Generative Steganography Based on the Construction of Chinese Chess Record
Abstract
:1. Introduction
- (1)
- By generating a large amount of self-play data, an AlphaZero model has been trained to achieve a high level of proficiency in Chinese Chess;
- (2)
- Based on the trained AlphaZero model, the proposed method developed a steganography method that enables two communicating parties to achieve covert communication by transmitting chess records generated by the model;
- (3)
- The experimental results indicate that the proposed method surpasses several existing methods in hiding capacity. It also exhibits outstanding robustness and security, and has practical feasibility and value.
2. The Proposed Method
2.1. Training AlphaZero
- (1)
- Selection. Select the optimal child node from the root node and recursively continue this process until a leaf node is reached. MCTS uses the Upper Confidence Bound (UCB) formula to determine which child node to select specifically:
- (2)
- Expansion. Compute all possible next moves for the chess state represented by the leaf node, and expand them as child nodes under the current node. Additionally, initializing , , and to zero for each edge.
- (3)
- Evaluation. Utilize the neural network to predict the and win rate of each child node that is selected. Subsequently, store the to the corresponding edge’s .
- (4)
- Backpropagation. For all edges traversed along the search path, employ Formulas (3) and (4) to update their average value and visit count in a bottom-up manner.
2.2. Constructing a Database of Common Fixed Opening Chess Records
2.3. Generating Steganographic Chess Records
Algorithm 1: The process of generating steganographic chess records. |
INPUT: The secret message; The database of common fixed opening chess records OUTPUT: One or more steganographic chess records in the form of consecutive images or a single video START Step 1: Convert the secret information into binary, denoted as , and calculate its length, denoted as ; Step 2: Find the opening chess record in with an index equal to , and have the AlphaZero execute that opening record; Step 3: The AlphaZero continues self-play, and at each step of the game, it calculates the set of all feasible moves under the current state, denoted as , and provides the execution probability for each move; Step 4: To ensure the reasonableness of the chess records, specific measures need to be taken to remove some unreasonable moves while ensuring that the number of removed moves does not excessively reduce the hiding capacity. This paper uses the following method to remove some moves from :
Step 5: Let the number of remaining moves in be . If , it indicates that data cannot be hidden in this step, so execute this only move directly and jump to Step 7. Otherwise, it suggests that this step can hide bits of binary data. Sort the remaining moves in descending order by probability and number them starting from 0. Step 6: Take a segment from the beginning of with a length of , convert it into a decimal number , find the move in with the index equal to , and execute that move. Specifically, if the remaining length of is less than , extract all remaining content from . Step 7: The AlphaZero continuously repeats Step 3 to 6 until is entirely hidden. Screenshots of each move in the game process are taken and sequentially combined into a series of continuous images or a video, resulting in the final steganographic chess record. END |
2.4. Extracting Information from the Steganographic Chess Records
Algorithm 2: The extraction process of the steganographic chess records. |
INPUT: One or more steganographic chess records; The database of common fixed opening chess records ; The extracting result cache variable OUTPUT: The secret message START Step 1: If the number of received steganographic chess records is greater than 1, examine the indices of the first moves of each record in , sort all steganographic chess records in descending order of the opening chess record indices, and decrypt them in order. At the same time, record the index of the opening chess record with the largest index, which is the length of the complete secret information, denoted as ; Step 2: Let be the current steganographic chess record being decrypted. The AlphaZero executes its first moves and removes them from ; Step 3: The AlphaZero continues self-play, and at each step of the game, it calculates the set of all feasible moves under the current state, denoted as , and provides the execution probability for each move; Step 4: To ensure the reasonableness of the chess records, specific measures need to be taken to remove some unreasonable moves while ensuring that the number of removed moves does not excessively reduce the hiding capacity. This paper uses the following method to remove some moves from :
Step 6: Take the first move from the remaining moves of the chess record , check its index in , and convert into a binary number . If the length of is less than , pad with zeros in front until its length equals ; Step 7: Delete this move from the chess record , and let ; Step 8: Repeat Steps 3 to 7 until the current steganographic chess record is empty, indicating that decryption is complete, and proceed to decrypt the next chess record; Step 9: Repeat Steps 2 to 8 until all steganographic chess records have been decrypted. The is the original secret information. END |
3. Experimental Results and Analysis
3.1. Experimental Setup
3.2. Evaluation Criteria
3.2.1. Hiding Capacity
3.2.2. Extraction Accuracy
3.2.3. Robustness
3.2.4. Security
3.2.5. Reasonableness of the Generated Chess Record
3.3. Ablation Experiment
3.3.1. The Number of MCTS Simulations and Residual Blocks in AlphaZero
3.3.2. The Threshold Strategy
- (1)
- Identify the move in with the highest probability and denote its probability value as ;
- (2)
- If , retain only that move and discard all others;
- (3)
- If , remove all moves that satisfy ;
- (4)
- Remove all moves that satisfy .
3.4. Comparative Experiment
3.4.1. Hiding Capacity
3.4.2. Extraction Accuracy
3.4.3. Robustness
3.4.4. Security
3.5. Practical Application Case
3.6. Model Inference Performance Evaluation
4. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Hu, D.; Wang, L.; Jiang, W.; Zheng, S.; Li, B. A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 2018, 6, 38303–38314. [Google Scholar] [CrossRef]
- Cao, Y.; Zhou, Z.; Chakraborty, C.; Wang, M.; Wu, Q.J.; Sun, X.; Yu, K. Generative steganography based on long readable text generation. IEEE Trans. Comput. Soc. Syst. 2022, 11, 4584–4594. [Google Scholar] [CrossRef]
- Liu, J.; Li, Z.; Jiang, X.; Zhang, Z. A high-performance CNN-applied HEVC steganography based on diamond-coded PU partition modes. IEEE Trans. Multimed. 2021, 24, 2084–2097. [Google Scholar] [CrossRef]
- Wang, J.; Jia, X.; Kang, X.; Shi, Y.Q. A cover selection HEVC video steganography based on intra prediction mode. IEEE Access 2019, 7, 119393–119402. [Google Scholar] [CrossRef]
- Mielikainen, J. LSB matching revisited. IEEE Signal Process. Lett. 2006, 13, 285–287. [Google Scholar] [CrossRef]
- Liao, X.; Yu, Y.; Li, B.; Li, Z.; Qin, Z. A new payload partition strategy in color image steganography. IEEE Trans. Circuits Syst. Video Technol. 2019, 30, 685–696. [Google Scholar] [CrossRef]
- Su, W.; Ni, J.; Hu, X.; Fridrich, J. Image steganography with symmetric embedding using Gaussian Markov random field model. IEEE Trans. Circuits Syst. Video Technol. 2020, 31, 1001–1015. [Google Scholar] [CrossRef]
- Yang, J.; Ruan, D.; Huang, J.; Kang, X.; Shi, Y.Q. An embedding cost learning framework using GAN. IEEE Trans. Inf. Forensics Secur. 2019, 15, 839–851. [Google Scholar] [CrossRef]
- Zhang, X.; Peng, F.; Long, M. Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimed. 2018, 20, 3223–3238. [Google Scholar] [CrossRef]
- Chen, X.; Zhang, Z.; Qiu, A.; Xia, Z.; Xiong, N.N. Novel coverless steganography method based on image selection and StarGAN. IEEE Trans. Netw. Sci. Eng. 2020, 9, 219–230. [Google Scholar] [CrossRef]
- Yang, Z.; Chen, K.; Zeng, K.; Zhang, W.; Yu, N. Provably secure robust image steganography. IEEE Trans. Multimed. 2023, 26, 5040–5053. [Google Scholar] [CrossRef]
- Peng, F.; Chen, G.; Long, M. A robust coverless steganography based on generative adversarial networks and gradient descent approximation. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 5817–5829. [Google Scholar] [CrossRef]
- Cao, Y.; Zhou, Z.; Wu, Q.J.; Yuan, C.; Sun, X. Coverless information hiding based on the generation of anime characters. EURASIP J. Image Video Process. 2020, 2020, 1–15. [Google Scholar] [CrossRef]
- Wen, W.; Huang, H.; Qi, S.; Zhang, Y.; Fang, Y. Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages. IEEE Trans. Netw. Sci. Eng. 2024, 11, 2951–2962. [Google Scholar] [CrossRef]
- Zhou, Z.; Su, Y.; Li, J.; Yu, K.; Wu, Q.J.; Fu, Z.; Shi, Y. Secret-to-image reversible transformation for generative steganography. IEEE Trans. Dependable Secur. Comput. 2022, 20, 4118–4134. [Google Scholar] [CrossRef]
- Zhou, Z.; Dong, X.; Meng, R.; Wang, M.; Yan, H.; Yu, K.; Choo, K.K. Generative steganography via auto-generation of semantic object contours. IEEE Trans. Inf. Forensics Secur. 2023, 18, 2751–2765. [Google Scholar] [CrossRef]
- Cao, Y.; Ge, W.; Yuan, C.; Wang, Q. Generative Image Steganography via Encoding Pose Keypoints. Appl. Sci. 2024, 15, 58. [Google Scholar] [CrossRef]
- Li, C.; Liu, H.; Fan, Z.; Li, W.; Liu, Y.; Pan, P.; Yuan, Y. Gaussianstego: A generalizable stenography pipeline for generative 3d gaussians splatting. arXiv 2024, arXiv:2407.01301. [Google Scholar]
- Su, P.C.; Cheng, Y.H.; Kuo, T.Y. JSN: Design and Analysis of JPEG Steganography Network. Electronics 2024, 13, 4821. [Google Scholar] [CrossRef]
- Koptyra, K.; Ogiela, M.R. Steganography in QR Codes—Information Hiding with Suboptimal Segmentation. Electronics 2024, 13, 2658. [Google Scholar] [CrossRef]
- Miranda, J.D.; Parada, D.J. LSB steganography detection in monochromatic still images using artificial neural networks. Multimed. Tools Appl. 2022, 81, 785–805. [Google Scholar] [CrossRef]
- Kingma, D.P.; Dhariwal, P. Glow: Generative flow with invertible 1 × 1 convolutions. In Proceedings of the Advances in Neural Information Processing Systems, Montréal, QC, Canada, 3–8 December 2018; Volume 31. [Google Scholar]
- Zhang, X. Behavior steganography in social network. In Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Twelfth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, 21–23 November 2016; Springer International Publishing: Berlin/Heidelberg, Germany, 2017; Volume 1. [Google Scholar]
- Gao, P.; Chai, P.; Lang, J. Behavior Steganography in Social Networks Based on 0–1 Knapsack Algorithm. Acta Electron. Sin. 2022, 50, 753–758. [Google Scholar]
- Zhou, Z.; Su, Y.; Zhang, Y.; Xia, Z.; Du, S.; Gupta, B.B.; Qi, L. Coverless information hiding based on probability graph learning for secure communication in IOT environment. IEEE Internet Things J. 2021, 9, 9332–9341. [Google Scholar] [CrossRef]
- Mahato, S.; Yadav, D.K.; Khan, D.A. A minesweeper game-based steganography scheme. J. Inf. Secur. Appl. 2017, 32, 1–14. [Google Scholar] [CrossRef]
- Ou, Z.H.; Chen, L.H. A steganographic method based on tetris games. Inf. Sci. 2014, 276, 343–353. [Google Scholar] [CrossRef]
- Silver, D.; Huang, A.; Maddison, C.J.; Guez, A.; Sifre, L.; Van Den Driessche, G.; Schrittwieser, J.; Antonoglou, I.; Panneershelvam, V.; Lanctot, M.; et al. Mastering the game of Go with deep neural networks and tree search. Nature 2016, 529, 484–489. [Google Scholar] [CrossRef] [PubMed]
- Silver, D.; Schrittwieser, J.; Simonyan, K.; Antonoglou, I.; Huang, A.; Guez, A.; Hubert, T.; Baker, L.; Lai, M.; Bolton, A.; et al. Mastering the game of go without human knowledge. Nature 2017, 550, 354–359. [Google Scholar] [CrossRef]
- Kocsis, L.; Szepesvári, C. Bandit based monte-carlo planning. In European Conference on Machine Learning; Springer: Berlin/Heidelberg, Germany, 2006; pp. 282–293. [Google Scholar]
- Xu, G.; Wu, H.Z.; Shi, Y.Q. Structural design of convolutional neural networks for steganalysis. IEEE Signal Process. Lett. 2016, 23, 708–712. [Google Scholar] [CrossRef]
- Ye, J.; Ni, J.; Yi, Y. Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 2017, 12, 2545–2557. [Google Scholar] [CrossRef]
- Huang, R.; Lian, C.; Dai, Z.; Li, Z.; Ma, Z. A novel hybrid image synthesis-mapping framework for steganography without embedding. IEEE Access 2023, 11, 113176–113188. [Google Scholar] [CrossRef]
- Jing, J.; Deng, X.; Xu, M.; Wang, J.; Guan, Z. HiNet: Deep Image Hiding by Invertible Network. In Proceedings of the IEEE/CVF International Conference on Computer Vision, Montreal, QC, Canada, 10–17 October 2021; pp. 4713–4722. [Google Scholar]
- Li, J.; Niu, K.; Liao, L.; Wang, L.; Liu, J.; Lei, Y.; Zhang, M. A generative steganography method based on WGAN-GP. In Artificial Intelligence and Security: Proceedings of the 6th International Conference, ICAIS 2020, Hohhot, China, 17–20 July 2020; Part I 6; Springer: Singapore, 2020; pp. 386–397. [Google Scholar]
Block | Input Size | Layer | Output Size |
---|---|---|---|
Convolutional Block | 9 × 10 × 9 | Conv(3 × 3, 1, 1) + BN + ReLU | 256 × 10 × 9 |
Residual Block | 256 × 10 × 9 | Conv(3 × 3, 1, 1) + BN + ReLU | 256 × 10 × 9 |
256 × 10 × 9 | Conv(3 × 3, 1, 1) + BN | 256 × 10 × 9 | |
256 × 10 × 9 | Residual + ReLU | 256 × 10 × 9 | |
Policy Head | 256 × 10 × 9 | Conv(1 × 1, 1, 0) + BN + ReLU | 16 × 10 × 9 |
16 × 10 × 9 | Flatten | 1440 | |
1440 | Linear + Softmax | 2086 | |
Value Head | 256 × 10 × 9 | Conv(1 × 1, 1, 0) + BN + ReLU | 8 × 10 × 9 |
8 × 10 × 9 | Flatten | 720 | |
720 | Linear + ReLU | 256 | |
256 | Linear + Tanh | 1 |
MCTS Simulation Times | Number of Residual Blocks | Hiding Capacity (bits/carrier) | Reasonableness Score |
---|---|---|---|
1600 | 11 | 218 | −0.02 |
1600 | 9 | 251 | −0.05 |
1600 | 7 | 312 | −0.16 |
1600 | 5 | 344 | −0.31 |
1400 | 11 | 237 | −0.06 |
1400 | 9 | 309 | −0.09 |
1400 | 7 | 365 | −0.20 |
1400 | 5 | 398 | −0.30 |
1200 | 11 | 260 | −0.18 |
1200 | 9 | 372 | −0.21 |
1200 | 7 | 413 | −0.20 |
1200 | 5 | 450 | −0.33 |
1000 | 11 | 302 | −0.33 |
1000 | 9 | 366 | −0.35 |
1000 | 7 | 440 | −0.39 |
1000 | 5 | 487 | −0.41 |
Serial Number | Threshold Strategy | Hiding Capacity (bits/carrier) | Reasonableness Score |
---|---|---|---|
1 | (0.9, 0.3, 0.01) | 450 | −0.31 |
2 | (0.8, 0.3, 0.01) | 413 | −0.20 |
3 | (0.7, 0.3, 0.01) | 380 | −0.17 |
4 | (0.6, 0.3, 0.01) | 325 | −0.15 |
5 | (0.8, 0.2, 0.01) | 397 | −0.18 |
6 | (0.8, 0.4, 0.01) | 431 | −0.23 |
7 | (0.8, 0.5, 0.01) | 449 | −0.27 |
8 | (0.8, 0.3, 0.005) | 426 | −0.22 |
9 | (0.8, 0.3, 0.05) | 398 | −0.17 |
Method | Hiding Capacity (Bits/Carrier) |
---|---|
Zhang et al. [9]: DCT-LDA | 15 |
Chen et al. [10]: Image-Select-StarGAN | 33 |
Hu et al. [1]: DCGANs | 37.5 |
Huang et al. [33]: SMH-SWE | 128 |
Mahato et al. [26]: Minesweeper | 214 |
Yang et al. [11]: PARIS | 1219 |
Proposed method | 413 |
Attack Method | Parameters | Chen et al. [10] | Hu et al. [1] | Yang et al. [11] | Peng et al. [12] | Cao et al. [13] | Proposed Method |
---|---|---|---|---|---|---|---|
Rotation | 10° | 1.02 | 31.79 | 0.58 | 45.56 | 0.09 | 0 |
30° | 1.38 | 42.25 | 0.84 | 47.33 | 0.12 | 0 | |
50° | 2.69 | 46.11 | 0.82 | 51.02 | 0.17 | 0 | |
Salt-and-Pepper Noise | σ(0.01) | 3.20 | 34.88 | 6.32 | 10.82 | 0.97 | 0 |
σ(0.05) | 9.15 | 36.59 | 23.98 | 23.20 | 1.70 | 0 | |
σ(0.1) | 14.22 | 38.15 | 28.86 | 38.09 | 3.29 | 0 | |
Median Filtering | (3 × 3) | 0 | 33.51 | 0.89 | 25.72 | 0.18 | 0 |
(5 × 5) | 1.87 | 36.14 | 2.61 | 37.11 | 0.35 | 0 | |
(7 × 7) | 2.98 | 38.19 | 22.60 | 44.14 | 0.47 | 0 | |
Mean Filtering | (3 × 3) | 0.13 | 32.90 | 0.28 | 38.63 | 0.24 | 0 |
(5 × 5) | 0.37 | 33.24 | 1.61 | 44.96 | 0.19 | 0 | |
(7 × 7) | 2.85 | 34.06 | 2.03 | 44.65 | 0.70 | 0 | |
Gaussian Filtering | (3 × 3) | 0 | 31.06 | 0.81 | 27.47 | 0.17 | 0 |
(5 × 5) | 1.55 | 31.18 | 1.15 | 32.03 | 0.31 | 0 | |
(7 × 7) | 1.98 | 30.98 | 1.18 | 32.46 | 0.50 | 0 | |
Gaussian Noise | σ(0.01) | 0.14 | 36.28 | 8.39 | 20.29 | 0.54 | 0 |
σ(0.05) | 0.68 | 38.77 | 15.18 | 22.84 | 0.73 | 0 | |
σ(0.1) | 1.26 | 39.81 | 21.12 | 41.37 | 0.96 | 0 |
Steganalysis | Jing et al. [34]: HiNet | Li et al. [35]: WGAN-GP | Peng et al. [12]: GAN-GD | Proposed Method |
---|---|---|---|---|
XuNet | 0.365 | 0.542 | 0.528 | 0.498 |
YeNet | 0.313 | 0.485 | 0.491 | 0.497 |
GPU | Time (ms) | CPU | Time (ms) |
---|---|---|---|
RTX 3060 12 GB | 489 | Gold 6130 | 4135 |
RTX 4060Ti 8 GB | 473 | E5-2680 v4 | 3443 |
RTX 2080Ti 11 GB | 404 | AMD EPYC 7453 | 2650 |
V100 32 GB | 386 | Platinum 8352V | 2317 |
A100 40 GB | 360 | Gold 6348 | 1898 |
RTX 3090 24 GB | 295 | Platinum 8457C | 1418 |
L20 48 GB | 219 | ||
RTX 4090 24 GB | 206 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Cao, Y.; Du, Y.; Ge, W.; Huang, Y.; Yuan, C.; Wang, Q. Generative Steganography Based on the Construction of Chinese Chess Record. Electronics 2025, 14, 451. https://doi.org/10.3390/electronics14030451
Cao Y, Du Y, Ge W, Huang Y, Yuan C, Wang Q. Generative Steganography Based on the Construction of Chinese Chess Record. Electronics. 2025; 14(3):451. https://doi.org/10.3390/electronics14030451
Chicago/Turabian StyleCao, Yi, Youwei Du, Wentao Ge, Yanshu Huang, Chengsheng Yuan, and Quan Wang. 2025. "Generative Steganography Based on the Construction of Chinese Chess Record" Electronics 14, no. 3: 451. https://doi.org/10.3390/electronics14030451
APA StyleCao, Y., Du, Y., Ge, W., Huang, Y., Yuan, C., & Wang, Q. (2025). Generative Steganography Based on the Construction of Chinese Chess Record. Electronics, 14(3), 451. https://doi.org/10.3390/electronics14030451