Abstract
Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the existing methods can learn satisfactory additive costs, the interplay of different pixels’ embedding impacts has not been considered, so the potential of learning may not be fully exploited. To overcome this limitation, in this paper, a reinforcement learning paradigm called JoPoL (joint policy learning) is proposed to extend the idea of additive cost learning to a non-additive situation. JoPoL aims to capture the interactions within pixel blocks by defining embedding policies and evaluating contributions of embedding impacts on a block level rather than a pixel level. Then, a policy network is utilized to learn optimal joint embedding policies for pixel blocks through interactions with the environment. Afterwards, these policies can be converted into joint embedding costs for practical message embedding. The structure of the policy network is designed with an effective attention mechanism and incorporated with the domain knowledge derived from traditional non-additive steganographic methods. The environment is responsible for assigning rewards according to the impacts of the sampled joint embedding actions, which are evaluated by the gradient information of a neural network-based steganalyzer. Experimental results show that the proposed non-additive method JoPoL significantly outperforms the existing additive methods against both feature-based and CNN-based steganalzyers over different payloads.
Similar content being viewed by others
References
Shen C X, Zhang H G, Feng D G, et al. Survey of information security. Sci China Ser F-Inf Sci, 2007, 50: 273–298
Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inform Forensic Secur, 2011, 6: 920–935
Holub V, Fridrich J. Designing steganographic distortion using directional filters. In: Proceedings of IEEE International Workshop on Information Forensics and Security, Costa Adeje, 2012. 234–239
Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain. EURASIP J Info Secur, 2014, 2014: 1
Li B, Wang M, Huang J W, et al. A new cost function for spatial image steganography. In: Proceedings of IEEE International Conference on Image Processing, Paris, 2014. 4026–4210
Fridrich J, Kodovsky J. Multivariate Gaussian model for designing additive distortion for steganography. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Vancouver, 2013. 2949–2953
Sedighi V, Cogranne R, Fridrich J. Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forensic Secur, 2016, 11: 221–234
Qin X H, Li B, Huang J W. A new spatial steganographic scheme by modeling image residuals with multivariate Gaussian model. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Brighton, 2019. 2617–2621
Pevny T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of International Workshop on Information Hiding, Calgary, 2010. 161–177
Kouider S, Chaumont M, Puech W. Adaptive steganography by oracle (ASO). In: Proceedings of IEEE International Conference on Multimedia & Expo, San Jose, 2013. 1–6
Li B, Wang M, Li X L, et al. A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inform Forensic Secur, 2015, 10: 1905–1917
Denemark T, Fridrich J. Improving steganographic security by synchronizing the selection channel. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, Portland Oregon, 2015. 5–14
Zhang W M, Zhang Z, Zhang L L, et al. Decomposing joint distortion for adaptive steganography. IEEE Trans Circ Syst Video Technol, 2017, 27: 2274–2280
Li W X, Zhang W M, Chen K J, et al. Defining joint distortion for JPEG steganography. In: Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018. 5–16
Wang Y F, Zhang W M, Li W X, et al. Non-additive cost functions for JPEG steganography based on block boundary maintenance. IEEE Trans Inform Forensic Secur, 2021, 16: 1117–1130
Mo X B, Tan S Q, Li B, et al. MCTSteg: a Monte Carlo tree search-based reinforcement learning framework for universal non-additive steganography. IEEE Trans Inform Forensic Secur, 2021, 16: 4306–4320
Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forensic Secur, 2012, 7: 432–444
Cogranne R, Sedighi V, Fridrich J, et al. Is ensemble classifier needed for steganalysis in high-dimensional feature spaces? In: Proceedings of IEEE International Workshop on Information Forensics & Security, Rome, 2015. 1–6
Luo X Y, Liu F L, Yang C F, et al. Modification ratio estimation for a category of adaptive steganography. Sci China Inf Sci, 2010, 53: 2472–2484
Fridrich J, Kodovsky J. Rich models for steganalysis of digital images. IEEE Trans Inform Forensic Secur, 2012, 7: 868–882
Tang W X, Li H D, Luo W Q, et al. Adaptive steganalysis against WOW embedding algorithm. In: Proceedings of ACM Workshop Information Hiding and Multimedia Security, Salzburg, 2014. 91–96
Denemark T, Sedighi V, Holub V, et al. Selection-channel-aware rich model for steganalysis of digital images. In: Proceedings of IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, 2014. 48–53
Tang W X, Li H D, Luo W Q, et al. Adaptive steganalysis based on embedding probabilities of pixels. IEEE Trans Inform Forensic Secur, 2016, 11: 734–745
Li B, Li Z P, Zhou S J, et al. New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator. IEEE Trans Inform Forensic Secur, 2018, 13: 1242–1257
Zhang H, Ping X J, Xu M K, et al. Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction. Sci China Inf Sci, 2014, 57: 048101
Ren Y L, Zhang X P, Gu D W, et al. Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci China Inf Sci, 2021, 64: 139105
Luo X Y, Liu F L, Yang C F, et al. Image universal steganalysis based on best wavelet packet decomposition. Sci China Inf Sci, 2010, 53: 634–647
Zhong K, Feng G R, Shen L Q, et al. Deep learning for steganalysis based on filter diversity selection. Sci China Inf Sci, 2018, 61: 129105
Tan S Q, Li B. Stacked convolutional auto-encoders for steganalysis of digital images. In: Proceedings of Signal and Information Processing Association Annual Summit and Conference (APSIPA), Siem Reap, 2014. 1–4
Qian Y L, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks. In: Proceedings of SPIE, San Francisco, 2015
Xu G S, Wu H Z, Shi Y Q. Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett, 2016, 23: 708–712
Yedroudj M, Comby F, Chaumont M. Yedroudj-Net: an efficient CNN for spatial steganalysis. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Calgary, 2018. 15–20
Boroumand M, Chen M, Fridrich J. Deep residual network for steganalysis of digital images. IEEE Trans Inform Forensic Secur, 2019, 14: 1181–1193
Xu G S. Deep convolutional neural network to detect J-UNIWARD. In: Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, New York, 2017. 67–73
Ye J, Ni J Q, Yi Y. Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forensic Secur, 2017, 12: 2545–2557
You W K, Zhang H, Zhao X F. A siamese CNN for image steganalysis. IEEE Trans Inform Forensic Secur, 2021, 16: 291–306
Li Q J, Feng G R, Ren Y L, et al. Embedding probability guided network for image steganalysis. IEEE Signal Process Lett, 2021, 28: 1095–1099
Tang W X, Tan S Q, Li B, et al. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Process Lett, 2017, 24: 1547–1551
Yang J H, Ruan D Y, Huang J W, et al. An embedding cost learning framework using GAN. IEEE Trans Inform Forensic Secur, 2020, 15: 839–851
Tang W W, Li B, Barni M, et al. An automatic cost learning framework for image steganography using deep reinforcement learning. IEEE Trans Inform Forensic Secur, 2021, 16: 952–967
Tang W X, Li B, Barni M, et al. Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge. IEEE Trans Circ Syst Video Technol, 2021. doi: https://doi.org/10.48550/arXiv.2105.03867
Tang W X, Li B, Tan S Q, et al. CNN-based adversarial embedding for image steganography. IEEE Trans Inform Forensic Secur, 2019, 14: 2074–2087
Bernard S, Bas P, Klein J, et al. Explicit optimization of min max steganographic game. IEEE Trans Inform Forensic Secur, 2021, 16: 812–823
Li W X, Zhang W M, Li L, et al. Designing near-optimal steganographic codes in practice based on polar codes. IEEE Trans Commun, 2020, 68: 3948–3962
Mnih V, Heess N, Graves A, et al. Recurrent models of visual attention. 2014. ArXiv:1406.6247
Xu K, Ba J, Kiros R, et al. Show, attend and tell: neural image caption generation with visual attention. In: Proceedings of International Conference on Machine Learning, 2015. 2048–2057
Bahdanau D, Cho K, Bengio Y. Neural machine translation by jointly learning to align and translate. In: Proceedings of International Conference on Learning Representations, 2015
Hu J, Shen L, Sun G. Squeeze-and-excitation networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 2018. 7132–7141
Zhang Y L, Li K P, Li K, et al. Image super-resolution using very deep residual channel attention networks. In: Proceedings of the European Conference on Computer Vision, 2018. 286–301
Wang Q, Wu B G, Zhu P F, et al. ECA-Net: efficient channel attention for deep convolutional neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2020. 11531–11539
Bas P, Filler T, Pevny T. Break our steganographic system: the ins and outs of organizing BOSS. In: Proceedings of International Workshop on Information Hiding, Prague, 2011. 59–70
Bas P, Furon T. Bows-2. 2007. http://bows2.ec-lille.fr
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 62002075, 61872244, 61872099, U19B2022), Guangdong Basic and Applied Basic Research Foundation (Grant No. 2019B151502001), and Shenzhen R&D Program (Grant No. JCYJ20200109105008228).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tang, W., Li, B., Li, W. et al. Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism. Sci. China Inf. Sci. 66, 132305 (2023). https://doi.org/10.1007/s11432-021-3453-5
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-021-3453-5