Adversarial batch steganography method

A steganalysis and original image technology, applied in neural learning methods, instruments, biological neural network models, etc., can solve the problem that batch steganography cannot be directly applied to a single image, and achieve the effect of improving steganographic security.

Active Publication Date: 2021-04-09
UNIV OF SCI & TECH OF CHINA
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since pooling steganalysis usually uses unsupervised learning methods, single-image adversarial steganography algorithms cannot be directly applied to batch steganography
Moreover, there is not a directly derivable loss function in pooled steganalysis that can be directly used for steganography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adversarial batch steganography method
  • Adversarial batch steganography method
  • Adversarial batch steganography method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] An embodiment of the present invention provides an anti-batch steganography method, figure 1 The main principle of the method is shown. The method mainly includes:

[0023] Step 1. Using a steganographic algorithm to calculate the distortion of each pixel in each original image in a batch of original images, and obtain a corresponding distortion map.

[0024] In the embodiment of the present invention, a batch of original images is recorde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an adversarial batch steganography method, which introduces an adversarial sample (namely an image of a normal user) concept, uses a loss function to adjust a distortion function about the gradient of the image, and improves steganography security. The anti-secret-carrying graph obtained on the basis of the method is superior to an existing method in resistance to pooling steganalysis based on deep learning; meanwhile, the method can also resist steganalysis of a single image to a certain extent.

Description

technical field [0001] The invention relates to the technical field of adversarial samples and steganography, in particular to an adversarial batch steganography method. Background technique [0002] Steganography is a covert communication technique that conceals messages within a carrier (such as a digital image) without arousing suspicion. Based on the STC steganography framework, the current steganography has matured, such as HILL, UNIWARD, UERD, etc. These algorithms are all based on the laboratory environment, but in practical applications, steganography generally uses multiple images as carriers, so some scholars propose a batch steganography strategy. [0003] Batch steganography takes a group of images as a unit, and studies the message distribution strategy among images based on the steganography algorithm of a single image. Ker et al first proposed four batch steganography strategies in 2012, namely, average strategy, random strategy, maximum greedy strategy, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00G06N3/04G06N3/08
CPCG06T1/0021G06N3/084G06N3/045
Inventor 张卫明俞能海李莉
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products