منابع مشابه
Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks
The distortion in steganography comes from the modification or recoding on the cover image during the embedding process. The changes of the cover always leave the steganalyzer with possibility of discriminating. Therefore, we propose to use a cover to send out secret messages without any modification by training the cover image to generate the secret messages. To ensure the security of such a g...
متن کاملGenerative Adversarial Networks for Image Steganography
Steganography is collection of methods to hide secret information (“payload”) within non-secret information (“container”). Its counterpart, Steganalysis, is the practice of determining if a message contains a hidden payload, and recovering it if possible. Presence of hidden payloads is typically detected by a binary classifier. In the present study, we propose a new model for generating image-l...
متن کاملProvably Secure Steganography with Imperfect Sampling
The goal of steganography is to pass secret messages by disguising them as innocent-looking covertexts. Real world stegosystems are often broken because they make invalid assumptions about the system’s ability to sample covertexts. We examine whether it is possible to weaken this assumption. By modeling the covertext distribution as a stateful Markov process, we create a sliding scale between r...
متن کاملSSGAN: Secure Steganography Based on Generative Adversarial Networks
In this paper, a novel strategy of Secure Steganograpy based on Generative Adversarial Networks is proposed to generate suitable and secure covers for steganography. The proposed architecture has one generative network, and two discriminative networks. The generative network mainly evaluates the visual quality of the generated images for steganography, and the discriminative networks are utiliz...
متن کاملProvably Secure Steganography and the Complexity of Sampling
Recent work on theoretical aspects of steganography resulted in the construction of oracle-based stegosystems. It has been shown that these can be made secure against the steganography equivalents of common cryptographic attacks. In this paper we use methods from complexity theory to investigate the efficiency of sampling from practically relevant types of channels. We show that there are chann...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2920313