Journal on Communications ›› 2021, Vol. 42 ›› Issue (9): 96-105.doi: 10.11959/j.issn.1000-436x.2021134
• Papers • Previous Articles Next Articles
Xiaoyuan YANG1,2, Xinliang BI1,2, Jia LIU1,2, Siyuan HUANG1
Revised:
2021-06-15
Online:
2021-09-25
Published:
2021-09-01
Supported by:
CLC Number:
Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG. High-capacity image steganography algorithm combining image encryption and deep learning[J]. Journal on Communications, 2021, 42(9): 96-105.
"
层结构 | 输入尺寸 | 输出尺寸 |
4×4×64卷积+LeakyReLU | 256×256×6 | 128×128×64 |
4×4×128卷积+BN+LeakyReLU | 128×128×64 | 64×64×128 |
4×4×256卷积+BN+LeakyReLU | 64×64×128 | 32×32×256 |
4×4×512卷积+BN+LeakyReLU | 32×32×256 | 16×16×512 |
4×4×512卷积+BN+LeakyReLU | 16×16×512 | 8×8×512 |
4×4×512卷积+BN+LeakyReLU | 8×8×512 | 4×4×512 |
4×4×512卷积+ReLU | 4×4×512 | 2×2×512 |
4×4×512反卷积+BN+ReLU | 2×2×512 | 4×4×512 |
4×4×512反卷积+BN+ReLU | 4×4×1024 | 8×8×512 |
4×4×512反卷积+BN+ReLU | 8×8×1024 | 16×16×512 |
4×4×256反卷积+BN+ReLU | 16×16×1024 | 32×32×256 |
4×4×128反卷积+BN+ReLU | 32×32×512 | 64×64×128 |
4×4×64反卷积+BN+ReLU | 64×64×256 | 128×128×64 |
4×4×3反卷积+ Sigmoid | 128×128×128 | 256×256×3 |
[1] | PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[C]// Information Hiding. Berlin:Springer, 2010: 161-177. |
[2] | HOLUB V , FRIDRICH J . Designing steganographic distortion using directional filters[C]// Proceedings of 2012 IEEE International Workshop onInformation Forensics and Security (WIFS). Piscataway:IEEE Press, 2012: 234-239. |
[3] | HOLUB V , FRIDRICH J , DENEMARK T . Universal distortion function for steganography in an arbitrary domain[J]. EURASIP Journal on Information Security, 2014(1): 1-13. |
[4] | HICSONMEZ S , SAMET N , AKBAS E ,et al. GANILLA:generative adversarial networks for image to illustration translation[J]. Image and Vision Computing, 2020,95:103886. |
[5] | HE K , GKIOXARI G , DOLLáR P ,et al. Mask R-CNN[C]// Proceedings of 2017 IEEE International Conference on Computer Vision (ICCV). Piscataway:IEEE Press, 2017: 2980-2988. |
[6] | SZEGEDY C , IOFFE S , VANHOUCKE V ,et al. Inception-v4,inception-ResNet and the impact of residual connections on learning[J]. arXiv Preprint,arXiv:1602.07261, 2016. |
[7] | CHOI Y , CHOI M , KIM M ,et al. StarGAN:unified generative adversarial networks for multi-domain image-to-image translation[C]// Proceedings of 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2018: 8789-8797. |
[8] | GOODFELLOW I J , POUGET-ABADIE J ,, MIRZA M ,et al. Generative adversarial nets[C]// Proceedings of the 27th International Conference on Neural Information Processing Systems. Cambridge:MIT Press, 2014: 2672-2680. |
[9] | TANG W X , TAN S Q , LI B ,et al. Automatic steganographic distortion learning using a generative adversarial network[J]. IEEE Signal Processing Letters, 2017,24(10): 1547-1551. |
[10] | BALUJA S , . Hiding images in plain sight:deep steganography[C]// Advances in Neural Information Processing Systems 30 (NIPS 2017).[S.n.:s.l.], 2017: 2069-2079. |
[11] | DUAN X T , GUO D D , LIU N ,et al. A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network[J]. IEEE Access, 2020,8: 25777-25788. |
[12] | SHARMA K , AGGARWAL A , SINGHANIA T ,et al. Hiding data in images using cryptography and deep neural network[J]. Journal of Artificial Intelligence and Systems, 2019,1(1): 143-162. |
[13] | RAHIM R , NADEEM S . End-to-end trained CNN encoder-decoder networks for image steganography[C]// Proceedings of the European Conference on Computer Vision (ECCV).[S.n.:s.l.], 2018: 723-729. |
[14] | ZHANG R , DONG S Q , LIU J Y . Invisible steganography via generative adversarial networks[J]. Multimedia Tools and Applications, 2019,78(7): 8559-8575. |
[15] | SZEGEDY C , VANHOUCKE V , IOFFE S ,et al. Rethinking the inception architecture for computer vision[C]// Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2016: 2818-2826. |
[16] | DUAN X T , JIA K , LI B X ,et al. Reversible image steganography scheme based on a U-net structure[J]. IEEE Access, 2019,7: 9314-9323. |
[17] | RONNEBERGER O , FISCHER P , BROX T . U-net:convolutional networks for biomedical image segmentation[C]// International Conference on Medical Image Computing and Computer-Assisted Intervention. Berlin:Springer, 2015: 234-241. |
[18] | BADRINARAYANAN V , KENDALL A , CIPOLLA R . SegNet:a deep convolutional encoder-decoder architecture for image segmentation[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017,39(12): 2481-2495. |
[19] | LIU Q , XIANG X Y , QIN J H ,et al. Coverless image steganography based on DenseNet feature mapping[J]. EURASIP Journal on Image and Video Processing, 2020,2020(1): 39. |
[20] | ZHOU Z L , CAO Y , WANG M M ,et al. Faster-RCNN based robust coverless information hiding system in cloud environment[J]. IEEE Access, 2019,7: 179891-179897. |
[21] | ZHOU Z , SUN H , HARIT R ,et al. Coverless image steganography without embedding[C]// International Conference on Cloud Computing and Security. Berlin:Springer, 2015: 123-132. |
[22] | HE K M , ZHANG X Y , REN S Q ,et al. Deep residual learning for image recognition[C]// Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2016: 770-778. |
[23] | SIMONYAN K , ZISSERMAN A . Very deep convolutional networks for large-scale image recognition[J]. arXiv Preprint,arXiv:1409.1556, 2015. |
[24] | DUAN X T , NAO L , GOU M X ,et al. High-capacity image steganography based on improved FC-DenseNet[J]. IEEE Access, 2020,8: 170174-170182. |
[25] | BOEHM B . StegExpose - a tool for detecting LSB steganography[J]. arXiv Preprint,arXiv:1410.6656, 2014. |
[26] | 竺乐庆, 郭钰, 莫凌强 ,等. DGANS:基于双重生成式对抗网络的稳健图像隐写模型[J]. 通信学报, 2020,41(1): 125-133. |
ZHU L Q , GUO Y , MO L Q ,et al. DGANS:robustness image steganography model based on double GAN[J]. Journal on Communications, 2020,41(1): 125-133. | |
[27] | SHI H C , DONG J , WANG W ,et al. SSGAN:secure steganography based on generative adversarial networks[C]// Advances in Multimedia Information Processing – PCM 2017. Berlin:Springer, 2018: 534-544. |
[28] | ZHANG K A , CUESTA-INFANTE A ,, XU L ,et al. SteganoGAN:high capacity image steganography with GANs[J]. arXiv Preprint,arXiv:1901.03892, 2019. |
[29] | QIN J H , WANG J , TAN Y ,et al. Coverless image steganography based on generative adversarial network[J]. Mathematics, 2020,8(9): 1394. |
[1] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[2] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[3] | Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI. Research on geomagnetic indoor high-precision positioning algorithm based on generative model [J]. Journal on Communications, 2023, 44(6): 211-222. |
[4] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[5] | Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI. Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF [J]. Journal on Communications, 2022, 43(6): 58-70. |
[6] | Hua REN, Shaozhang NIU, Ruyong REN, Zhen YUE. Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing [J]. Journal on Communications, 2022, 43(5): 45-57. |
[7] | Yong LIAO, Shiyi WANG. CSI feedback algorithm based on RM-Net for massive MIMO systems in high-speed mobile environment [J]. Journal on Communications, 2022, 43(5): 166-176. |
[8] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[9] | Zenghua ZHAO, Yuefan TONG, Jiayang CUI. Device-independent Wi-Fi fingerprinting indoor localization model based on domain adaptation [J]. Journal on Communications, 2022, 43(4): 143-153. |
[10] | Yong LIAO, Gang CHENG, Yujie LI. CSI feedback algorithm based on deep unfolding for massive MIMO systems [J]. Journal on Communications, 2022, 43(12): 77-88. |
[11] | Xueyuan DUAN, Yu FU, Kun WANG, Bin LI. LDoS attack detection method based on simple statistical features [J]. Journal on Communications, 2022, 43(11): 53-64. |
[12] | Junyan HUO, Ruipeng QIU, Yanzhuo MA, Fuzheng YANG. Reference frame list optimization algorithm in video coding by quality enhancement of the nearest picture [J]. Journal on Communications, 2022, 43(11): 136-147. |
[13] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[14] | Hongxia ZHANG, Qi WANG, Dengyue WANG, Ben WANG. Honeypot contract detection of blockchain based on deep learning [J]. Journal on Communications, 2022, 43(1): 194-202. |
[15] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|