Steganography with Generative Multi-Adversarial Network

You are here

Top Reasons to Join SPS Today!

1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.

Steganography with Generative Multi-Adversarial Network

Tuesday, 8 April, 2025
By: 
Dongxia Huang, Weiqi Luo, Minglin Liu, Weixuan Tang, Jiwu Huang

Contributed by Dr. Weiqi Luo and co-authors, based on the IEEEXplore® article, “Steganography Embedding Cost Learning With Generative Multi-Adversarial Network”, published in the IEEE Transactions on Information Forensics and Security, 2023.

Introduction

Proposed Method

As shown in Fig. 1, the proposed Steg-GMAN model retains the typical GAN structure while introducing key enhancements to overcome the limitations of related methods.

Luo blog figure 1

Fig. 1. The network architecture of the proposed method

The proposed generator, built on a U-Net architecture, produces an embedding probability map that guides the embedding of secret messages within cover images. Meanwhile, the discriminator integrates multiple steganalyzers, each serving as an independent detector to distinguish generated stego images from cover images. This multi-steganalyzer structure provides stronger adversarial signals, driving the generator to produce stego images that are more resistant to detection.

Moreover, to better train our model, we propose an adaptive training strategy. In each iteration, this strategy updates only the weakest steganalyzer in the discriminator while using the gradient information from the strongest one to update the generator. This approach gradually enhances the overall performance of the discriminator, ensuring a more balanced dynamic between the generator and the discriminator and preventing model collapse.

Experiments

We conducted extensive experiments on multiple datasets, using SZUBase for training and BOSSBase, BOWS2, and ALASKA for testing. Security performance was evaluated with a range of steganalyzers, from traditional methods (e.g., SRM) to advanced CNN-based models (e.g., Xu-Net, Yedroudj-Net, SRNet, and CovNet). Steg-GMAN was benchmarked against one traditional method (HILL [4]) and three GAN-based approaches (ASDL-GAN [1] , UT-GAN [2], and SPAR-RL [3]). Selected comparative results in Table 1 indicate that Steg-GMAN consistently outperforms previous methods. Notably, our approach improves detection error rates by up to 2.77% over SPAR-RL, the best prior GAN-based method, particularly against advanced CNN-based steganalyzers like SRNet.

Table 1. Detection error rate (%) evaluated on five steganalyzers on bossbase dataset. Those values with an asterisk denote the best results in the corresponding cases.

Steganalyzer

Steganographic method

0.1 bpp

0.2 bpp

0.3 bpp

0.4 bpp

0.5 bpp

Average

SRM

HILL [4]

43.14

37.02

31.46

26.92

22.04

32.12

ASDL-GAN [1]

43.22

34.46

29.58

24.50

19.54

30.26

UT-GAN [2]

44.35

38.21

32.38

28.64

24.38

33.59

SPAR-RL [3]

44.94

39.15

33.29

30.34

25.33

34.61

Steg-GMAN

45.87*

40.34*

34.69*

30.62*

26.15*

35.53*

Xu-Net

HILL [4]

43.02

37.90

31.86

27.97

23.80

32.91

ASDL-GAN [1]

42.09

39.55

32.86

28.75

24.77

33.60

UT-GAN [2]

45.33

41.24

36.95

33.61

28.14

37.05

SPAR-RL [3]

46.27

42.07

38.57

35.53*

29.73*

38.43

Steg-GMAN

46.65*

42.62*

39.85*

35.29

29.44

38.77*

Yedroudj-Net

HILL [4]

42.97

31.33

24.42

19.54

15.62

26.78

ASDL-GAN [1]

43.43

33.46

28.17

23.12

17.85

29.21

UT-GAN [2]

46.90

37.21

32.03

27.14

23.18

33.29

SPAR-RL [3]

47.72

39.52

32.89

28.59

23.77

34.50

Steg-GMAN

49.91*

41.57*

35.21*

30.85*

24.15*

36.34*

SRNet

HILL [4]

37.02

27.21

21.85

17.33

14.80

23.64

ASDL-GAN [1]

40.03

24.48

19.25

16.23

11.87

22.37

UT-GAN [2]

40.09

30.82

26.31

21.92

16.45

27.30

SPAR-RL [3]

42.00

32.22

27.23

22.81

17.67

28.45

Steg-GMAN

42.99*

35.57*

30.77*

26.15*

20.60*

31.22*

CovNet

HILL [4]

35.33

26.28

20.91

16.10

13.52

22.43

ASDL-GAN [1]

33.78

22.34

17.86

13.74

10.64

19.67

UT-GAN [2]

40.03

31.73

25.29

21.97

16.29

27.06

SPAR-RL [3]

41.38

32.53

26.38

23.21

17.11

28.12

Steg-GMAN

42.20*

34.75*

28.42*

25.38*

19.31*

30.01*

Additionally, further results demonstrated that the adaptive training strategy effectively balances the learning process between generator and discriminator, significantly improving both steganographic security and generalization. Cross-dataset evaluations demonstrated that Steg-GMAN generalizes well, unlike some previous methods such as Backpack, which struggle with cover source mismatch. These results establish Steg-GMAN as the new benchmark for GAN-based steganography, significantly enhancing security in real-world applications.

Conclusion

This paper introduces Steg-GMAN, a novel GAN-based steganographic method that enhances security by integrating multiple steganalyzers and employing an adaptive training strategy. Extensive experiments demonstrate that Steg-GMAN consistently outperforms both traditional and GAN-based steganographic approaches, achieving state-of-the-art security across multiple datasets. 

By establishing a new benchmark in secure GAN-based steganography, Steg-GMAN advances information security by providing a more imperceptible and robust approach to concealing messages within digital media. Furthermore, its adaptive training strategy offers a versatile framework that can be extended to other GAN-based applications.

References:

[1] W. Tang, S. Tan, B. Li and J. Huang, "Automatic Steganographic Distortion Learning Using a Generative Adversarial Network," in IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547-1551, Oct. 2017, doi: https://dx.doi.org/10.1109/LSP.2017.2745572.

[2] J. Yang, D. Ruan, J. Huang, X. Kang and Y. -Q. Shi, "An Embedding Cost Learning Framework Using GAN," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 839-851, 2020, doi: https://dx.doi.org/10.1109/TIFS.2019.2922229.

[3] W. Tang, B. Li, M. Barni, J. Li and J. Huang, "An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 952-967, 2021, doi: https://dx.doi.org/10.1109/TIFS.2020.3025438.

[4] B. Li, M. Wang, J. Huang and X. Li, "A new cost function for spatial image steganography," 2014 IEEE International Conference on Image Processing (ICIP), Paris, France, 2014, pp. 4206-4210, doi: https://dx.doi.org/10.1109/ICIP.2014.7025854.

[5] D. Huang, W. Luo, M. Liu, W. Tang and J. Huang, "Steganography Embedding Cost Learning With Generative Multi-Adversarial Network," in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 15-29, 2024, doi: https://dx.doi.org/10.1109/TIFS.2023.3318939.

SPS Social Media

IEEE SPS Educational Resources

IEEE SPS Resource Center

IEEE SPS YouTube Channel