Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

JPEG domain image steganography method and system based on generative adversarial network

A network and image technology, applied in the field of JPEG domain image steganography based on generative adversarial network, to achieve the effect of improving adaptability and security, high precision and simple design

Active Publication Date: 2019-10-15
SUN YAT SEN UNIV
View PDF21 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional method realizes the adaptiveness of information embedding by setting an additive distortion function, but this method is highly dependent on the designer's experience and prior knowledge, and cannot make timely strategic adjustments according to changes in the steganalysis network, so its Security still has some room for improvement
At present, there is no automatic learning algorithm for the steganographic cost function that adjusts its own strategy in time according to changes in the steganalysis network in the JPEG domain.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • JPEG domain image steganography method and system based on generative adversarial network
  • JPEG domain image steganography method and system based on generative adversarial network
  • JPEG domain image steganography method and system based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] This embodiment provides a JPEG domain image steganography method based on generating an adversarial network, wherein the specific process of generating an adversarial network training is as follows: figure 2 shown, including the following steps:

[0056] S1: Input the original carrier image to the transferable gradient JPEG transformation module, use the slice function to obtain a single carrier image, and perform 8*8 blocks for each carrier image, and perform a matrix on each block matrix and DCT transformation matrix Change operation to obtain the DCT matrix corresponding to the spatial domain image, and then divide the DCT coefficient matrix and the quantization matrix corresponding to the compression quality factor QF to obtain the quantized DCT coefficient matrix. DCT coefficient matrix. The specific realization of the transferable gradient JPEG transformation module proposed by the present invention is as attached image 3 shown.

[0057] S2: Input the DCT co...

Embodiment 2

[0075] This embodiment provides a JPEG domain image steganography method based on generating an adversarial network, wherein the specific process of generating an adversarial network training is as follows: figure 2 shown, including the following steps:

[0076] S1: Input the original carrier image to the transferable gradient JPEG transformation module, use the slice function to obtain a single carrier image, divide each carrier image into 8*8 blocks, and change the matrix of each block matrix and DCT transformation matrix operation to obtain the DCT coefficient matrix corresponding to the spatial domain image, and then divide the DCT coefficient matrix and the quantization matrix corresponding to the compression quality factor QF to obtain the quantized DCT coefficient matrix. A matrix of DCT coefficients with the same size as the vector. The specific realization of the transferable gradient JPEG transformation module proposed by the present invention is as attached imag...

Embodiment 3

[0093] The present embodiment provides a JPEG image steganography system based on generating an adversarial network, including a generating network module obtained by a JPEG domain image steganography method based on generating an adversarial network, an information encoding module, and a JPEG transformation module, such as figure 1 As shown in the image steganography system, the steps are as follows:

[0094] S1: Convert the input carrier image into a DCT coefficient matrix through the JPEG transformation module.

[0095] S2: Input the DCT coefficient matrix of the carrier image to the generation network module to obtain a tamper probability matrix and convert it into a corresponding embedded cost value. The parameters of the generated network in the generated network module are parameters trained by the generated confrontation network training module.

[0096] S3: An information coding module using a Syndrometrellis code (STC) generates a tampering matrix with the same size...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a JPEG domain image steganography method based on a generative adversarial network. The method comprises: generating a tampering probability matrix corresponding to a carrier image DCT coefficient matrix through a generation network; using an analog coding embedding module and a transmittable gradient JPEG transformation module for generating a corresponding secret carryingimage according to the tampering probability matrix; distinguishing the carrier image and the secret-carrying image through the discrimination network, using the classification error as a loss function to perform adversarial training on the generation network and the discrimination network, and finally obtaining the generation network model capable of generating the adaptive steganography cost value. Through combination of the model and a traditional information coding module, secret information is embedded into a carrier image to obtain a secret-carrying image. Compared with a traditional JPEG domain image steganography method, the method has the advantages of being simple in design, easy to implement, high in detection resistance and the like. The invention further discloses a JPEG domain image steganography system. The system comprises a generative adversarial network module, an information coding module and a JPEG transformation module which are obtained through the JPEG domain image steganography method based on the generative adversarial network.

Description

technical field [0001] The present invention relates to the field of image steganography, and more specifically, relates to a method for image steganography in JPEG domain based on generative confrontation network. Background technique [0002] Information hiding is to embed the secret information that needs to be encrypted into the carrier file through some algorithms to generate a secret file, and transmit it through an open channel. The receiver extracts the secret information in the secret file through the corresponding extraction method, and the attack Party cannot obtain secret information from classified documents. Image information hiding is mainly to replace or modify some data of the image, such as pixel values, etc., and to embed secret information into the confidential image without affecting the visual effect of the image. redundancy. Because digital images have the characteristics of large information capacity, easy tampering, and a wide variety of quantities...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06N3/08G06T9/00H04N19/625
CPCG06N3/084G06T9/002H04N19/625
Inventor 阮丹阳阳建华康显桂
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products