Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Style conversion-based security image steganography method and electronic device

A style conversion and style technology, applied in the field of information security, can solve the problems of small steganography capacity, pixel or coefficient correlation change, poor imperceptibility, etc., and achieve the effect of safe transmission, increased versatility, and improved security

Active Publication Date: 2020-06-12
INST OF INFORMATION ENG CAS
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have the problems of poor imperceptibility and small steganographic capacity, and the performance indicators need to be further improved.
[0005] In general, although the existing information steganography methods have achieved high data transmission security, in image steganography, secret information is hidden by modifying some specific pixels or coefficients of the carrier image, resulting in pixels or The correlation between the coefficients changes, there is a risk of being detected by the steganographic detection algorithm
However, the mainstream steganalysis algorithm uses the classifier trained by the secret image and the corresponding carrier image to identify the embedded information, so the steganographic generation method still has a great security risk, and the security needs to be further improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Style conversion-based security image steganography method and electronic device
  • Style conversion-based security image steganography method and electronic device
  • Style conversion-based security image steganography method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The method of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0031] During the design process of the present invention, it was found that style transfer models such as CycleGAN (Li X, Liu S, Kautz J, et al. Learning linear transformations for fast arbitrary style transfer[J]. arXiv preprint arXiv:1808.04537, 2018) are more vulnerable to adversarial sample attacks Impact. Because when it converts the image into the target domain image, in order to restore the original image from the domain conversion image later, it will hide the relevant information of the original image in the domain conversion image. Linking this phenomenon with steganography, the secret information is hidden in the style texture while performing domain conversion or style conversion on the image, so as to realize the secure transmission of secret information. In addition, software such as image style conversion and imag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a style conversion-based security image steganography method and an electronic device, and the method comprises the steps: inputting secret information, a content image and a style image into a first convolution network, and generating a secret-carrying image; according to the invention, the secret-carrying picture is generated by directly using the neural network technology, the corresponding relationship between the carrier picture and the secret-carrying picture is hidden, and the secret information is directly hidden into the style texture, so that the secure transmission of the secret information is realized; the limitation on the size of a carrier picture is overcome, and the universality of the method is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for secure image steganography based on style conversion and an electronic device. Background technique [0002] As an important branch of information hiding, steganography can achieve the purpose of covert communication by embedding secret messages into multimedia files (such as digital images, audio, video, text, etc.). The multimedia files before and after steganography are visually and statistically indistinguishable, so they will not arouse the suspicion of the attacker. With the development of digital technology, image information is becoming more and more abundant on the Internet. The secret information transmitted through images is not easy to arouse the alert of the other party. Moreover, due to the advantages of abundant data and universal application, images have gradually become a popular secret communication carrier. [0003] Traditional image ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00G06K9/62G06T7/42G06N3/04G06N3/08
CPCG06T1/0021G06T7/42G06N3/08G06N3/045G06F18/253
Inventor 王子涵王鑫高能向继
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products