Nguyen, T. Vu, C. Pham, A. Tran, and K. Nguyen, “Stable messenger: Steganog raphy for message-concealed image generation,” arXiv preprint arXiv:2312.01284, 2023. 63 [33] T. Pevny, T. Filler, and P. Bas, “Using high-dimensional image models to per- ` form highly undetectable steganography,” in Information Hiding: 12th Interna tional Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Se lected Papers 12, Springer, 2010, pp. 161–177. [34] R. Rahim, S. Nadeem, et al., “End-to-end trained cnn encoder-decoder networks for image steganography,” in Proceedings of the European conference on com puter vision (ECCV) workshops, 2018. [35] J. Ruanaidh, W. J. Dowling, and F. M. Boland, “Phase watermarking of digital images,” in Proceedings of 3rd IEEE International Conference on Image Process ing, IEEE, vol. 3, 1996, pp. 239–242. [36] O. Russakovsky, J. Deng, H. Su, et al., “Imagenet large scale visual recognition challenge,” International journal of computer vision, vol. 115, pp. 211–252, 2015. [37] V. Sedighi, R. Cogranne, and J. Fridrich, “Content-adaptive steganography by minimizing statistical detectability,” IEEE Transactions on Information Foren sics and Security, vol. 11, no. 2, pp. 221–234, 2015. [38] H. Shi, J. Dong, W. Wang, Y. Qian, and X. Zhang, “Ssgan: Secure steganography based on generative adversarial networks,” in Advances in Multimedia Informa tion Processing–PCM 2017: 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I 18, Springer, 2018, pp. 534–544. [39] M. Tancik, B. Mildenhall, and R. Ng, “Stegastamp: Invisible hyperlinks in phys ical photographs,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2020, pp. 2117–2126. [40] W. Tang, S. Tan, B. Li, and J. Huang, “Automatic steganographic distortion learn ing using a generative adversarial network,” IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547–1551, 2017. [41] D. Volkhonskiy, I. Nazarov, and E. Burnaev, “Steganographic generative adver sarial networks,” in Twelfth international conference on machine vision (ICMV 2019), SPIE, vol. 11433, 2020, pp. 991–1005. [42] Z. Wang, N. Gao, X. Wang, X. Qu, and L. Li, “Sstegan: Self-learning steganogra phy based on generative adversarial networks,” in Neural Information Process ing: 25th International Conference, ICONIP 2018, Siem Reap, Cambodia, Decem ber 13–16, 2018, Proceedings, Part II 25, Springer, 2018, pp. 253–264. [43] P. Wei, S. Li, X. Zhang, G. Luo, Z. Qian, and Q. Zhou, “Generative steganography network,” in Proceedings of the 30th ACM International Conference on Multime dia, 2022, pp. 1621–1629. 64 [44] P. Wei, G. Luo, Q. Song, X. Zhang, Z. Qian, and S. Li, “Generative steganographic flow,” in 2022 IEEE International Conference on Multimedia and Expo (ICME), IEEE, 2022, pp. 1–6. [45] P. Wei, Q. Zhou, Z. Wang, Z. Qian, X. Zhang, and S. Li, “Generative steganog raphy diffusion,” arXiv preprint arXiv:2305.03472, 2023. [46] X. Weng, Y. Li, L. Chi, and Y. Mu, “High-capacity convolutional video steganog raphy with temporal residual modeling,” in Proceedings of the 2019 on interna tional conference on multimedia retrieval, 2019, pp. 87–95. [47] E. Wengrowski and K. Dana, “Light field messaging with deep photographic steganography,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 1515–1524. [48] P. Wu, Y. Yang, and X. Li, “Stegnet: Mega image steganography capacity with deep convolutional network,” Future Internet, vol. 10, no. 6, p. 54, 2018. [49] Y. Xu, C. Mou, Y. Hu, J. Xie, and J. Zhang, “Robust invertible image steganogra phy,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pat tern Recognition, 2022, pp. 7875–7884. [50] C. Yu, D. Hu, S. Zheng, W. Jiang, M. Li, and Z.-q. Zhao, “An improved steganog raphy without embedding based on attention gan,” Peer-to-Peer Networking and Applications, vol. 14, pp. 1446–1457, 2021. [51] F. Yu, A. Seff, Y. Zhang, S. Song, T. Funkhouser, and J. Xiao, “Lsun: Construc tion of a large-scale image dataset using deep learning with humans in the loop,” arXiv preprint arXiv:1506.03365, 2015. [52] J. Yu, X. Zhang, Y. Xu, and J. Zhang, “Cross: Diffusion model makes control lable, robust and secure image steganography,” Advances in Neural Information Processing Systems (NeurIPS), 2023. [53] C. Zhang, P. Benz, A. Karjauv, G. Sun, and I. S. Kweon, “Udh: Universal deep hiding for steganography, watermarking, and light field messaging,” Advances in Neural Information Processing Systems, vol. 33, pp. 10 223–10 234, 2020. [54] K. A. Zhang, A. Cuesta-Infante, and K. Veeramachaneni, “Steganogan: High ca pacity image steganography with gans,” arXiv preprint arXiv:1901.03892, 2019. [Online]. Available: https://arxiv.org/abs/1901.03892. [55] R. Zhang, S. Dong, and J. Liu, “Invisible steganography via generative adversar ial networks,” Multimedia tools and applications, vol. 78, pp. 8559–8575, 2019. 65 [56] Z. Zhang, G. Fu, R. Ni, J. Liu, and X. Yang, “A generative method for steganog raphy by cover synthesis with auxiliary semantics,” Tsinghua Science and Tech nology, vol. 25, no. 4, pp. 516–527, 2020. [57] Z. Zhou, Y. Su, J. Li, et al., “Secret-to-image reversible transformation for gener ative steganography,” IEEE Transactions on Dependable and Secure Computing, 2022. [58] Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, “Coverless image steganogra phy without embedding,” in Cloud Computing and Security: First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers 1, Springer, 2015, pp. 123–132. [59] J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “Hidden: Hiding data with deep networks,” in Proceedings of the European conference on computer vision (ECCV), 2018, pp. 657–672. en_US
dc.identifier.uri http://hdl.handle.net/123456789/2413
dc.description Supervised by Dr. Md. Hasanul Kabir, Professor, Co-supervisor Mr. Shahriar Ivan, Lecturer, Department of Computer Science and Engineering (CSE) Islamic University of Technology (IUT) Board Bazar, Gazipur, Bangladesh This thesis is submitted in partial fulfillment of the requirement for the degree of Bachelor of Science in Software Engineering, 2024 en_US
dc.description.abstract Within the field of steganography, image steganography is a fascinating technique that hides confidential data behind a cover image. However, the quality and security of hidden content are threatened by potential degradation introduced by the transmis sion of stego images, which can take the form of noise, blurring, or sharpening. In this research endeavor, we present an innovative approach by integrating image degrada tion models into an existing state-of-the-art invertible image-in-image steganography model known as HiNet. Our proposed methodology involves applying a degradation model to the stego image post-secret image embedding, followed by the usual secret image extraction. By introducing these additional layers to the steganographic pro cess, we aim to enhance the robustness of our model against various degradation sce narios, such as Gaussian noise, blurring, and sharpening. By using knowledge from cutting-edge architectures such as HiNet, we aim to improve the overall security and quality of hidden pictures. We performed experiments on HiNet and achieved im proved results in handling degradations like noise, blurring, and sharpening. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering(CSE), Islamic University of Technology(IUT), Board Bazar, Gazipur-1704, Bangladesh en_US
dc.title Evaluating the Robustness of Image Steganography Techniques against Diverse Degradation Techniques en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUT Repository


Advanced Search

Browse

My Account

Statistics