A generative image steganography method based on an adversarial network

A generative, image-based technology, applied in the field of information security systems, can solve the problems of fundamentally resisting detection, staying in theoretical concepts, and poor application effects, etc., to achieve imperceptibility, difficulty in attack, and good imperceptibility Effect

Active Publication Date: 2019-05-28
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Carrier modification is the most common method of traditional information hiding, but the secret carrier will always leave modification traces, which makes it difficult to fundamentally resist the detection of statistical analysis algorithms; the carrier selection is based on the secret information in the normal image library. Select the image to send without modifying the original carrier information, avoiding the threat of the existing steganalysis technology, but because the load of this method is too low, the actual application effect is poor; the carrier synthesis method combines the advantages of the first two methods, but Due to technical limitations, this method only stays in the theoretical concept, because it is very difficult to synthesize a large number of samples that meet natural characteristics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A generative image steganography method based on an adversarial network
  • A generative image steganography method based on an adversarial network
  • A generative image steganography method based on an adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in further detail below in conjunction with specific examples, but the embodiments of the present invention are not limited thereto.

[0041] A generative image steganography method based on an adversarial network of the present invention is composed of a symmetric encryption algorithm and an image steganography algorithm. The symmetric encryption algorithm can carry out spatial coordinates, encrypt and decrypt according to the mathematical principle of "two points and one line", and at the same time expand the spatial dimension according to different encryption levels; the image steganography algorithm is based on the ACGAN model, replacing the category labels in the GAN with the The embedded transmission information is used as a driver to directly generate a encrypted image for transmission, and the receiver extracts the embedded transmission information from the encrypted image through the discriminator to realize generative ima...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention particularly relates to a generative image steganography method based on an adversarial network, which comprises the following steps: a rule table is established, and secret informationto be hidden is converted into coordinate information according to the rule table; According to a two-point one-line principle, a ciphertext generator is established, and ciphertext coordinate point information is obtained; The sender randomly selects the ciphertext coordinate point information, replaces the label information with the ciphertext coordinate point information, inputs the ciphertextcoordinate point information into the generator, and generates a transfer image of a specified category; After receiving the transmission image, the receiver inputs the transmission image into a discriminator to obtain a category label, and then ciphertext information can be extracted; Decrypting is performed to obtain hidden coordinate information according to a two-point one-line principle; Andhidden secret information is obtained by comparing with the rule table, and information extraction is realized. According to the method, steganalysis detection based on statistics can be fundamentallyresisted, the safety of information transmission is improved, and meanwhile the steganalysis resisting capability is greatly enhanced.

Description

technical field [0001] The invention belongs to the field of information security systems, and in particular relates to a generative image steganography method based on an adversarial network. Background technique [0002] With the rapid development of the Internet and communication technology, a large number of network communications require the transmission of information in a covert manner, so steganography has been developed rapidly, which greatly solves the problem of concealment of communication information during transmission. [0003] According to the method of embedding secret information, steganography can be divided into: carrier modification, carrier selection and carrier synthesis. Carrier modification is the most common method of traditional information hiding, but the secret carrier will always leave modification traces, which makes it difficult to fundamentally resist the detection of statistical analysis algorithms; carrier selection is based on the secret i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04N19/46
Inventor 张卓王耀杰张帅伟潘峰杨海滨丁谊钮可涂广升唐洪琼
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products