{"title":"纳蒂亚斯基于神经元归因的可转移图像对抗隐写术","authors":"Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu","doi":"arxiv-2409.04968","DOIUrl":null,"url":null,"abstract":"Image steganography is a technique to conceal secret messages within digital\nimages. Steganalysis, on the contrary, aims to detect the presence of secret\nmessages within images. Recently, deep-learning-based steganalysis methods have\nachieved excellent detection performance. As a countermeasure, adversarial\nsteganography has garnered considerable attention due to its ability to\neffectively deceive deep-learning-based steganalysis. However, steganalysts\noften employ unknown steganalytic models for detection. Therefore, the ability\nof adversarial steganography to deceive non-target steganalytic models, known\nas transferability, becomes especially important. Nevertheless, existing\nadversarial steganographic methods do not consider how to enhance\ntransferability. To address this issue, we propose a novel adversarial\nsteganographic scheme named Natias. Specifically, we first attribute the output\nof a steganalytic model to each neuron in the target middle layer to identify\ncritical features. Next, we corrupt these critical features that may be adopted\nby diverse steganalytic models. Consequently, it can promote the\ntransferability of adversarial steganography. Our proposed method can be\nseamlessly integrated with existing adversarial steganography frameworks.\nThorough experimental analyses affirm that our proposed technique possesses\nimproved transferability when contrasted with former approaches, and it attains\nheightened security in retraining scenarios.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Natias: Neuron Attribution based Transferable Image Adversarial Steganography\",\"authors\":\"Zexin Fan, Kejiang Chen, Kai Zeng, Jiansong Zhang, Weiming Zhang, Nenghai Yu\",\"doi\":\"arxiv-2409.04968\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Image steganography is a technique to conceal secret messages within digital\\nimages. Steganalysis, on the contrary, aims to detect the presence of secret\\nmessages within images. Recently, deep-learning-based steganalysis methods have\\nachieved excellent detection performance. As a countermeasure, adversarial\\nsteganography has garnered considerable attention due to its ability to\\neffectively deceive deep-learning-based steganalysis. However, steganalysts\\noften employ unknown steganalytic models for detection. Therefore, the ability\\nof adversarial steganography to deceive non-target steganalytic models, known\\nas transferability, becomes especially important. Nevertheless, existing\\nadversarial steganographic methods do not consider how to enhance\\ntransferability. To address this issue, we propose a novel adversarial\\nsteganographic scheme named Natias. Specifically, we first attribute the output\\nof a steganalytic model to each neuron in the target middle layer to identify\\ncritical features. Next, we corrupt these critical features that may be adopted\\nby diverse steganalytic models. Consequently, it can promote the\\ntransferability of adversarial steganography. Our proposed method can be\\nseamlessly integrated with existing adversarial steganography frameworks.\\nThorough experimental analyses affirm that our proposed technique possesses\\nimproved transferability when contrasted with former approaches, and it attains\\nheightened security in retraining scenarios.\",\"PeriodicalId\":501332,\"journal\":{\"name\":\"arXiv - CS - Cryptography and Security\",\"volume\":\"1 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.04968\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.04968","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Natias: Neuron Attribution based Transferable Image Adversarial Steganography
Image steganography is a technique to conceal secret messages within digital
images. Steganalysis, on the contrary, aims to detect the presence of secret
messages within images. Recently, deep-learning-based steganalysis methods have
achieved excellent detection performance. As a countermeasure, adversarial
steganography has garnered considerable attention due to its ability to
effectively deceive deep-learning-based steganalysis. However, steganalysts
often employ unknown steganalytic models for detection. Therefore, the ability
of adversarial steganography to deceive non-target steganalytic models, known
as transferability, becomes especially important. Nevertheless, existing
adversarial steganographic methods do not consider how to enhance
transferability. To address this issue, we propose a novel adversarial
steganographic scheme named Natias. Specifically, we first attribute the output
of a steganalytic model to each neuron in the target middle layer to identify
critical features. Next, we corrupt these critical features that may be adopted
by diverse steganalytic models. Consequently, it can promote the
transferability of adversarial steganography. Our proposed method can be
seamlessly integrated with existing adversarial steganography frameworks.
Thorough experimental analyses affirm that our proposed technique possesses
improved transferability when contrasted with former approaches, and it attains
heightened security in retraining scenarios.