CN114820380B - Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance - Google Patents

Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance Download PDF

Info

Publication number
CN114820380B
CN114820380B CN202210521584.1A CN202210521584A CN114820380B CN 114820380 B CN114820380 B CN 114820380B CN 202210521584 A CN202210521584 A CN 202210521584A CN 114820380 B CN114820380 B CN 114820380B
Authority
CN
China
Prior art keywords
image
adv
carrier image
carrier
disturbance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210521584.1A
Other languages
Chinese (zh)
Other versions
CN114820380A (en
Inventor
刘嘉勇
何沛松
罗杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan University
Original Assignee
Sichuan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan University filed Critical Sichuan University
Priority to CN202210521584.1A priority Critical patent/CN114820380B/en
Publication of CN114820380A publication Critical patent/CN114820380A/en
Application granted granted Critical
Publication of CN114820380B publication Critical patent/CN114820380B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • G06F18/232Non-hierarchical techniques
    • G06F18/2321Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions
    • G06F18/23213Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions with fixed number of clusters, e.g. K-means clustering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/26Segmentation of patterns in the image field; Cutting or merging of image elements to establish the pattern region, e.g. clustering-based techniques; Detection of occlusion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/30Noise filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/762Arrangements for image or video recognition or understanding using pattern recognition or machine learning using clustering, e.g. of similar faces in social networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Probability & Statistics with Applications (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a method for enhancing an airspace steganographic carrier image based on content self-adaption disturbance resistance, which comprises the following steps of: calculating the multi-granularity image texture characteristics of the carrier image; clustering the carrier images according to pixel values, and segmenting the images according to semantic category labels; calculating a weighted mask of the carrier image; calculating content adaptive countermeasure disturbance; and adding the content adaptive anti-disturbance into the carrier image to obtain an enhanced carrier image, and adding the real secret information to perform steganography to obtain a final enhanced secret-carrying image. The invention adds disturbance noise to the image texture rich area according to the characteristics of the carrier image, and improves the concealment of the disturbance noise. Therefore, the method and the device can successfully attack the deep learning-based steganalysis network under the condition of a small amount of disturbance noise, and can reduce the risk of detecting the anti-disturbance noise.

Description

Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance
Technical Field
The invention relates to the technical field of multimedia security, in particular to a spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance.
Background
With the rapid development of communication technology and network information technology, digital images have become a common information exchange mode in people's daily life. The digital image has high redundancy, and if some pixel points of the image are modified, the ornamental value of people on the image cannot be influenced, so that the image has natural advantages in carrying secret information for communication. Image steganography is an important covert communication mode, and secret information is mainly embedded into a common digital image (called a carrier image), and the image embedded with the secret information (called the carrier image) is transmitted in a public channel without causing the doubt of a third party supervisor (such as a steganalyser). The image steganography and steganography analysis technologies are in a game state all the time and develop in opposition to each other. With the rise of deep learning in computer vision, the steganalysis technology based on deep learning is rapidly developed, which brings great challenges to the image steganalysis technology. At present, in order to further resist a steganalysis method based on deep learning, a steganographic party provides two main flow modes: the image steganography method based on the generation of the countermeasure network and the image steganography method based on the countermeasure sample.
Among the patents currently published, there are the following patents that address similar problems with the process of the present invention: the publication number is CN108346125B, which is a patent of airspace image steganography method and system based on generation of countermeasure network. The method mainly comprises the steps of generating a modified probability map from a carrier image through a U-Net network, simulating the modified probability map by combining a hyperbolic sine function to generate a secret-carrying image, simultaneously, mutually confronting with a steganalysis network, obtaining a steganography probability generation model through training, and finally, combining STC (syndrome time coding) to obtain the secret-carrying image. The method effectively improves the security performance of image steganography, but still has the following defects: 1) Because the network structure is huge, the model is still unstable in the training process and is difficult to converge; 2) The generative model is data driven and therefore relies on a training data set, with the security of steganography of the image still being low for different data sets.
Reference [1] (Yiwei Zhang, weiming Zhang, kejiang Chen, jianying Liu, yujia Liu, and Nenghai Yu.2018. Adaptive examplesagainst default near network based on disturbance noise [ C ]// Proceedings of the 6th ACM works hop on Information Hiding and Multimedia security.2018.) discloses a method of adding disturbance noise in a carrier image, which generates disturbance noise using gradient Information of a steganalysis network to an input image, and iteratively adds to the carrier image, generates a disturbance carrier image, then adds secret Information, generates a secret image, and inputs the generated disturbance carrier image to the steganalysis network until the target steganalysis network cannot judge. The method effectively improves the security performance of the steganography, has higher steganography efficiency, and still has the following defects: 1) Because disturbance noise is added in a plurality of iterations until the steganalysis is successfully fooled, the disturbance noise added in the method is large in quantity; 2) The disturbance noise adding mode does not consider image characteristic information and carries out global addition on the image; the defects of the two points show that the scheme is easy to leave relatively obvious disturbance traces in the final generated dense image (especially in the flat area of the image texture).
Reference [2] (Qin C, zhang W, dong X, et al, applied systematic gradient based on sparse noise enhancement [ J ]. Journal of Visual Communication and Image reproduction, 2021, 80.). Discloses a method of adding sparse disturbance noise based on a gradient map to a carrier Image, which visualizes gradient information of an input Image using a steganalysis network, selects a part of values with large Image gradients to iteratively add disturbance noise, generates a confrontation carrier Image, then performs steganography to obtain a carrier Image, and finally inputs the carrier Image into a steganalysis network for judgment until the steganalysis network is successfully fooled. The method can further reduce the redundant points of disturbance noise while maintaining steganography security, but the method still has the defects that: 1) According to the method, in the process of gradient information visualization, the part of the point with the larger gradient value is still in the image flat area, and obvious disturbance traces are still easily left after disturbance noise is added in the part of the area; 2) The method adopts a steganalysis network to calculate the gradient value of an input image, but the gradient value still has no clear physical meaning at present, and the size selection is difficult to define.
Disclosure of Invention
The invention aims to provide a spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance.
The technical scheme for realizing the purpose of the invention is as follows:
a spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance comprises
Step 1: calculating the multi-granularity image texture characteristics of the carrier image c;
1.1 calculating the fine grain texture description value L of each pixel point of the carrier image c fine (-) to obtain a fine-grained texture description feature matrix L fine (ii) a Wherein, the fine grain texture description value L of the pixel (io, jo) fine (. Phi.) is
Figure GDA0004079981970000021
i o And j o Respectively represent pixel points (i) o ,j o ) The lateral and longitudinal coordinates of; r denotes a pixel point (i) o ,j o ) Randomly selecting one pixel point as a starting point, and numbering according to a clockwise or anticlockwise direction; x is the number of o And x r Respectively representing pixel points (i) o ,j o ) And the pixel values of the neighborhood pixels; s (-) represents a symbolic function of,
Figure GDA0004079981970000022
1.2 calculating the coarse grain texture description value L of each pixel point of the carrier image c coarse (. To) to obtain a coarse-grained texture description feature matrix L coarse (ii) a Wherein, the coarse grain texture description value L of the pixel (io, jo) coarse (. Phi.) is
Figure GDA0004079981970000031
The count is 0/1 or 1/0 jump times of a bit string obtained after the value of the 8 neighborhood pixel point is taken through a sign function s (·), and thre is a threshold value;
1.3 calculating the Multi-granularity image texture feature matrix of the Carrier image c
L=L fine +L coarse
And 2, step: carrying out k-means clustering on the carrier image c according to the pixel values to obtain a semantic category label of each pixel value; segmenting according to the semantic category labels to obtain a classified semantic category label M matrix;
and 3, step 3: calculating a weighted mask of the carrier image c;
3.1 calculating the texture of each image block; the image blocks are pixel points with the same semantic category label value M (i, j)
(ii) a set of (i, j);
wherein the texture of the d-th image block
Figure GDA0004079981970000032
R d Set of pixel values, N, representing the d-th image block d Number of pixel values, L, representing the d-th image block i,j Expressing the texture value of the pixel point (i, j) of the carrier image c, namely the ith row and the jth row in the multi-granularity image texture feature matrix L of the carrier image c
The value of the column;
3.2 computing the weighted mask matrix of the Carrier image c
Figure GDA0004079981970000033
Wherein, the first and the second end of the pipe are connected with each other,
Figure GDA0004079981970000034
Figure GDA0004079981970000035
represents the texture value of the pixel (i, j) after the weighting mask of the carrier image c, i.e. the weighting mask matrix { (R) } of the carrier image c>
Figure GDA0004079981970000036
The value of the ith row and the jth column; th is a threshold value of texture;
and 4, step 4: calculating content adaptive countermeasure disturbance;
4.1 steganography is carried out on the carrier image c to obtain a secret carrier image s; inputting carrier image c and carrier image s into steganalysis network
Figure GDA0004079981970000037
Training to obtain a steganalysis network model;
4.2 initializing the countermeasure disturbance δ adv Will oppose the disturbance delta adv Adding the obtained mixture into a carrier image c to obtain an enhanced carrier image c adv (ii) a Adding random secret information pair c adv Steganography is carried out to obtain the current enhanced secret-carrying image s adv
4.3 in the process of backward propagation of the steganalysis network model, solving the current enhanced secret-carrying image s adv Of the gradient value, updating the counterdisturbance, i.e.
Figure GDA0004079981970000041
Wherein, | | δ adv || 2 Is the 2-norm of the current countermeasure disturbance, k is the weighting coefficient,
Figure GDA0004079981970000042
is a steganographic analysis network>
Figure GDA0004079981970000043
Cross entropy loss function of (1);
4.4 Using weighted mask matrix
Figure GDA0004079981970000044
Weighting the updated counterdisturbance to obtain weighted counterdisturbance, wherein the weighted counterdisturbance is used as the current counterdisturbance:
Figure GDA0004079981970000045
4.5 adding the current counterdisturbance δ to the Carrier image c adv Obtaining an enhanced carrier image c adv Adding a random secret information pair c adv Steganography is carried out to obtain the current enhanced secret-carrying image s adv (ii) a Using steganalysis networks
Figure GDA0004079981970000046
Determining a current enhanced secret-carrying image s adv : if the steganalysis network->
Figure GDA0004079981970000047
The current enhanced secret-carrying image s adv If the carrier image c is determined, the current counterdisturbance delta is made adv Adaptive disturbance resistance is carried out on the content, otherwise, the step 4.3 is returned;
and 5: adapting content against disturbance delta adv Adding the obtained mixture into a carrier image c to obtain an enhanced carrier image c adv Adding true secret information pair c adv Steganography is carried out to obtain a final enhanced secret-carrying image s adv
Preferably, the steganography adopts HUGO, WOW, UNIWARD or HILL algorithm; the steganalysis network
Figure GDA0004079981970000048
XuNet, yeNet, SRNet or ZhuNet.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention adds disturbance noise to the image texture rich area according to the characteristics of the carrier image, and improves the concealment of the disturbance noise. Therefore, the method and the device can successfully attack the deep learning-based steganalysis network under the condition of a small amount of disturbance noise, and can reduce the risk of detecting the anti-disturbance noise.
2. The invention constructs a weighted disturbance resisting mask mode. Firstly, an image texture description method based on multi-granularity is designed, and a pixel-by-pixel fine granularity and image feature statistics coarse granularity mode is combined for describing image texture features, so that compared with the mode of singly adopting the pixel-by-pixel fine granularity to describe image textures, the method is more robust to tiny noise. Secondly, the image is segmented according to the semantic features of the image, an image texture information rich block is selected as a candidate disturbance position, and a disturbance mask is constructed, so that the anti-disturbance noise has the image content self-adaption performance. Therefore, the method is more suitable for application scenes for accurately performing image steganography.
Drawings
FIG. 1 is a flow chart of the present invention.
Fig. 2a, 2b and 2c are schematic diagrams of enhanced carrier image visualization of the present invention.
Detailed Description
The invention is further illustrated by the following specific examples.
As shown in fig. 1, the method for enhancing an image of a spatial domain steganographic carrier based on content adaptive disturbance rejection includes:
step 1: calculating the multi-granularity image texture characteristics of the input carrier image c, wherein the method comprises the following steps:
step 1.1: and comparing pixel values of 8 neighborhood pixel points pixel by pixel aiming at the carrier image, wherein if the central pixel value is larger than the neighborhood pixels, the pixel value is 1, and otherwise, the pixel value is 0. In this embodiment, the upper left corner of the neighborhood is set as the starting point, 8 values 0/1 are recorded counterclockwise as a bit string with a length of 8, and the bit string is converted into a decimal number to represent the texture value of the current pixel, so that the fine-grained texture description value L of each pixel is obtained fine (. Cndot.) is:
Figure GDA0004079981970000051
wherein i o And j o Respectively representing the central pixel coordinate value, x o And x r Are respectively provided withExpressing gray values of the central pixel point and the neighborhood pixel point, and s (-) expresses a symbolic function:
Figure GDA0004079981970000052
step 1.2: based on the value of 0/1 bit of 8 neighborhood of each pixel value obtained in step 1.1, similarly setting the upper left corner of the neighborhood value as a starting point, recording 8 neighborhood values of each pixel counterclockwise as a bit string with the length of 8, and counting the number of 0/1 or 1/0 jump times count of the bit string, if the jump times are smaller than a threshold value thre, the texture complexity is 1, otherwise, the texture complexity is accumulated, the texture complexity is a coarse-grained texture description value, and the coarse-grained texture description value L of each pixel point coarse (. Cndot.) is:
Figure GDA0004079981970000053
step 1.3: the fine-grained texture description characteristics L of the images respectively obtained in the step 1.1 and the step 1.2 fine And image coarse grain texture description feature L coarse And adding pixel by pixel to obtain the final texture feature L of the image: l = L fine +L coarse Wherein L is fine ,L coarse And L each represents a matrix having the same size as the original image.
Step 2: carrying out k-means clustering on the input carrier image c according to the pixel values to obtain a semantic category label of each pixel value; and (4) segmenting according to the semantic category label to obtain a classified semantic category label M (the size of the matrix M is the same as that of the original image), wherein the set of the pixel points (i, j) with the same semantic label value M (i, j) belongs to the same image block.
And step 3: inputting the texture value matrix L of the carrier image c obtained in the step 1 and the semantic label M after the carrier image c obtained in the step 2 is classified, and calculating an image weighting mask, wherein the image weighting mask comprises the following steps:
step 3.1: carrying out processing on a carrier image c by adopting the texture value matrix obtained in the step 1Assigning a value, calculating a texture mean value (i.e. the texture mean value of each image block) of the same label of the image pixel according to the semantic label M obtained in the step 2, wherein the texture mean value is used for describing the texture of the current segmentation image block, and then the texture L of the d-th image block d Comprises the following steps:
Figure GDA0004079981970000061
wherein R is d Set of pixel values, N, belonging to the d-th image block d Number of pixel values, L, representing the d-th image block i,j Representing a texture value with (i, j) image pixel coordinates.
Step 3.2: selecting an image block according to a threshold th, and selecting a sub-block with rich texture of the current image as a candidate weighting mask:
Figure GDA0004079981970000062
wherein the content of the first and second substances,
Figure GDA0004079981970000063
representing the texture value with the resulting image pixel coordinates (i, j). Then: />
Figure GDA0004079981970000064
(the matrix size is the same as the original carrier image size) represents the final resulting mask.
And 4, step 4: calculating disturbance noise, comprising:
step 4.1: steganography is carried out on the input carrier image c by adopting a traditional steganography method (such as a height undetectable algorithm HUGO, a wavelet weight algorithm WOW, a airspace unified relative wavelet algorithm UNIWARD, a high-pass low-pass filter algorithm HILL and the like) to obtain a corresponding secret-carrying image s, and the carrier and the secret-carrying image pair are input into a steganography analysis network
Figure GDA0004079981970000065
(e.g., xuNet) [3] 、YeNet [4] 、SRNet [5] 、ZhuNet [6] Equal steganalysis network) to obtain a steganalysis network model;
reference [3]: xu, H. -Z.Wu, and Y. -Q.Shi, "Structural design of connected neural networks for hierarchical," IEEE Signal Process.Lett., may 2016, vol.23, no.5, pp.708-712.
Reference [4]: J.Ni, J.Ye, and Y.I.Yang, "Deep learning resonant representation for image segmentation," IEEE Trans. Inf. Forces Security, nov.2017, vol.12, no.11, pp.2545-2557.
Reference [5]: boroum and, M.Chen, J.Fridrich, deep residual network for stepanalysis of digital images, IEEE Trans. Inf. Forensecs Secur.14 (5) (2019) 1181-1193.
Reference [6]: zhang R, zhu F, liu J, et al, depth-wise minor adjustments and multi-level posing for an effective specific CNN-based catalysis [ J ]. IEEE Transactions on Information forms and Security,2019, 15.
Step 4.2: initializing the countering disturbance noise delta adv Will oppose the disturbance noise delta adv Adding to the carrier image c to obtain an enhanced carrier image c adv And adding a pair of random secret information c adv Performing steganography to obtain a current enhanced secret-carrying image s adv
Step 4.3: computing 2-norm [ Delta ] of the anti-disturbance noise adv || 2 As a constraint to minimize the countering disturbance noise. Meanwhile, calculating a cross entropy loss function L of the steganalysis network D (f c,s (theta; t)). To the current enhanced secret-carrying image s in the steganalysis network model back propagation process adv Obtaining a gradient value:
Figure GDA0004079981970000071
where k is a weighting coefficient, L D (. Is a loss function of the steganalysis network;
step 4.4: for the disturbance value delta calculated in the step 4.3 adv Weighting the mask obtained in step 3
Figure GDA0004079981970000072
Obtaining a current disturbance value: />
Figure GDA0004079981970000073
Step 4.5: adding the current countering disturbance noise delta to the carrier image c adv Obtaining the challenge vector c adv Then adding random secret information to steganographically obtain enhanced secret-carrying image s adv And will enhance the secret-carrying image s adv Input to an analyzer
Figure GDA0004079981970000074
Is determined if the steganalyser->
Figure GDA0004079981970000075
If the secret image s is judged as a carrier image, the anti-disturbance noise delta is output adv As content self-adaptive anti-disturbance noise, otherwise, continuously iterating the steps 4.3-4.5 to add the anti-disturbance noise;
and 5: adaptive disturbance noise resisting delta of content obtained in step 4 adv Adding the obtained mixture into a carrier image c to obtain an enhanced carrier image c adv And embedding real secret information, and performing steganography according to the traditional image steganography algorithm to obtain a final enhanced secret-carrying image s adv
Taking zhuet as an example, the invention and its safety performance ratio are as follows:
table 1. False alarm rate p of different carrier enhancement methods for detecting based on deep learning steganalyser ZhuNet MD (%)
Figure GDA0004079981970000076
In the table: the load (bpp, bit per pixel) refers to the secret information carrying capacity of the original steganography method, namely the bit number of each pixel embedded with secret information in the carrier image on average; the modification rate is the ratio of the number of modifications of the confrontation sample to the carrier image.
False alarm rate p MD The definition is as follows:
Figure GDA0004079981970000081
wherein N is r Representing the number of secret-carrying images judged by the steganalysis network as carrier images, N t Indicating the number of all the secret images.
As shown in Table 1, the method of the invention can make the hidden writing analyzer ZhuNet network based on deep learning have the highest false alarm rate and the best attack effect. For example, under the conditions that the load is 0.1bpp and the modification rate is 0.5, the method provided by the invention compares the SPS-ENH false alarm rate p which is the best method at present MD The improvement is 19.3 percent. In addition, with the improvement of the modification rate, the false alarm of all the methods is improved, which shows that when the anti-disturbance intensity is larger and larger, the successful attack can be basically realized on the steganalysis device ZhuNet network.
As shown in fig. 2a, 2b and 2c, fig. 2a is the original carrier image, the picture being selected from the BOSSBase data set. Fig. 2b shows the added noise immunity of the method of the present invention, the white point is the modified pixel area, the black point is the unmodified pixel area, and the modification amplitude is 1, so the graph shows the result after the pixel value is amplified by x255 times. Fig. 2c is the enhanced carrier image effect after adding the anti-disturbing noise to the carrier image of fig. 2 a. The white dashed box region represents an example of a region where the image texture is richer. As can be seen from FIG. 2, the disturbance information added by the present invention is mostly located in the image texture rich region.

Claims (2)

1. The spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance is characterized by comprising the following steps
Step 1: calculating the multi-granularity image texture characteristics of the carrier image c;
1.1 calculation loadFine-grained texture description value L of each pixel point of volume image c fine (-) to obtain a fine-grained texture description feature matrix L fine (ii) a Wherein, the fine grain texture description value L of the pixel (io, jo) fine (. Phi.) is
Figure QLYQS_1
i o And j o Respectively represent pixel points (i) o ,j o ) The lateral and longitudinal coordinates of (a); r denotes a pixel point (i) o ,j o ) Randomly selecting one pixel point as a starting point, and numbering according to a clockwise or anticlockwise direction; x is the number of o And x r Respectively represent pixel points (i) o ,j o ) And pixel values of the neighborhood pixels; s (-) represents a symbolic function,
Figure QLYQS_2
1.2 calculating the coarse grain texture description value L of each pixel point of the carrier image c coarse (. To) to obtain a coarse-grained texture description feature matrix L coarse (ii) a Wherein, the coarse grain texture description value L of the pixel (io, jo) coarse (. Phi.) is
Figure QLYQS_3
The count is 0/1 or 1/0 jump times of a bit string obtained after the value of 8 neighborhood pixel points is taken through a sign function s (·), and the thre is a threshold value;
1.3 calculating the Multi-granularity image texture feature matrix of the Carrier image c
L=L fine +L coarse
And 2, step: carrying out k-means clustering on the carrier image c according to the pixel values to obtain a semantic category label of each pixel value;
segmenting according to the semantic category labels to obtain a classified semantic category label M matrix;
and step 3: calculating a weighted mask of the carrier image c;
3.1 calculating the texture of each image block; the image blocks are a set of pixel points (i, j) with the same semantic category label value M (i, j);
wherein the texture of the d-th image block
Figure QLYQS_4
R d Set of pixel values, N, representing the d-th image block d Number of pixel values, L, representing the d-th image block i,j Expressing texture values of pixel points (i, j) of the carrier image c, namely values of an ith row and a jth column in a multi-granularity image texture feature matrix L of the carrier image c;
3.2 computing the weighted mask matrix of the Carrier image c
Figure QLYQS_5
Wherein the content of the first and second substances,
Figure QLYQS_6
Figure QLYQS_7
represents the texture value of the pixel point (i, j) after the weighting mask of the carrier image c, i.e. the weighting mask matrix +>
Figure QLYQS_8
The value of the ith row and the jth column; th is a threshold value of texture;
and 4, step 4: calculating content adaptive countermeasure disturbance;
4.1 steganography is carried out on the carrier image c to obtain a secret carrier image s; inputting carrier image c and carrier image s into steganalysis network
Figure QLYQS_9
Training to obtain a steganalysis network model;
4.2 initializing the countermeasure disturbance δ adv Will oppose the disturbance delta adv Adding the obtained mixture into a carrier image c to obtain an enhanced carrier image c adv
Adding random secret information pair c adv Steganography is carried out to obtain the current enhanced secret-carrying image s adv
4.3 in the process of backward propagation of the steganalysis network model, solving the current enhanced secret-carrying image s adv Of the gradient value, updating the counterdisturbance, i.e.
Figure QLYQS_10
Wherein, | | δ adv || 2 Is the 2-norm of the current countermeasure disturbance, k is the weighting coefficient,
Figure QLYQS_11
is a steganalysis network
Figure QLYQS_12
Cross entropy loss function of (1);
4.4 Using weighted mask matrix
Figure QLYQS_13
Weighting the updated counterdisturbance to obtain weighted counterdisturbance, wherein the weighted counterdisturbance is used as the current counterdisturbance:
Figure QLYQS_14
4.5 adding the current counterdisturbance δ to the Carrier image c adv Obtaining an enhanced carrier image c adv Adding random secret information pair c adv Steganography is carried out to obtain the current enhanced secret-carrying image s adv (ii) a Using steganalysis networks
Figure QLYQS_15
Determining a current enhanced secret-carrying image s adv : if it is notSteganalysis network->
Figure QLYQS_16
The current enhanced secret-carrying image s adv If the carrier image c is determined, the current counterdisturbance delta is made adv Adaptive countermeasure disturbance for the content, otherwise return to step 4.3;
and 5: adapting content against disturbance delta adv Adding the obtained mixture into a carrier image c to obtain an enhanced carrier image c adv Adding true secret information pair c adv Steganography is carried out to obtain a final enhanced secret-carrying image s adv
2. The method for enhancing the spatial domain steganographic carrier image based on content adaptive robust to disturbance as claimed in claim 1, wherein the steganography employs HUGO, WOW, UNIWARD or HILL algorithm; the steganalysis network
Figure QLYQS_17
XuNet, yeNet, SRNet or ZhuNet. />
CN202210521584.1A 2022-05-13 2022-05-13 Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance Active CN114820380B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210521584.1A CN114820380B (en) 2022-05-13 2022-05-13 Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210521584.1A CN114820380B (en) 2022-05-13 2022-05-13 Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance

Publications (2)

Publication Number Publication Date
CN114820380A CN114820380A (en) 2022-07-29
CN114820380B true CN114820380B (en) 2023-04-18

Family

ID=82515015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210521584.1A Active CN114820380B (en) 2022-05-13 2022-05-13 Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance

Country Status (1)

Country Link
CN (1) CN114820380B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348360B (en) * 2022-08-11 2023-11-07 国家电网有限公司大数据中心 GAN-based self-adaptive embedded digital tag information hiding method
CN117131544B (en) * 2023-10-27 2024-01-12 北京睿航至臻科技有限公司 Data privacy protection method based on depth steganography

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537601A (en) * 2014-12-23 2015-04-22 中山大学 Gray level image aerial region steganography method based on nine grids
CN107133991A (en) * 2017-03-17 2017-09-05 中山大学 A kind of bianry image steganography method based on disturbance distortion and pixel selection
CN111222583A (en) * 2020-01-15 2020-06-02 北京中科研究院 Image steganalysis method based on confrontation training and key path extraction
CN111768325A (en) * 2020-04-03 2020-10-13 南京信息工程大学 Security improvement method based on generation of countermeasure sample in big data privacy protection
CN113538202A (en) * 2021-08-05 2021-10-22 齐鲁工业大学 Image steganography method and system based on generative steganography confrontation
CN113706636A (en) * 2021-07-09 2021-11-26 重庆度小满优扬科技有限公司 Method and device for identifying tampered image
CN114283080A (en) * 2021-12-15 2022-04-05 复旦大学 Multi-mode feature fusion text-guided image compression noise removal method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11080809B2 (en) * 2017-05-19 2021-08-03 Google Llc Hiding information and images via deep learning

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104537601A (en) * 2014-12-23 2015-04-22 中山大学 Gray level image aerial region steganography method based on nine grids
CN107133991A (en) * 2017-03-17 2017-09-05 中山大学 A kind of bianry image steganography method based on disturbance distortion and pixel selection
CN111222583A (en) * 2020-01-15 2020-06-02 北京中科研究院 Image steganalysis method based on confrontation training and key path extraction
CN111768325A (en) * 2020-04-03 2020-10-13 南京信息工程大学 Security improvement method based on generation of countermeasure sample in big data privacy protection
CN113706636A (en) * 2021-07-09 2021-11-26 重庆度小满优扬科技有限公司 Method and device for identifying tampered image
CN113538202A (en) * 2021-08-05 2021-10-22 齐鲁工业大学 Image steganography method and system based on generative steganography confrontation
CN114283080A (en) * 2021-12-15 2022-04-05 复旦大学 Multi-mode feature fusion text-guided image compression noise removal method

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Jie Luo 等.Improving security for image steganography using content-adaptive adversarial perturbations.AppliedIntelligence.2022,1-18. *
Ruohan Meng 等.High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks.IEEE Transactions on Network Science and Engineering .2021,第9卷(第2期),848 - 862. *
Vipul Sharma 等.Towards secured image steganography based on content-adaptive adversarial perturbation.Computers and Electrical Engineering.2022,第105卷1-15. *
夏强 等.基于普遍对抗噪声的高效载体图像增强算法.信息网络安全.2022,第22卷(第02期),64-75. *
李锦伟 等.基于细粒度嵌入空间预留的密文域图像可逆信息隐藏方法.网络与信息安全学报.2022,第8卷(第01期),106-117. *
陈君夫 等.基于深度学习的图像隐写方法研究.软件学报.2020,第32卷(第2期),551-578. *
陈孟华 等.基于注意力机制与生成对抗网络的彩色图像隐写算法.现代信息科技.2022,第6卷(第07期),70-76. *

Also Published As

Publication number Publication date
CN114820380A (en) 2022-07-29

Similar Documents

Publication Publication Date Title
CN114820380B (en) Spatial domain steganographic carrier image enhancement method based on content self-adaption disturbance resistance
Wang et al. Optimized feature extraction for learning-based image steganalysis
Ubhi et al. Neural style transfer for image within images and conditional GANs for destylization
Li et al. GAN-based spatial image steganography with cross feedback mechanism
Zhang et al. A generative method for steganography by cover synthesis with auxiliary semantics
CN110517329A (en) A kind of deep learning method for compressing image based on semantic analysis
CN113222800A (en) Robust image watermark embedding and extracting method and system based on deep learning
CN103034853A (en) Universal steganalysis method for JPEG images
CN115131188A (en) Robust image watermarking method based on generation countermeasure network
Wang et al. HidingGAN: High capacity information hiding with generative adversarial network
CN113723295A (en) Face counterfeiting detection method based on image domain frequency domain double-flow network
CN115908095A (en) Hierarchical attention feature fusion-based robust image watermarking method and system
GB2614806A (en) Method of crowd density estimation based on multi-scale feature fusion of residual network
CN115809953A (en) Attention mechanism-based multi-size image robust watermarking method and system
CN116091288A (en) Diffusion model-based image steganography method
Chen et al. Image splicing localization using residual image and residual-based fully convolutional network
Berg et al. Searching for Hidden Messages: Automatic Detection of Steganography.
CN116757909B (en) BIM data robust watermarking method, device and medium
CN114359269A (en) Virtual food box defect generation method and system based on neural network
CN113034332B (en) Invisible watermark image and back door attack model construction and classification method and system
Zhang et al. A blind watermarking system based on deep learning model
CN113628090A (en) Anti-interference message steganography and extraction method and system, computer equipment and terminal
Ma et al. Enhancing the security of image steganography via multiple adversarial networks and channel attention modules
Liu et al. Hiding Functions within Functions: Steganography by Implicit Neural Representations
CN116630131A (en) Coding and decoding system and method for invisible screen watermark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant