Invisible image steganography based on generative adversarial network

A steganography and network technology, applied in the field of image processing, can solve a large amount of prior knowledge and other problems, and achieve the effect of speeding up training and improving quality

Active Publication Date: 2019-04-05
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This type of steganography requires a lot of prior knowledge, and once the algorithm is designed, it can no longer be automatically adjusted according to the emerging steganalysis algorithm
Therefore it is a great challenge to design a new image steganography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invisible image steganography based on generative adversarial network
  • Invisible image steganography based on generative adversarial network
  • Invisible image steganography based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the above-mentioned features and advantages of the present invention more obvious and understandable, the present invention will be further described in detail below in conjunction with specific embodiments and the accompanying drawings.

[0029] The image steganography method designed by the present invention is based on a generative confrontation network, and is suitable for embedding a gray-scale secret image into a color carrier image. This method uses the data set to train the model to obtain the optimal model parameters. The specific training process is as follows figure 1 As shown, the main steps include:

[0030] Step 101: Convert the color carrier image from the RGB color space to the YCrCb color space.

[0031] Step 102: Concatenate the Y channel of the color carrier image and the gray-scale secret image together and then output to the encoder network.

[0032] Step 103: The encoder network outputs a single-channel image after feature extraction and f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an invisible image steganography based on a generative adversarial network which can embed a grayscale secret image into a color carrier image to obtain a confidential image and can successfully recover a secret image from the payload image. The invisible image steganography comprises: an encoder network which is responsible for embedding a secret image into a carrier imageto generate a confidential image; a decoder network which is responsible for recovering a secret image from a loaded image; and a discriminator network which is responsible for performing steganalysis of a natural image and a confidential image to adjust the safety of the encoder network and decoder network. The invisible image steganography based on the generative adversarial network provides anew design idea for image information hiding.

Description

Technical field [0001] The invention belongs to the field of image processing, and particularly relates to image steganography based on a generative confrontation network. Background technique [0002] In recent years, with the rapid development and popularization of the Internet, communication has become more and more convenient, but it also poses new challenges to information security. On the one hand, people always have some secret information in communication that they do not want to be learned by a third party; on the other hand, emerging digital multimedia works require copyright protection, and a large amount of e-commerce data requires integrity confirmation. Traditional cryptography can no longer solve these emerging problems well. Steganography is used to embed secret information into the normal carrier without changing the carrier’s perception characteristics, and realize the transmission of secret information through the transmission of the secret carrier in the chan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/32G06N3/04G06N3/08
CPCH04N1/32309G06N3/08G06N3/045
Inventor 张茹刘建毅董士琪
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products