A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks

被引:4
|
作者
Ding, Kangyi [1 ,2 ]
Hu, Teng [2 ]
Niu, Weina [1 ]
Liu, Xiaolei [2 ]
He, Junpeng [1 ]
Yin, Mingyong [2 ]
Zhang, Xiaosong [1 ]
机构
[1] Univ Elect Sci & Technol China UESTC, Sch Comp Sci & Engn, Inst Cyber Secur, Chengdu 611731, Peoples R China
[2] China Acad Engn Phys, Inst Comp Applicat, Mianyang 621900, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
steganography; adversarial attack; transferability; OCR models; NETWORK;
D O I
10.3390/s22176497
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage. Traditional image steganography algorithms use manually crafted steganographic algorithms or custom models for steganography, while our approach uses ordinary OCR models for information embedding and extraction. Even if our OCR models for steganography are intercepted, it is difficult to find their relevance to steganography. We propose a novel steganography method for character-level text images based on adversarial attacks. We exploit the complexity and uniqueness of neural network boundaries and use neural networks as a tool for information embedding and extraction. We use an adversarial attack to embed the steganographic information into the character region of the image. To avoid detection by other OCR models, we optimize the generation of the adversarial samples and use a verification model to filter the generated steganographic images, which, in turn, ensures that the embedded information can only be recognized by our local model. The decoupling experiments show that the strategies we adopt to weaken the transferability can reduce the possibility of other OCR models recognizing the embedded information while ensuring the success rate of information embedding. Meanwhile, the perturbations we add to embed the information are acceptable. Finally, we explored the impact of different parameters on the algorithm with the potential of our steganography algorithm through parameter selection experiments. We also verify the effectiveness of our validation model to select the best steganographic images. The experiments show that our algorithm can achieve a 100% information embedding rate and more than 95% steganography success rate under the set condition of 3 samples per group. In addition, our embedded information can be hardly detected by other OCR models.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A Coverless Plain Text Steganography Based on Character Features
    Wang, Kaixi
    Gao, Quansheng
    [J]. IEEE ACCESS, 2019, 7 : 95665 - 95676
  • [32] A Character-Level Sequence-to-Sequence Method for Subtitle learning
    Zhang, Haijun
    Li, Jingxuan
    Ji, Yuzhu
    Yue, Heng
    [J]. 2016 IEEE 14TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2016, : 780 - 783
  • [33] ArCAR: A Novel Deep Learning Computer-Aided Recognition for Character-Level Arabic Text Representation and Recognition
    Muaad, Abdullah Y.
    Jayappa, Hanumanthappa
    Al-antari, Mugahed A.
    Lee, Sungyoung
    [J]. ALGORITHMS, 2021, 14 (07)
  • [34] CHARM: An Improved Method for Chinese Precoding and Character-Level Embedding
    Fan, Xiaoming
    Shi, Tuo
    Cai, Jiayan
    Wang, Binjun
    [J]. IEEE ACCESS, 2021, 9 : 129539 - 129551
  • [35] MULTIMODAL COMPUTER-ASSISTED TRANSCRIPTION OF TEXT IMAGES AT CHARACTER-LEVEL INTERACTION
    Martin-Albo, Daniel
    Romero, Veronica
    Toselli, Alejandro H.
    Vidal, Enrique
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2012, 26 (05)
  • [36] Character-Level Interaction in Multimodal Computer-Assisted Transcription of Text Images
    Martin-Albo, Daniel
    Romero, Veronica
    Toselli, Alejandro H.
    Vidal, Enrique
    [J]. PATTERN RECOGNITION AND IMAGE ANALYSIS: 5TH IBERIAN CONFERENCE, IBPRIA 2011, 2011, 6669 : 684 - 691
  • [37] Image Text Deblurring Method Based on Generative Adversarial Network
    Wu, Chunxue
    Du, Haiyan
    Wu, Qunhui
    Zhang, Sheng
    [J]. ELECTRONICS, 2020, 9 (02)
  • [38] Poisoning Attacks via Generative Adversarial Text to Image Synthesis
    Kasichainula, Keshav
    Mansourifar, Hadi
    Shi, Weidong
    [J]. 51ST ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN-W 2021), 2021, : 158 - 165
  • [39] Technology of Image Steganography and Steganalysis Based on Adversarial Training
    Zhang, Han
    Song, Zhihua
    Feng, Boyu
    Zhou, Zhongliang
    Liu, Fuxian
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 77 - 80
  • [40] CNN-Based Adversarial Embedding for Image Steganography
    Tang, Weixuan
    Li, Bin
    Tan, Shunquan
    Barni, Mauro
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2074 - 2087