A secure image steganography method and electronic device based on style transfer

A style conversion and security technology, applied in the field of information security, can solve the problems of small steganography capacity, pixel or coefficient correlation change, poor imperceptibility, etc., to achieve the effect of improving security, realizing secure transmission, and increasing versatility

Active Publication Date: 2022-07-29
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have the problems of poor imperceptibility and small steganographic capacity, and the performance indicators need to be further improved.
[0005] In general, although the existing information steganography methods have achieved high data transmission security, in image steganography, secret information is hidden by modifying some specific pixels or coefficients of the carrier image, resulting in pixels or The correlation between the coefficients changes, there is a risk of being detected by the steganographic detection algorithm
However, the mainstream steganalysis algorithm uses the classifier trained by the secret image and the corresponding carrier image to identify the embedded information, so the steganographic generation method still has a great security risk, and the security needs to be further improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure image steganography method and electronic device based on style transfer
  • A secure image steganography method and electronic device based on style transfer
  • A secure image steganography method and electronic device based on style transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The method of the present invention will be further described below with reference to the accompanying drawings and specific embodiments.

[0031] In the design process of the present invention, it is found that style transfer models such as CycleGAN (Li X, Liu S, Kautz J, et al. Learning linear transformations for fast arbitrary style transfer [J]. arXiv preprint arXiv: 1808.04537, 2018) are more vulnerable to adversarial sample attacks Impact. Because when it converts the image to the target domain image, in order to restore the original image from the domain converted image later, it hides the information about the original image invisible in the domain converted image. Linking this phenomenon with steganography, while performing domain transformation or style transformation on the image, the secret information is hidden into the style texture, so as to realize the secure transmission of the secret information. In addition, software such as image style conversion an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a style conversion-based secure image steganography method and electronic device. A secret information, a content picture and a style picture are input into a first convolution network to generate a secret picture. The invention directly uses the neural network technology to generate the secret image, hides the corresponding relationship between the carrier image and the secret image, and hides the secret information directly into the style texture, thereby realizing the safe transmission of the secret information; overcoming the limitation on the size of the carrier image, Increase the generality of the method.

Description

technical field [0001] The invention relates to the technical field of information security, and in particular, to a style-transfer-based secure image steganography method and electronic device. Background technique [0002] Steganography, as an important branch in the field of information hiding, can achieve the purpose of covert communication by embedding secret messages into multimedia files (such as digital images, audio, video, text, etc.). The multimedia files before and after steganography are visually and statistically indistinguishable, and thus do not raise suspicions for attackers. With the development of digital technology, image information has become more and more abundant in the Internet, and the secret information transmitted through images is not easy to arouse the alert of the other party. Moreover, due to the advantages of abundant data and widespread application, images have gradually become a popular secret communication carrier. [0003] Traditional im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00G06V10/80G06V10/82G06K9/62G06T7/42G06N3/04G06N3/08
CPCG06T1/0021G06T7/42G06N3/08G06N3/045G06F18/253
Inventor 王子涵王鑫高能向继
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products