Image Hiding Method Based on Two-Channel DeepConvolutional Neural Network

被引:0
|
作者
Duan Xintao [1 ]
Wang Wenxin [1 ]
Li Lei [1 ]
Shao Zhiqiang [1 ]
Wang Xianfang [2 ]
Qin Chuan [3 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Henan, Peoples R China
[2] Henan Inst Technol, Coll Comp Sci & Technol, Xinxiang 453003, Henan, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
中国国家自然科学基金;
关键词
Image information hiding; Deep Convolutional Neural Networks (DCNN); Pyramid pooling; Preprocessing; STEGANOGRAPHY;
D O I
10.11999/JEIT210280
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The existing image information hiding methods based on Deep Convolutional Neural Networks (DCNN) have the problems of poor image visual quality and low hiding capacity. Addressing such issues, an image hiding method based on a two-channel deep convolutional neural network is proposed. First, different from the previous hiding framework, the hiding method proposed in this paper includes one hiding network and two revealing networks with the same structure, and two full-size secret images can be effectively hidden and revealed at the same time is realized. Then, to improve the visual quality of the image, an improved pyramid pooling module and a preprocessing module are added to the hiding and revealing network. The test results on multiple data sets show that the proposed method has a significant improvement in visual quality compared with existing image information hiding methods. The Peak Signal-to-Noise Ratio (PSNR) and Structural SIMilarity (SSIM) values are increased by 3.75 dB and 3.61 % respectively, a relative capacity of 2 and good generalization ability are achieved.
引用
收藏
页码:1782 / 1791
页数:10
相关论文
共 23 条
  • [1] [Anonymous], 2014, Stegexpose-a tool for detecting lsb steganography
  • [2] [Anonymous], 2018, Spatial image steganography based on generative adversarial network
  • [3] U-Net: Convolutional Networks for Biomedical Image Segmentation
    Ronneberger, Olaf
    Fischer, Philipp
    Brox, Thomas
    [J]. MEDICAL IMAGE COMPUTING AND COMPUTER-ASSISTED INTERVENTION, PT III, 2015, 9351 : 234 - 241
  • [4] Hiding Images within Images
    Baluja, Shumeet
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 42 (07) : 1685 - 1697
  • [5] Deep Residual Network for Steganalysis of Digital Images
    Boroumand, Mehdi
    Chen, Mo
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1181 - 1193
  • [6] Technology of Hiding and Protecting the Secret Image Based on Two-Channel Deep Hiding Network
    Chen, Feng
    Xing, Qinghua
    Liu, Fuxian
    [J]. IEEE ACCESS, 2020, 8 (08): : 21966 - 21979
  • [7] Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
    Filler, Tomas
    Judas, Jan
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) : 920 - 935
  • [8] Writing on wet paper
    Fridrich, J
    Goljan, M
    Lisonek, P
    Soukal, D
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 : 328 - 340
  • [9] Practical methods for minimizing embedding impact in steganography
    Fridrich, Jessica
    Filler, Tomas
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX, 2007, 6505
  • [10] Hore Alain, 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P2366, DOI 10.1109/ICPR.2010.579