Recognition: unknown
SteganoGAN: High Capacity Image Steganography with GANs
read the original abstract
Image steganography is a procedure for hiding messages inside pictures. While other techniques such as cryptography aim to prevent adversaries from reading the secret message, steganography aims to hide the presence of the message itself. In this paper, we propose a novel technique for hiding arbitrary binary data in images using generative adversarial networks which allow us to optimize the perceptual quality of the images produced by our model. We show that our approach achieves state-of-the-art payloads of 4.4 bits per pixel, evades detection by steganalysis tools, and is effective on images from multiple datasets. To enable fair comparisons, we have released an open source library that is available online at https://github.com/DAI-Lab/SteganoGAN.
This paper has not been read by Pith yet.
Forward citations
Cited by 4 Pith papers
-
Stego Battlefield: Evaluating Image Steganography Attacks and Steganalysis Defenses
SADBench is a new benchmark that systematically tests steganography attacks with harmful image and text payloads against steganalysis defenses, revealing stable attack methods, near-perfect in-domain detection, transf...
-
Splats in Splats++: Robust and Generalizable 3D Gaussian Splatting Steganography
Splats in Splats++ embeds messages into 3DGS via importance-graded SH encryption, hash-grid opacity mapping, and a gradient-gated consistency loss, achieving higher fidelity and robustness than prior methods.
-
Hiding Secrets in the CSI Quotient: A Robust Wi-Fi CSI Steganography System
A CSI-quotient steganography system with neural-network FIR generation achieves robustness to environmental changes and higher capacity than prior Wi-Fi PHY methods.
-
Quantum Gatekeeper: Multi-Factor Context-Bound Image Steganography with VQC Based Key Derivation on Quantum Hardware
Quantum Gatekeeper is a multi-factor context-bound image steganography framework that uses a variational quantum circuit to derive deterministic gate keys for LSB embedding, requiring four exact factors for successful...
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.