TY - GEN
T1 - 3-party adversarial steganography
AU - Meraouche, Ishak
AU - Dutta, Sabyasachi
AU - Sakurai, Kouichi
N1 - Funding Information:
Ishak Meraouche is financially supported by the Ministry of Education, Culture, Sports, Science and Technology (MEXT), Japan for his studies at Kyushu University. Sabyasachi Dutta was financially supported by the National Institute of Information and Communications Technology (NICT), Japan, under the NICT International Invitation Program during his stay at Kyushu University where the initial phase of the research work was carried out.
Publisher Copyright:
© Springer Nature Switzerland AG 2020.
PY - 2020
Y1 - 2020
N2 - Steganography enables a user to hide information by embedding secret messages within other non-secret texts or pictures. Recently, research along this direction has picked a new momentum when Hayes & Danezis (NIPS 2017) used adversarial learning to generate steganographic images. In adversarial learning, two neural networks are trained to learn to communicate securely in the presence of eavesdroppers (a third neural network). Hayes–Danezis forwarded this idea to steganography where two neural networks (Bob & Charlie) learn “embed” and “extract” algorithms by exchanging images with hidden text in presence of an eavesdropping neural network (Eve). Due to non-convexity of the models in the training scheme, two different machines may not learn the same embedding and extraction model even if they train on the same set of images. We take a different approach to address this issue of “robustness” in the “decryption” process. In this paper, we introduce a third neural network (Alice) who initiates the process of learning with two neural networks (Bob & Charlie). We implement and demonstrate through experiments that it is possible for Bob & Charlie to learn the same embedding and extraction model by using a new loss function and training process.
AB - Steganography enables a user to hide information by embedding secret messages within other non-secret texts or pictures. Recently, research along this direction has picked a new momentum when Hayes & Danezis (NIPS 2017) used adversarial learning to generate steganographic images. In adversarial learning, two neural networks are trained to learn to communicate securely in the presence of eavesdroppers (a third neural network). Hayes–Danezis forwarded this idea to steganography where two neural networks (Bob & Charlie) learn “embed” and “extract” algorithms by exchanging images with hidden text in presence of an eavesdropping neural network (Eve). Due to non-convexity of the models in the training scheme, two different machines may not learn the same embedding and extraction model even if they train on the same set of images. We take a different approach to address this issue of “robustness” in the “decryption” process. In this paper, we introduce a third neural network (Alice) who initiates the process of learning with two neural networks (Bob & Charlie). We implement and demonstrate through experiments that it is possible for Bob & Charlie to learn the same embedding and extraction model by using a new loss function and training process.
UR - http://www.scopus.com/inward/record.url?scp=85098265529&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85098265529&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-65299-9_7
DO - 10.1007/978-3-030-65299-9_7
M3 - Conference contribution
AN - SCOPUS:85098265529
SN - 9783030652982
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 89
EP - 100
BT - Information Security Applications - 21st International Conference, WISA 2020, Revised Selected Papers
A2 - You, Ilsun
PB - Springer Science and Business Media Deutschland GmbH
T2 - 21st International Conference on Information Security Applications, WISA 2020
Y2 - 26 August 2020 through 28 August 2020
ER -