CN109587372A - A kind of invisible image latent writing art based on generation confrontation network - Google Patents

A kind of invisible image latent writing art based on generation confrontation network Download PDF

Info

Publication number
CN109587372A
CN109587372A CN201811509096.9A CN201811509096A CN109587372A CN 109587372 A CN109587372 A CN 109587372A CN 201811509096 A CN201811509096 A CN 201811509096A CN 109587372 A CN109587372 A CN 109587372A
Authority
CN
China
Prior art keywords
image
network
close
secret
latent writing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811509096.9A
Other languages
Chinese (zh)
Other versions
CN109587372B (en
Inventor
张茹
刘建毅
董士琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201811509096.9A priority Critical patent/CN109587372B/en
Publication of CN109587372A publication Critical patent/CN109587372A/en
Application granted granted Critical
Publication of CN109587372B publication Critical patent/CN109587372B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32309Methods relating to embedding, encoding, decoding, detection or retrieval operations in colour image data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Molecular Biology (AREA)
  • Artificial Intelligence (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Image Processing (AREA)
  • Image Analysis (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The present invention discloses a kind of invisible image latent writing art based on generation confrontation network, can be realized one gray scale Secret Image of insertion in a color host image and obtains carrying close image, and can successfully recover Secret Image from the close image of load.Include: encoder network, is responsible for being embedded into Secret Image to generate in carrier image carrying close image;Decoder network is responsible for recovering Secret Image from the close image of load;Arbiter network is responsible for natural image and carries close image progress steganalysis, to adjust the safety of encoder network and decoder network.The present invention, based on the image latent writing art for generating confrontation network, is hidden for image information by construction and provides new mentality of designing.

Description

A kind of invisible image latent writing art based on generation confrontation network
Technical field
The invention belongs to field of image processings, more particularly to based on the image latent writing art for generating confrontation network.
Background technique
Recently as internet fast development with it is universal, communicating has become more and more convenient, but to information security It also proposed new challenge.On the one hand, people always have some secret informations to be not intended to be learned by third party in the communications;Another party Face, emerging digital multimedia works need copyright protection, and there are also a large amount of electronic commerce datas etc. to need integrality true Recognize.Traditional cryptography not can be well solved emerging these problems.Steganography (Steganography) is used for Secret information is embedded into normal carrier without the perception characteristics for changing carrier, by carry the transmission of close carrier in the channel come Realize the transmission of secret information.Steganography not only conceals the content of communication, also conceals the behavior of communication, therefore can be fine It applies in scene as above on ground.Digital picture has become one of data type most frequently used on internet, has The big feature of capacity of big, the embeddable secret information of redundancy, therefore the Steganography of mainstream is using image as carrier mostly at present Image latent writing art (Image Steganography).
There are three the index of measurement image latent writing art is main: capacity, invisibility, safety.Capacity refers to embeddable number The length of secret information in word image;Invisibility refers to whether carrier image can be with original graph after secret information insertion As indifference;Whether safety then requires to carry close image and can break away from being attacked in transmission process the detection of algorithm.Existing figure As all more or less there are some problems at this three aspect for Steganography.
On the other hand, with the continuous development of image latent writing art, for the detection algorithm of image latent writing art --- image is hidden Analysis (Image Steganalysis) algorithm is write also to be evolving.The purpose of image latent writing analysis is by carrying out to image Analysis is to judge whether contain secret information in image, it might even be possible to which estimated information embedded quantity obtains secret information, destroys secret Information etc..For existing image latent writing art, constantly there is new image latent writing parser to be suggested, and performance is increasingly It is good.It is therefore proposed that new image latent writing art effectively hides steganalysis to meet the needs of more and more application scenarios The detection of algorithm, is of great importance for the network information security.
Existing image latent writing art often relies on well-designed algorithm, carries out in the airspace of image or transform domain secret The insertion of information.This kind of Steganographies need a large amount of priori knowledge, and algorithm once designs and just cannot occur further according to new Steganalysis algorithm be automatically adjusted.Therefore designing the new image latent writing art of one kind is a huge challenge.
Recently as the arrival of computing capability being substantially improved with big data era, using convolutional neural networks as representative Deep learning method achieves excellent effect in the tasks such as image recognition, target detection, image generation.Deep learning passes through Convolutional neural networks to image information carry out feature extraction with merge, and have supervise or semi-supervised ground by way of realize that convolution is refreshing Parameter through network updates, and is finally completed some specific task.The newest fruits that confrontation network is deep learning field are generated, It includes generators and arbiter two parts.By the dual training of generator and arbiter, generating confrontation network can be generated The sample for thering is set of metadata of similar data to be distributed with authentic specimen.Confrontation network is generated to appoint in image generation, Style Transfer, speech synthesis etc. Excellent effect is achieved in business.
Summary of the invention
The present invention propose it is a kind of based on the digital picture steganographic algorithm for generating confrontation network, by convolutional neural networks from Dynamic study is final to realize the invisible Steganography that a gray scale Secret Image is embedded in a color host image, and safety It is continuously improved in the learning process of neural network.
The present invention provides a kind of based on the image latent writing method for generating confrontation network, comprising the following steps:
1) under coder-decoder network frame, by encoder network by Secret Image steganography into carrier image It generates and carries close image, recovered Secret Image from the close image of load by decoder network;
2) in the case where generating confrontation network frame, encoder network and decoder network form a model conduct end to end Generator network generates the Secret Image for carrying close image and recovering by generator network, by arbiter network to generation The true and false property of the close image of load judged;
3) pass through the dual training process of generator network and arbiter network, so that the close figure of load that generator network generates As consistent with corresponding carrier image and close to true picture so that the Secret Image that goes out of generator network recovery with Original private image is similar as much as possible.
4) using the image training model of sizes size, so that model has better generalization ability.
Further, the dual training process of the generator network and arbiter network includes:
A) for generator network, encoder network therein will make the close image of load generated and carrier image as much as possible Similar, decoder network therein will make the Secret Image recovered and original private image similar as much as possible;
B) arbiter network plays a part of steganalysis, differentiates that input picture is that natural image or generator network are raw At the close image of load, for steganalysis as a result, the direction to change of gradient is changed;
C) generator network obtains the parameter of gradient updating encoder network and decoder network that arbiter network is passed back, Generation preferably carries close image.
Further, gray scale Secret Image is only embedded into the YCrCb color of carrier image by encoder network in step 1) In the channel Y under color space, decoder network also only recovers from the channel Y under the YCrCb color space for carrying close image secret Close image.
Further, different characteristic can be fused to by the encoder network in step 1) by Inception module composition The steganography of image is realized together;Decoder network is a full convolutional coding structure.The two can handle the image of arbitrary dimension.
Further, the arbiter in step 2) is the steganalysis model realized by convolutional neural networks, wherein The characteristic pattern of arbitrary dimension is mapped to the feature vector fixed to regular length by use space pyramid pond module, is broken Size limitation to input picture, has better steganalysis performance.
Further, it will use a recombination losses function in step 3) to instruct the training of generator network.
Secret Image can be embedded into carrier image well using method of the invention, had compared with prior art It has the advantage that
1, the present invention improves the method for the propositions such as Baluja etc. and Atique, solves and carries close image and carrier Image discrepant problem on color;
2, the present invention is trained using confrontation network is generated, and makes model can be according to hidden during realizing image latent writing The analysis situation for writing analyzer carrys out adjusting parameter, and the close image of the load of generation is less susceptible to be detected by steganalysis device;
3, the present invention carrys out the training of guide image steganography process using a recombination losses function, accelerates training speed, Improve the quality for carrying close image and the Secret Image recovered.
Detailed description of the invention
Fig. 1 is the flow chart that the method for the present invention carries out image latent writing.Wherein, encoder network and decoder network constitute life It grows up to be a useful person network, steganalysis device is as arbiter network of the invention.
Fig. 2 is the instance graph that image latent writing is carried out using the method for the present invention.
Fig. 3 is the method for the present invention in different frequency of training, the recall rate contrast table of steganalysis model.
Specific embodiment
To be clearer and more comprehensible These characteristics and advantage of the invention, With reference to embodiment with attached drawing to this hair It is bright to be described in further detail.
The image latent writing method that the present invention designs is based on generating confrontation network, suitable for gray scale Secret Image is embedded into coloured silk In color carrier image.This method is trained to obtain optimal model parameters by using data the set pair analysis model, specifically trains process As shown in Figure 1, its key step includes:
Color host image is transformed into YCrCb color space by step 101 by rgb color space.
Step 102, by the channel Y of color host image and gray scale Secret Image splicing (concatenate) to together it After be output in encoder network.
Step 103, encoder network are made by feature extraction with one single pass image of output later, the image is merged To carry the channel Y of close image and two combination of channels of Cr, Cb of initial carrier image to rgb color space is transformed into together, obtain Colour carries close image.
Step 201 will carry close image and be transformed into YCrCb color space, and the channel Y therein is only input to decoder In network.
Step 202, decoder network by feature extraction with merge export a single channel image, what is as recovered is secret Close image.
Step 203, calculated using designed recombination losses function carry difference between close image and initial carrier image, Difference between the Secret Image recovered and original private image, will be both as a part of loss function value.
Step 301 carries out steganalysis to physical carrier image pattern using arbiter network, judges steganalysis result It is whether consistent with true classification;
Step 302 carries out steganalysis using the close image of load of the arbiter network to generation, judge steganalysis result with Whether true classification is consistent;
Step 401 calculates the difference carried between close image pattern and physical carrier image pattern using recombination losses function Difference value between the Secret Image be worth, recovered and original private image, the differentiation according to arbiter network to close image is carried As a result differentiation penalty values are obtained, three is added to the damage as generator network (encoder network and decoder network) together It loses, calculates gradient, update the parameter of generator network (encoder network and decoder network);
The penalty values of step 402, the steganalysis result computational discrimination device obtained according to step 3, calculate gradient, and update is sentenced The parameter of other device network.
Step 501 completes the wheel on training set after training, and verification test is carried out on test set, it is close to calculate load The average similarity of the average similarity of image and carrier image, the Secret Image recovered and original private image;
Step 502 checks whether the result of step 501 reaches expectation index, if having carry out next step operation, it is no then Return to the training that step A starts next round on training set;
Step 503 is finely adjusted training to model using the image pattern of sizes, improves the generalization ability of model.
The present invention is trained and has been verified on LFW, Pascal VOC2012 and tri- data sets of ImageNet, Fig. 2 In be by the method for the present invention carry out image latent writing sample instantiation figure, it can be seen that carry close image and initial carrier picture altitude one It causes, and the Secret Image recovered is consistent with original private picture altitude.It is the method for the present invention in Fig. 3 in different frequency of training When, steganalysis algorithm compares the recall rate for carrying close image.This comparison is shown with the continuous instruction for generating confrontation network Practice, the safety of the method for the present invention is being continuously improved.
The present invention realizes one gray scale secret figure of insertion in a color image under the frame of coder-decoder The image latent writing task that Secret Image recovers simultaneously can be allowed steganography model instructing by picture under the frame for generating confrontation network The attack of steganalysis algorithm is considered during practicing, continuous adjusting parameter is to improve the safety of model.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Within the technical scope disclosed by the invention, any changes or substitutions that can be easily thought of by any people for being familiar with the technology, should all cover Within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (6)

1. a kind of based on the invisible image latent writing art for generating confrontation network characterized by comprising
A, generate and carry close image: encoder network is realized by convolutional neural networks, is responsible for gray scale Secret Image being embedded into colour In carrier image, the colored close image of load is generated;
B, recover Secret Image: decoder network is realized by full convolutional neural networks, is responsible for carrying in close image from colour and be restored Gray scale Secret Image out;
C, carry out steganalysis using arbiter network: arbiter network generates the natural image or encoder network of input It carries close image and carries out steganalysis;
D, parameter update and repetitive exercise: penalty values are calculated using coincidence loss function, calculate gradient, undated parameter;
E, verifying model performance and extensive training: by structural similarity index verification model performance, using multiple dimensioned sample into The extensive training of row.
2. according to claim 1 a kind of based on the invisible image latent writing art for generating confrontation network, which is characterized in that step Rapid A is further included steps of
A1, color host image are transformed into YCrCb color space by rgb color space;
A2, it is input in encoder network, passes through after the channel Y of color host image and gray scale Secret Image are spliced together It crosses the feature extraction of encoder network and generates a single channel image with merging.
Two combination of channels of Cr, Cb of A3, the single channel image that previous step is generated and initial carrier image are final to constituting together Colour carry close image.
3. according to claim 1 a kind of based on the invisible image latent writing art for generating confrontation network, which is characterized in that step Rapid B is further included steps of
B1, the close image of load that step A is generated is transformed into YCrCb color space, only the channel Y is input in decoder network
B2, decoder network by feature extraction with merge export a single channel image, the Secret Image as recovered.
4. according to claim 1 a kind of based on the invisible image latent writing art for generating confrontation network, which is characterized in that step It is further included steps of under rapid C
C1, physical carrier image pattern is inputted into arbiter network, obtain analysis classification, determine whether and true classification one It causes;
C2, into arbiter network input step A generate the close image pattern of load, obtain analysis classification, determine whether with really Classification is consistent.
5. according to claim 1 a kind of based on the invisible image latent writing art for generating confrontation network, which is characterized in that step Rapid D is further included steps of
D1, it is calculated using recombination losses function and carries difference value between close image pattern and physical carrier image pattern, recovers Secret Image and original private image between difference value, the differentiation result for carrying close image is obtained according to arbiter network and is sentenced Three is added to the loss as generator network (encoder network and decoder network) together, calculates ladder by other penalty values Degree updates the parameter of generator network (encoder network and decoder network);
D2, the penalty values according to the result computational discrimination device network of step C, calculate gradient, update the parameter of arbiter network.
6. according to claim 1 a kind of based on the invisible image latent writing art for generating confrontation network, which is characterized in that step Rapid E is further included steps of
E1, it completes the wheel on training set after training, verification test is carried out on test set, calculates and carries close image and carrier The average similarity of the average similarity of image, the Secret Image recovered and original private image;
E2, it checks whether the result of step E1 reaches expectation index, next step operation is carried out if having, does not return to step A then Start the training of next round on training set;
E3, training is finely adjusted to model using the image pattern of sizes, improves the generalization ability of model.
CN201811509096.9A 2018-12-11 2018-12-11 Invisible image steganography based on generation of countermeasure network Active CN109587372B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811509096.9A CN109587372B (en) 2018-12-11 2018-12-11 Invisible image steganography based on generation of countermeasure network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811509096.9A CN109587372B (en) 2018-12-11 2018-12-11 Invisible image steganography based on generation of countermeasure network

Publications (2)

Publication Number Publication Date
CN109587372A true CN109587372A (en) 2019-04-05
CN109587372B CN109587372B (en) 2020-06-16

Family

ID=65928897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811509096.9A Active CN109587372B (en) 2018-12-11 2018-12-11 Invisible image steganography based on generation of countermeasure network

Country Status (1)

Country Link
CN (1) CN109587372B (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334805A (en) * 2019-05-05 2019-10-15 中山大学 A kind of JPEG domain image latent writing method and system based on generation confrontation network
CN110502646A (en) * 2019-08-02 2019-11-26 广州多益网络股份有限公司 A kind of multimedia file purification method, device, storage medium and terminal device
CN110503157A (en) * 2019-08-27 2019-11-26 安徽大学 The image latent writing analysis method of multitask convolutional neural networks based on fine granularity image
CN110889797A (en) * 2019-10-15 2020-03-17 浙江大学 Depth self-adaptive image hiding method based on confrontation sample generation
CN111598762A (en) * 2020-04-21 2020-08-28 中山大学 Generating type robust image steganography method
CN111681154A (en) * 2020-06-09 2020-09-18 湖南大学 Color image steganography distortion function design method based on generation countermeasure network
CN111768325A (en) * 2020-04-03 2020-10-13 南京信息工程大学 Security improvement method based on generation of countermeasure sample in big data privacy protection
CN112243005A (en) * 2020-10-14 2021-01-19 合肥工业大学 Secure non-embedded steganography method based on generation of countermeasure network
CN112561773A (en) * 2020-12-28 2021-03-26 中国科学技术大学 Deep disturbance-based anti-steganography method
CN112884630A (en) * 2021-02-04 2021-06-01 南开大学 Reversible neural network-based high-capacity image steganography and recovery method
CN113077377A (en) * 2021-05-13 2021-07-06 海南大学 Color image steganography method based on generation countermeasure network
CN113099066A (en) * 2019-12-23 2021-07-09 浙江工商大学 Large-capacity image steganography method based on multi-scale fusion cavity convolution residual error network
CN113254891A (en) * 2021-05-17 2021-08-13 山东大学 Information hiding method, device and system based on void space pyramid
CN113326531A (en) * 2021-06-29 2021-08-31 湖南汇视威智能科技有限公司 Robust efficient distributed face image steganography method
CN113538202A (en) * 2021-08-05 2021-10-22 齐鲁工业大学 Image steganography method and system based on generative steganography confrontation
CN113989097A (en) * 2021-12-30 2022-01-28 南京中孚信息技术有限公司 Information steganography model training method, information steganography device and storage medium
CN114025053A (en) * 2021-09-28 2022-02-08 上海电力大学 Image steganography method combining high color similarity preprocessing
CN114207659A (en) * 2019-06-12 2022-03-18 罗格斯,新泽西州立大学 Light field messaging
CN114220443A (en) * 2021-11-04 2022-03-22 合肥工业大学 BN optimization SNGAN-based training method and system for adaptive audio steganography model
WO2022127374A1 (en) * 2020-12-18 2022-06-23 海南大学 Color image steganography method based on convolutional neural network
CN115022649A (en) * 2022-05-17 2022-09-06 薇链信息技术有限公司 Reversible neural network-based high-embedding-quantity and colorizable image steganography and recovery method
CN115086674A (en) * 2022-06-16 2022-09-20 西安电子科技大学 Image steganography method based on generation of countermeasure network
CN117132671A (en) * 2023-10-27 2023-11-28 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Multi-task steganography method, system and medium based on depth self-adaptive steganography network
CN117292696A (en) * 2023-10-08 2023-12-26 合肥工业大学 End-to-end audio steganography method, system, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171266A (en) * 2017-12-25 2018-06-15 中国矿业大学 A kind of learning method of multiple target depth convolution production confrontation network model
CN108346125A (en) * 2018-03-15 2018-07-31 中山大学 A kind of spatial domain picture steganography method and system based on generation confrontation network
CN108921764A (en) * 2018-03-15 2018-11-30 中山大学 A kind of image latent writing method and system based on generation confrontation network
CN108923922A (en) * 2018-07-26 2018-11-30 北京工商大学 A kind of text steganography method based on generation confrontation network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171266A (en) * 2017-12-25 2018-06-15 中国矿业大学 A kind of learning method of multiple target depth convolution production confrontation network model
CN108346125A (en) * 2018-03-15 2018-07-31 中山大学 A kind of spatial domain picture steganography method and system based on generation confrontation network
CN108921764A (en) * 2018-03-15 2018-11-30 中山大学 A kind of image latent writing method and system based on generation confrontation network
CN108923922A (en) * 2018-07-26 2018-11-30 北京工商大学 A kind of text steganography method based on generation confrontation network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ATIQUE UR REHMAN,ET AL: "END-TO-END TRAINED CNN ENCODER-DECODER NETWORKS FOR IMAGE STEGANOGRAPHY", 《ARXIV.ORG》 *
SHUMEET BALUJA: "Hiding Images in Plain Sight: Deep Steganography", 《31ST CONFERENCE ON NEURAL INFORMATION PROCESSING SYSTEMS (NIPS 2017)》 *
翟黎明 等: "深度学习在图像隐写术与隐写分析领域中的研究进展", 《信息安全学报》 *

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334805B (en) * 2019-05-05 2022-10-25 中山大学 JPEG domain image steganography method and system based on generation countermeasure network
CN110334805A (en) * 2019-05-05 2019-10-15 中山大学 A kind of JPEG domain image latent writing method and system based on generation confrontation network
CN114207659A (en) * 2019-06-12 2022-03-18 罗格斯,新泽西州立大学 Light field messaging
CN110502646A (en) * 2019-08-02 2019-11-26 广州多益网络股份有限公司 A kind of multimedia file purification method, device, storage medium and terminal device
CN110503157A (en) * 2019-08-27 2019-11-26 安徽大学 The image latent writing analysis method of multitask convolutional neural networks based on fine granularity image
CN110503157B (en) * 2019-08-27 2021-11-19 安徽大学 Image steganalysis method of multitask convolution neural network based on fine-grained image
CN110889797B (en) * 2019-10-15 2021-06-08 浙江大学 Depth self-adaptive image hiding method based on confrontation sample generation
CN110889797A (en) * 2019-10-15 2020-03-17 浙江大学 Depth self-adaptive image hiding method based on confrontation sample generation
CN113099066A (en) * 2019-12-23 2021-07-09 浙江工商大学 Large-capacity image steganography method based on multi-scale fusion cavity convolution residual error network
CN113099066B (en) * 2019-12-23 2022-09-30 浙江工商大学 Large-capacity image steganography method based on multi-scale fusion cavity convolution residual error network
CN111768325A (en) * 2020-04-03 2020-10-13 南京信息工程大学 Security improvement method based on generation of countermeasure sample in big data privacy protection
CN111598762A (en) * 2020-04-21 2020-08-28 中山大学 Generating type robust image steganography method
CN111598762B (en) * 2020-04-21 2023-09-19 中山大学 Generating type robust image steganography method
CN111681154B (en) * 2020-06-09 2022-06-21 湖南大学 Color image steganography distortion function design method based on generation countermeasure network
CN111681154A (en) * 2020-06-09 2020-09-18 湖南大学 Color image steganography distortion function design method based on generation countermeasure network
CN112243005A (en) * 2020-10-14 2021-01-19 合肥工业大学 Secure non-embedded steganography method based on generation of countermeasure network
WO2022127374A1 (en) * 2020-12-18 2022-06-23 海南大学 Color image steganography method based on convolutional neural network
CN112561773B (en) * 2020-12-28 2024-03-29 中国科学技术大学 Deep disturbance-based countersteganography method
CN112561773A (en) * 2020-12-28 2021-03-26 中国科学技术大学 Deep disturbance-based anti-steganography method
CN112884630A (en) * 2021-02-04 2021-06-01 南开大学 Reversible neural network-based high-capacity image steganography and recovery method
CN112884630B (en) * 2021-02-04 2022-06-28 南开大学 Reversible neural network-based high-capacity image steganography and recovery method
CN113077377A (en) * 2021-05-13 2021-07-06 海南大学 Color image steganography method based on generation countermeasure network
CN113254891A (en) * 2021-05-17 2021-08-13 山东大学 Information hiding method, device and system based on void space pyramid
CN113254891B (en) * 2021-05-17 2022-08-16 山东大学 Information hiding method, device and system based on void space pyramid
CN113326531A (en) * 2021-06-29 2021-08-31 湖南汇视威智能科技有限公司 Robust efficient distributed face image steganography method
CN113538202A (en) * 2021-08-05 2021-10-22 齐鲁工业大学 Image steganography method and system based on generative steganography confrontation
CN114025053A (en) * 2021-09-28 2022-02-08 上海电力大学 Image steganography method combining high color similarity preprocessing
CN114025053B (en) * 2021-09-28 2023-12-01 上海电力大学 Image steganography method combined with high-color similarity preprocessing
CN114220443A (en) * 2021-11-04 2022-03-22 合肥工业大学 BN optimization SNGAN-based training method and system for adaptive audio steganography model
CN113989097B (en) * 2021-12-30 2022-05-06 南京中孚信息技术有限公司 Information steganography model training method, information steganography device and storage medium
CN113989097A (en) * 2021-12-30 2022-01-28 南京中孚信息技术有限公司 Information steganography model training method, information steganography device and storage medium
CN115022649A (en) * 2022-05-17 2022-09-06 薇链信息技术有限公司 Reversible neural network-based high-embedding-quantity and colorizable image steganography and recovery method
CN115022649B (en) * 2022-05-17 2024-08-13 薇链信息技术有限公司 High-embedding-capacity and colorable image steganography and restoration method based on reversible neural network
CN115086674A (en) * 2022-06-16 2022-09-20 西安电子科技大学 Image steganography method based on generation of countermeasure network
CN115086674B (en) * 2022-06-16 2024-04-02 西安电子科技大学 Image steganography method based on generation of countermeasure network
CN117292696A (en) * 2023-10-08 2023-12-26 合肥工业大学 End-to-end audio steganography method, system, storage medium and electronic equipment
CN117292696B (en) * 2023-10-08 2024-03-12 合肥工业大学 End-to-end audio steganography method, system, storage medium and electronic equipment
CN117132671A (en) * 2023-10-27 2023-11-28 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Multi-task steganography method, system and medium based on depth self-adaptive steganography network
CN117132671B (en) * 2023-10-27 2024-02-23 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Multi-task steganography method, system and medium based on depth self-adaptive steganography network

Also Published As

Publication number Publication date
CN109587372B (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN109587372A (en) A kind of invisible image latent writing art based on generation confrontation network
Tolosana et al. Deepfakes and beyond: A survey of face manipulation and fake detection
Zhang Deepfake generation and detection, a survey
Lee et al. Detecting handcrafted facial image manipulations and GAN-generated facial images using Shallow-FakeFaceNet
Do et al. Forensics face detection from GANs using convolutional neural network
CN109800710A (en) Pedestrian's weight identifying system and method
CN111241291A (en) Method and device for generating countermeasure sample by utilizing countermeasure generation network
CN106599872A (en) Method and equipment for verifying living face images
CN111612799A (en) Face data pair-oriented incomplete reticulate pattern face repairing method and system and storage medium
Baek et al. Generative adversarial ensemble learning for face forensics
Asghar et al. Edge–texture feature-based image forgery detection with cross-dataset evaluation
CN112200075B (en) Human face anti-counterfeiting method based on anomaly detection
WO2022252372A1 (en) Image processing method, apparatus and device, and computer-readable storage medium
CN118196231B (en) Lifelong learning draft method based on concept segmentation
Zhao et al. Detecting deepfake video by learning two-level features with two-stream convolutional neural network
CN117437108A (en) Watermark embedding method for image data
Arora et al. A review of techniques to detect the GAN-generated fake images
Xiao et al. Protecting the trust and credibility of data by tracking forgery trace based on GANs
CN114596609A (en) Audio-visual counterfeit detection method and device
Khalid et al. Deepfakes catcher: a novel fused truncated densenet model for deepfakes detection
CN115936961B (en) Steganalysis method, equipment and medium based on few-sample comparison learning network
Yu et al. Review of face presentation attack detection competitions
CN111737688A (en) Attack defense system based on user portrait
Du et al. WIP: Auditing Artist Style Pirate in Text-to-image Generation Models
CN113642427A (en) Image protection method for artificial intelligence counterfeiting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant