TY - GEN
T1 - SecureImgStego
T2 - 2023 IEEE Conference on Communications and Network Security, CNS 2023
AU - Chakraborty, Trishna
AU - Rahman, Imranur
AU - Murad, Hasan
AU - Hossain, Md Shohrab
AU - Mehnaz, Shagufta
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Steganography ensures secure transmission of digital messages, including image steganography where a secret image is hidden within a non-secret cover image. Deep learning-based methods in image steganography have recently gained popularity but are vulnerable to various attacks. An adversary with varying levels of access to the vanilla deep steganography model can train a surrogate model using another dataset and retrieve hidden images. Moreover, even when uncertain about the presence of hidden information, the adversary with access to the surrogate model can distinguish the carrier image from the unperturbed one. Our paper includes such attack demonstrations that confirm the inherent vulnerabilities present in deep learning-based steganography. Deep learning-based steganography lacks lossless transmission assurance, rendering sophisticated image encryption techniques unsuitable. Furthermore, key concatenation-based techniques for text data steganography fall short in the case of image data. In this paper, we introduce a simple yet effective keyed shuffling approach for encrypting secret images. We employ keyed pixel shuffling, multi-level block shuffling, and a combination of key concatenation and block shuffling, embedded within the model architecture. Our findings demonstrate that the block shuffling-based deep image steganography has negligible error overhead compared to conventional methods while providing effective security against adversaries with different levels of access to the model.
AB - Steganography ensures secure transmission of digital messages, including image steganography where a secret image is hidden within a non-secret cover image. Deep learning-based methods in image steganography have recently gained popularity but are vulnerable to various attacks. An adversary with varying levels of access to the vanilla deep steganography model can train a surrogate model using another dataset and retrieve hidden images. Moreover, even when uncertain about the presence of hidden information, the adversary with access to the surrogate model can distinguish the carrier image from the unperturbed one. Our paper includes such attack demonstrations that confirm the inherent vulnerabilities present in deep learning-based steganography. Deep learning-based steganography lacks lossless transmission assurance, rendering sophisticated image encryption techniques unsuitable. Furthermore, key concatenation-based techniques for text data steganography fall short in the case of image data. In this paper, we introduce a simple yet effective keyed shuffling approach for encrypting secret images. We employ keyed pixel shuffling, multi-level block shuffling, and a combination of key concatenation and block shuffling, embedded within the model architecture. Our findings demonstrate that the block shuffling-based deep image steganography has negligible error overhead compared to conventional methods while providing effective security against adversaries with different levels of access to the model.
UR - http://www.scopus.com/inward/record.url?scp=85177606924&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85177606924&partnerID=8YFLogxK
U2 - 10.1109/CNS59707.2023.10288753
DO - 10.1109/CNS59707.2023.10288753
M3 - Conference contribution
AN - SCOPUS:85177606924
T3 - 2023 IEEE Conference on Communications and Network Security, CNS 2023
BT - 2023 IEEE Conference on Communications and Network Security, CNS 2023
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 2 October 2023 through 5 October 2023
ER -