{"title":"对抗图像隐写的显著性映射构造","authors":"Junfeng Zhao;Shen Wang;Fanghui Sun","doi":"10.23919/cje.2024.00.090","DOIUrl":null,"url":null,"abstract":"Adversarial image steganography can fool the targeted convolutional neural network (CNN)-based steg-analyzers, thereby improving the security performance. Despite the fact that existing works have achieved great success, there are still some limitations that make it difficult to exploit their potentiality, including the issue that selecting a final stego from the candidate stegos cannot perfectly help them fool the targeted steganalyzers. Since the trade-off between gradient and embedding cost has not been thoroughly investigated, this may simplify the design of more effective methods. In this article, we design a new model to score each image element in a cover by utilizing this trade-off, and a saliency map is constructed to represent the scores of the image. Based on the above, a simple and efficient scheme called SAL is presented. It selects the elements from the map according to the amplitudes of the scores, and their costs are updated based on the signs of the corresponding gradients. Finally, data embedding is accomplished with the new costs to generate an adversarial stego. Extensive experiments illustrate that SAL can achieve better security performance than state-of-the-art methods under different targeted CNN-based steganalyzers in both spatial and JPEG domains.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"34 3","pages":"816-827"},"PeriodicalIF":1.6000,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060012","citationCount":"0","resultStr":"{\"title\":\"Saliency Map Construction for Adversarial Image Steganography\",\"authors\":\"Junfeng Zhao;Shen Wang;Fanghui Sun\",\"doi\":\"10.23919/cje.2024.00.090\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Adversarial image steganography can fool the targeted convolutional neural network (CNN)-based steg-analyzers, thereby improving the security performance. Despite the fact that existing works have achieved great success, there are still some limitations that make it difficult to exploit their potentiality, including the issue that selecting a final stego from the candidate stegos cannot perfectly help them fool the targeted steganalyzers. Since the trade-off between gradient and embedding cost has not been thoroughly investigated, this may simplify the design of more effective methods. In this article, we design a new model to score each image element in a cover by utilizing this trade-off, and a saliency map is constructed to represent the scores of the image. Based on the above, a simple and efficient scheme called SAL is presented. It selects the elements from the map according to the amplitudes of the scores, and their costs are updated based on the signs of the corresponding gradients. Finally, data embedding is accomplished with the new costs to generate an adversarial stego. Extensive experiments illustrate that SAL can achieve better security performance than state-of-the-art methods under different targeted CNN-based steganalyzers in both spatial and JPEG domains.\",\"PeriodicalId\":50701,\"journal\":{\"name\":\"Chinese Journal of Electronics\",\"volume\":\"34 3\",\"pages\":\"816-827\"},\"PeriodicalIF\":1.6000,\"publicationDate\":\"2025-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11060012\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Chinese Journal of Electronics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11060012/\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Chinese Journal of Electronics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11060012/","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Saliency Map Construction for Adversarial Image Steganography
Adversarial image steganography can fool the targeted convolutional neural network (CNN)-based steg-analyzers, thereby improving the security performance. Despite the fact that existing works have achieved great success, there are still some limitations that make it difficult to exploit their potentiality, including the issue that selecting a final stego from the candidate stegos cannot perfectly help them fool the targeted steganalyzers. Since the trade-off between gradient and embedding cost has not been thoroughly investigated, this may simplify the design of more effective methods. In this article, we design a new model to score each image element in a cover by utilizing this trade-off, and a saliency map is constructed to represent the scores of the image. Based on the above, a simple and efficient scheme called SAL is presented. It selects the elements from the map according to the amplitudes of the scores, and their costs are updated based on the signs of the corresponding gradients. Finally, data embedding is accomplished with the new costs to generate an adversarial stego. Extensive experiments illustrate that SAL can achieve better security performance than state-of-the-art methods under different targeted CNN-based steganalyzers in both spatial and JPEG domains.
期刊介绍:
CJE focuses on the emerging fields of electronics, publishing innovative and transformative research papers. Most of the papers published in CJE are from universities and research institutes, presenting their innovative research results. Both theoretical and practical contributions are encouraged, and original research papers reporting novel solutions to the hot topics in electronics are strongly recommended.