CFP last date
20 June 2025
Reseach Article

GAN-based Adaptive Image Steganography

by Dhanush Polisetty, Syed Wajahat Abbas Rizvi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 6
Year of Publication: 2025
Authors: Dhanush Polisetty, Syed Wajahat Abbas Rizvi
10.5120/ijca2025924951

Dhanush Polisetty, Syed Wajahat Abbas Rizvi . GAN-based Adaptive Image Steganography. International Journal of Computer Applications. 187, 6 ( May 2025), 45-50. DOI=10.5120/ijca2025924951

@article{ 10.5120/ijca2025924951,
author = { Dhanush Polisetty, Syed Wajahat Abbas Rizvi },
title = { GAN-based Adaptive Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { May 2025 },
volume = { 187 },
number = { 6 },
month = { May },
year = { 2025 },
issn = { 0975-8887 },
pages = { 45-50 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number6/gan-based-adaptive-image-steganography/ },
doi = { 10.5120/ijca2025924951 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-05-29T00:03:07.787890+05:30
%A Dhanush Polisetty
%A Syed Wajahat Abbas Rizvi
%T GAN-based Adaptive Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 6
%P 45-50
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography through image hiding is one of the significant methods of secure communication. In the method of digital image hiding, the secret information is concealed without compromising its perceptibility. Classical steganographic techniques such as LSB-based approaches and DCT-based techniques face severe challenges regarding limited embedding capacity and susceptibility to steganalysis attacks. Here, a novel GAN-based steganography model that tries to find a balance between these two requirements and robustness against attacks has been proposed in this paper. We design GAN architecture for embedding secret data into the cover images such that these are left perceptually unchanged, and a discriminator that ensures the stego-images are indistinguishable from natural ones. The model is trained with a custom loss function that considers adversarial learning, perceptual quality, and embedding efficiency. Experimental assessment is performed on benchmark datasets, including COCO and Image Net, using the metrics of PSNR (Peak Signal-to-Noise Ratio), SSIM (Structural Similarity Index), and robustness. The results show that our GAN-based method surpasses traditional steganographic methods in terms of imperceptibility and resistance to steganalysis. Furthermore, the model remains robust against standard image transformations such as compression, noise addition, and cropping. This paper showcases the prospect of deep learning-driven steganography in the pursuit of improved data security and further proposes future improvements for real-world applications in secure communication and digital watermarking.

References
  1. I. Goodfellow, J. Pouget-Abadie, M. Mirza, et al., “Generative adversarial nets,” Advances in Neural Information Processing Systems, vol. 27, pp. 2672–2680, 2014.
  2. R. Zhang, P. Isola, A. A. Efros, E. Shechtman, and O. Wang, “The unreasonable effectiveness of deep features as a perceptual metric,” in Proc. IEEE CVPR, 2018, pp. 586–595.
  3. A. Dosovitskiy and T. Brox, “Generating images with perceptual similarity metrics based on deep networks,” in Proc. Advances in Neural Information Processing Systems, 2016, vol. 29.
  4. P. Isola, J. Zhu, T. Zhou, and A. A. Efros, “Image-to-image translation with conditional adversarial networks,” in Proc. IEEE CVPR, 2017, pp. 1125–1134.
  5. S. Baluja, “Hiding Images in Plain Sight: Deep Steganography,” Advances in Neural Information Processing Systems (NeurIPS), vol. 30, pp. 2063–2071, 2017.
  6. R. Zhang, Y. Li, and X. Luo, “Adversarial training for secure steganography,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1502–1515, 2020.
  7. H. Huang, X. Zhao, R. Liu, et al., “Attention mechanism-based image steganography using GAN,” IEEE Access, vol. 9, pp. 115489–115499, 2021.
  8. Y. Zhang, H. Gao, and L. Liu, “Security evaluation of deep learning-based steganographic frameworks,” Multimedia Tools and Applications, vol. 81, pp. 3039–3061, 2022.
  9. X. Wu, Y. Zhang, and Y. Zhang, “A novel GAN-based image steganography method,” Neurocomputing, vol. 345, pp. 1–10, 2019.
  10. C. Ledig, L. Theis, F. Huszár, et al., “Photo-realistic single image super-resolution using a generative adversarial network,” in Proc. IEEE CVPR, 2017, pp. 4681–4690.
  11. Y. Geng, Y. Li, X. Luo, and S. Zhang, “Improving GAN training with multiple discriminators,” IEEE Transactions on Neural Networks and Learning Systems, vol. 30, no. 4, pp. 1305–1317, 2019.
  12. J. Hu, B. Wang, and Z. Shi, “Image steganography based on GAN with discriminator for steganalysis,” IEEE Access, vol. 9, pp. 12085–12093, 2021.
  13. J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” Advances in Neural Information Processing Systems, vol. 30, pp. 1954–1963, 2017.
  14. W. Tang, S. Tan, B. Li, and J. Huang, “Automatic steganographic distortion learning using a GAN,” IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1547–1551, 2017.
  15. B. Wang, J. Hu, and J. Wang, “Steganography algorithm using a U-Net based generator,” Multimedia Tools and Applications, vol. 79, no. 19–20, pp. 13989–14010, 2020.
  16. H. Tancik, M. Mildenhall, T. Wang, et al., “Fourier features let networks learn high frequency functions in low dimensional domains,” Advances in Neural Information Processing Systems, vol. 33, pp. 7537–7547, 2020.
  17. X. Yang, H. Liu, Y. Cao, et al., “Robust image steganography with attention U-Net,” IEEE Transactions on Multimedia, vol. 23, pp. 1690–1703, 2021.
  18. N. Carlini, F. Tramer, E. Wallace, et al., “Wider and deeper, cheaper and faster: Tensor decomposition for steganography in neural networks,” arXiv preprint arXiv:1905.10985, 2019.
  19. Y. Liu, X. Li, and Y. Zhang, “Coverless image steganography using generative models,” Multimedia Tools and Applications, vol. 78, pp. 14353–14372, 2019.
  20. R. Tewari, M. Panda, and A. Abraham, “Deep learning-based steganography and steganalysis: A comprehensive review,” IEEE Access, vol. 10, pp. 1469–1495, 2022.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Deep Learning Generative Adversarial Networks (GANs) Data Hiding Image Security Adaptive Embedding Steganalysis Secure Communication Content-Aware Embedding Image Processing