Proceedings of the ACM Workshop on Information Hiding and Multimedia Security 2019
DOI: 10.1145/3335203.3335737
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Adversarial Embeddings for Better Steganography

Abstract: This work proposes a protocol to iteratively build a distortion function for adaptive steganography while increasing its practical security after each iteration. It relies on prior art on targeted attacks and iterative design of steganalysis schemes. It combines targeted attacks on a given detector with a min max strategy, which dynamically selects the most difficult stego content associated with the best classifier at each iteration. We theoretically prove the convergence, which is confirmed by the practical … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 29 publications
(24 citation statements)
references
References 23 publications
0
24
0
Order By: Relevance
“…This paper uses the adversarial attack presented in section II as a potential candidate, and two different CNNs, namely XU-Net [15] and SRNet [12], as detectors. It is an extension of the paper published in [32] in following directions:…”
Section: B Contributions Of the Papermentioning
confidence: 99%
“…This paper uses the adversarial attack presented in section II as a potential candidate, and two different CNNs, namely XU-Net [15] and SRNet [12], as detectors. It is an extension of the paper published in [32] in following directions:…”
Section: B Contributions Of the Papermentioning
confidence: 99%
“…In this sense, the method is general. The experimental evaluation demonstrates its advantages with respect to ADV-EMB by improving the security of a steganographic algorithm found by min max protocol [5] by 11% when the distortion function is a deep neural network with a Xu-Net [32] architecture.…”
Section: Introductionmentioning
confidence: 97%
“…Yet, the convergence of GANs is difficult to achieve in practice. An alternative to GANs is [5] which does not use the fixed estimator of embedding changes. Instead, the distortions associated to each DCT sample are optimized by means of adversarial embedding (ADV-EMB) [29] for a given image and steganalyzer.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations