IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography

被引:4
|
作者
Zhang, Chunying [1 ,2 ,3 ,4 ,5 ]
Gao, Xinkai [1 ]
Liu, Xiaoxiao [2 ]
Hou, Wei [1 ,2 ,4 ]
Yang, Guanghui [1 ,2 ,4 ,5 ]
Xue, Tao [1 ,2 ,4 ,5 ]
Wang, Liya [1 ,2 ,3 ,4 ,5 ]
Liu, Lu [1 ,2 ]
机构
[1] North China Univ Sci & Technol, Coll Sci, Tangshan 063210, Peoples R China
[2] North China Univ Sci & Technol, Hebei Key Lab Data Sci & Applicat, Tangshan 063210, Peoples R China
[3] North China Univ Sci & Technol, Key Lab Engn Comp Tangshan City, Tangshan 063210, Peoples R China
[4] North China Univ Sci & Technol, Hebei Engn Res Ctr Intelligentizat Iron Ore Optimi, Tangshan 063210, Peoples R China
[5] Tangshan Intelligent Ind & Image Proc Technol Inno, Tangshan 063210, Peoples R China
关键词
coverless steganography; generative adversarial network; attention mechanisms; image interpolation; dense convolutional network;
D O I
10.3390/electronics12132881
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional image steganography techniques complete the steganography process by embedding secret information into cover images, but steganalysis tools can easily detect detectable pixel changes that lead to the leakage of confidential information. The use of a generative adversarial network (GAN) makes it possible to embed information using a combination of information and noise in generating images to achieve steganography. However, this approach is usually accompanied by issues such as poor image quality and low steganography capacity. To address these challenges, we propose a steganography model based on a novel information-driven generative adversarial network (IDGAN), which fuses a GAN, attention mechanisms, and image interpolation techniques. We introduced an attention mechanism on top of the original GAN model to improve image accuracy. In the generation model, we replaced some transposed convolution operations with image interpolation for better quality of dense images. In contrast to traditional steganographic methods, the IDGAN generates images containing confidential information without using cover images and utilizes GANs for information embedding, thus having better anti-detection capability. Moreover, the IDGAN uses an attention mechanism to improve the image details and clarity and optimizes the steganography effect through an image interpolation algorithm. Experimental results demonstrate that the IDGAN achieves an accuracy of 99.4%, 95.4%, 93.2%, and 100% on the MNIST, Intel Image Classification, Flowers, and Face datasets, respectively, with an embedding rate of 0.17 bpp. The model effectively protects confidential information while maintaining high image quality.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] CSST-Net: an arbitrary image style transfer network of coverless steganography
    Shanqing Zhang
    Shengqi Su
    Li Li
    Jianfeng Lu
    Qili Zhou
    Chin-Chen Chang
    The Visual Computer, 2022, 38 : 2125 - 2137
  • [32] CSST-Net: an arbitrary image style transfer network of coverless steganography
    Zhang, Shanqing
    Su, Shengqi
    Li, Li
    Lu, Jianfeng
    Zhou, Qili
    Chang, Chin-Chen
    VISUAL COMPUTER, 2022, 38 (06): : 2125 - 2137
  • [33] Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework
    Zi, Hanqi
    Zhang, Qiong
    Yang, Jianhua
    Kang, Xiangui
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 526 - 532
  • [34] Generative adversarial network for image deblurring using generative adversarial constraint loss
    Ji, Y.
    Dai, Y.
    Zhao, K.
    Li, S.
    DEVELOPMENTS OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN COMPUTATION AND ROBOTICS, 2020, 12 : 1180 - 1187
  • [35] Weibo: An information-driven online social network
    Guo, Zhengbiao
    Li, Zhitang
    Tu, Hao
    Xie, Da
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8360 : 3 - 16
  • [36] Optimization Analysis for Image based Steganography using Generative Adversarial Networks
    Arokiasamy, Aldrin Wilfred
    Skarbek, Wladyslaw
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2019, 2019, 11176
  • [37] Steganography Embedding Cost Learning With Generative Multi-Adversarial Network
    Huang, Dongxia
    Luo, Weiqi
    Liu, Minglin
    Tang, Weixuan
    Huang, Jiwu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 15 - 29
  • [38] Information-driven network resilience: Research challenges and perspectives
    Rak, Jacek
    Papadimitriou, Dimitri
    Niedermayer, Heiko
    Romero, Pablo
    OPTICAL SWITCHING AND NETWORKING, 2017, 23 : 156 - 178
  • [39] Advanced Generative Adversarial Network for Image Superresolution
    Jia, Mei
    Lu, Mingde
    Sang, Yu
    DATA SCIENCE (ICPCSEE 2022), PT I, 2022, 1628 : 193 - 208
  • [40] Solar image deconvolution by generative adversarial network
    Long Xu
    Wen-Qing Sun
    Yi-Hua Yan
    Wei-Qiang Zhang
    Research in Astronomy and Astrophysics, 2020, 20 (11) : 16 - 24