Defeating data hiding in social networks using generative adversarial network

被引:6
|
作者
Wang, Huaqi [1 ]
Qian, Zhenxing [2 ]
Feng, Guorui [1 ]
Zhang, Xinpeng [2 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai, Peoples R China
[2] Fudan Univ, Shanghai Inst Intelligent Elect & Syst, Sch Comp Sci, Shanghai, Peoples R China
关键词
Information hiding; Social networks; Steganography; Steganalysis; IMAGE;
D O I
10.1186/s13640-020-00518-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a large number of images are transmitted through social networks every moment, terrorists may hide data into images to convey secret data. Various types of images are mixed up in the social networks, and it is difficult for the servers of social networks to detect whether the images are clean. To prevent the illegal communication, this paper proposes a method of defeating data hiding by removing the secret data without impacting the original media content. The method separates the clean images from illegal images using the generative adversarial network (GAN), in which a deep residual network is used as a generator. Therefore, hidden data can be removed and the quality of the processed images can be well maintained. Experimental results show that the proposed method can prevent secret transmission effectively and preserve the processed images with high quality.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Defeating data hiding in social networks using generative adversarial network
    Huaqi Wang
    Zhenxing Qian
    Guorui Feng
    Xinpeng Zhang
    EURASIP Journal on Image and Video Processing, 2020
  • [2] Attention Based Data Hiding with Generative Adversarial Networks
    Yu, Chong
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 1120 - 1128
  • [3] Hiding Message Using a Cycle Generative Adversarial Network
    Shi, Wuzhen
    Liu, Shaohui
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2022, 18 (03)
  • [4] HAG-NET: Hiding Data and Adversarial Attacking with Generative Adversarial Network
    Fan, Haiju
    Wang, Jinsong
    ENTROPY, 2024, 26 (03)
  • [5] Insufficient Data Generative Model for Pipeline Network Leak Detection Using Generative Adversarial Networks
    Zhang, Huaguang
    Hu, Xuguang
    Ma, Dazhong
    Wang, Rui
    Xie, Xiangpeng
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (07) : 7107 - 7120
  • [6] Information Hiding Mechanism Based on Generative Adversarial Networks
    Cheng, Xiaohui
    Zhao, Jun
    Kang, Yanping
    PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 625 - 629
  • [7] StegGAN: hiding image within image using conditional generative adversarial networks
    Singh, Brijesh
    Sharma, Prasen Kumar
    Huddedar, Shashank Anil
    Sur, Arijit
    Mitra, Pinaki
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (28) : 40511 - 40533
  • [8] StegGAN: hiding image within image using conditional generative adversarial networks
    Brijesh Singh
    Prasen Kumar Sharma
    Shashank Anil Huddedar
    Arijit Sur
    Pinaki Mitra
    Multimedia Tools and Applications, 2022, 81 : 40511 - 40533
  • [9] Generative Adversarial Networks for Secure Data Transmission in Wireless Network
    Jayabalan, E.
    Pugazendi, R.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (03): : 3757 - 3784
  • [10] Mixed Data Imputation Using Generative Adversarial Networks
    Khan, Wasif
    Zaki, Nazar
    Ahmad, Amir
    Masud, Mohammad Mehedy
    Ali, Luqman
    Ali, Nasloon
    Ahmed, Luai A.
    IEEE ACCESS, 2022, 10 : 124475 - 124490