Supercharge Your Innovation With Domain-Expert AI Agents!

Decoding and coding network steganography based on improved attention and loss function

A loss function and encoding network technology, applied in the field of decoding and encoding network steganography, can solve the problems of overall brightness, contrast and resolution differences, secret information interference, and will not be selected according to the characteristics of the container image itself, so as to improve the similarity performance, improve security and robustness, and improve imperceptibility

Active Publication Date: 2022-06-24
WUHAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, because its loss function is only the mean square error loss function of calculating the distance pixel by pixel, the generated image has differences in overall brightness, contrast and resolution compared with the original image; second, the reconstructed secret image The secret information will be disturbed by the container image information; third, the location of the secret hiding will not be selected according to the characteristics of the container image itself, thus leading to the most fatal problem in steganography: the secret information is basically evenly embedded in the channel of the container image corresponding to Once the stealer obtains the original container image, the approximate shape and basic information of the secret image can be obtained by calculating the residual value between the secret image and the container image

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decoding and coding network steganography based on improved attention and loss function
  • Decoding and coding network steganography based on improved attention and loss function
  • Decoding and coding network steganography based on improved attention and loss function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

[0035] It should be noted that the embodiments of the present invention and the features of the embodiments may be combined with each other under the condition of no conflict.

[0036] The present invention will be further described below in conjunction with specific embodiments, but not as a limitation of the present invention.

[0037]This embodiment aims to solve the problem that in the existing decoding and coding network steganography, since the relevant information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a computer vision and image processing technology, in particular to a decoding and coding network steganography based on an improved attention and loss function, which comprises the following steps of: extracting a two-dimensional image feature of a secret image and an attention mask of a container image; splicing the extracted two-dimensional image features and attention masks at a channel layer and a container image, and inputting the spliced two-dimensional image features and attention masks into a coding network to obtain a secret-carrying image; inputting the secret-carrying image into a decoding network, and recovering a reconstructed secret image; inputting the container image into a decoding network to obtain a generated secret image; through a composite function constructed based on a pixel value mean square error and image multi-scale structure similarity, constructing an overall loss function considering the similarity between a container image and a secret carrying image, the similarity between a secret image and a reconstructed secret image and the difference between the reconstructed secret image and a generated secret image, and training a network model; and generating a secret carrying image and a reconstructed secret image. The steganography improves the imperceptibility and robustness of the secret-carrying image.

Description

technical field [0001] The invention belongs to the technical field of computer vision and image processing, in particular to a decoding and encoding network steganography based on improved attention and loss functions. Background technique [0002] In the information age, it is necessary for both individuals and nations to transmit and receive confidential information securely over the Internet. In the field of information security, there are two main research directions, namely cryptography and steganography. Cryptography protects the content of information through the incomprehensibility of ciphertext. Its main task is to allow only the sender and target receiver of the message to view its transmission content, and to encode information to achieve information concealment, but the incomprehensibility of cryptography It also exposes the importance of information. Steganography is to protect the content of information through the imperceptibility of ciphertext, by embeddin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10G06N3/04G06N3/08
CPCG06F21/10G06N3/08G06N3/045G06F21/602G06N3/0455G06N3/0464G06N3/088
Inventor 巫兆聪饶可奕闫钊
Owner WUHAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More