CN110334805A - A kind of JPEG domain image latent writing method and system based on generation confrontation network - Google Patents

A kind of JPEG domain image latent writing method and system based on generation confrontation network Download PDF

Info

Publication number
CN110334805A
CN110334805A CN201910368809.2A CN201910368809A CN110334805A CN 110334805 A CN110334805 A CN 110334805A CN 201910368809 A CN201910368809 A CN 201910368809A CN 110334805 A CN110334805 A CN 110334805A
Authority
CN
China
Prior art keywords
network
image
matrix
jpeg
probability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910368809.2A
Other languages
Chinese (zh)
Other versions
CN110334805B (en
Inventor
阮丹阳
阳建华
康显桂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN201910368809.2A priority Critical patent/CN110334805B/en
Publication of CN110334805A publication Critical patent/CN110334805A/en
Application granted granted Critical
Publication of CN110334805B publication Critical patent/CN110334805B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • G06T9/002Image coding using neural networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/625Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Discrete Mathematics (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Compression Of Band Width Or Redundancy In Fax (AREA)

Abstract

The invention discloses a kind of based on the JPEG domain image latent writing method for generating confrontation network, generate that carrier image DCT coefficient matrix is corresponding distorts probability matrix by generating network, module, which is embedded in, using analog encoding and can transmit gradient JPEG conversion module generates the corresponding close image of load according to probability matrix is distorted, by differentiating that network distinguishes carrier image with close image is carried, using error in classification as loss function to generating network and differentiating that network carries out dual training, the generation network model that can generate adaptive steganography cost value is finally obtained.Through the model in conjunction with conventional information coding module, secret information is embedded into carrier image and obtains carrying close image.Have design simple compared to traditional JPEG domain image latent writing method, it is easy to accomplish, the features such as anti-detection property is strong.The invention also discloses a kind of JPEG domain image latent writing systems, including based on the obtained generation network module of JPEG domain image latent writing method for generating confrontation network, information coding module and JPEG conversion module.

Description

A kind of JPEG domain image latent writing method and system based on generation confrontation network
Technical field
The present invention relates to image latent writing fields, more particularly, to a kind of based on the JPEG domain image for generating confrontation network Steganography method.
Background technique
Information hiding is that the secret information that will need to encrypt is embedded into generation load ciphertext in bearer documents by certain algorithms Part, and transmitted by open channel, recipient carries out the secret information carried in ciphertext part by corresponding extraction means It extracts, and attacker can not obtain secret information from carrying in ciphertext part.The Information hiding of image is mainly by the part number of image It is replaced or modifies according to such as pixel value etc., secret information is embedded under the premise of not influencing image visual effect and carries close figure As in, the visual redundancy of human eye is mainly utilized in the Information hiding of image.Since digital picture has information capacity big, distort easily In realization, and the features such as quantity and many kinds of format, therefore digital picture is a big main carriers of Information hiding.Steganography is calculated Method is the reversible hiding main implementation of image information, with the continuous development of network and multimedia technology, image conduct Common information media on network, the steganography and steganalysis of image, which also gradually receive, to be widely applied.
The steganography method of image is broadly divided into the steganography of airspace and domain of variation, root according to the classification of modification image data at present It is divided into the steganography of picture material adaptivity and non adaptive again according to the mode that secret information is embedded in.It is corresponding with image latent writing It is the steganalysis of image, for judging whether image is embedded with secret information, steganalysis can be used as steganographic algorithm safety A kind of evaluation method of property.In general the steganographic algorithm with adaptivity all has relatively high safety.With depth Application of the degree study in image latent writing analysis, steganalysis performance is greatly improved, while the peace of image latent writing method Full property is challenged.
Image latent writing algorithm on JPEG domain is first by being transformed into JPEG domain for the pixel value on airspace, by image DCT coefficient is distorted to be embedded in secret information, in order to enable insertion behavior reduces the change of statistical nature as far as possible, steganography is calculated Method uses the embedding grammar with adaptivity.In order to reduce visual change, generally embed of information into after modification to figure As visual effect influences in lesser exchange summation about non-zero DCT coefficients.Conventional method realizes information by setting additivity distortion function The adaptivity of insertion, but this method height relies on the experience and priori knowledge of designer, and can not be according to steganalysis net Change make adjustment on strategy in time, therefore its safety still has a certain upgrade space.It does not appear at present The variation according to steganalysis network of JPEG domain adjusts the steganography cost function self-learning algorithm of itself strategy in time.
Summary of the invention
The present invention provides a kind of JPEG domain image latent writing method and system based on generation confrontation network, using deep learning In generation confrontation network carry out JPEG domain on steganography.
In order to solve the above technical problems, technical scheme is as follows:
A kind of JPEG domain image latent writing method based on generation confrontation network, which is characterized in that the generation fights net Network includes generating network, analog encoding insertion module and differentiating network.Its training process the following steps are included:
S1: it by carrier image by the way that gradient JPEG conversion module can be transmitted, obtains in the corresponding DCT domain of the carrier image Coefficient matrix;
S2: the corresponding DCT coefficient matrix of the carrier image is input in the generation network, is generated by generating network Corresponding and carrier image is of the same size to distort probability matrix, and the numerical value of described each position for distorting probability matrix represents should The probability that the corresponding location of pixels DCT coefficient in position is tampered with;
S3: distort probability matrix and the random noise matrix of generation are embedded in module progress analog encoding by analog encoding It obtaining and carrier image is of the same size distorts matrix, the random noise matrix and the probability matrix of distorting are in the same size, The value for distorting element in matrix is ± 1 and 0, and random noise matrix is for simulating random secret information;Matrix will be distorted and carried Matrix in the corresponding DCT domain of body image is added, and obtains the close image of load corresponding with carrier image DCT coefficient matrix in DCT domain DCT coefficient matrix;
S4: the DCT coefficient matrix of the close image of load in DCT domain is converted to by that can transmit the JPEG conversion module of gradient The close image of load on airspace;
S5: being input to differentiation network for the S4 carrier image for obtaining carrying close image and S1, by differentiating network to carrier figure As classifying with the close image of load, the error in classification for differentiating that network generates is fed back to as loss function, and by loss function Differentiate network and generates network and carry out dual training;
S6: after training, by trained generation network and traditional information coding module and JPEG conversion module It combines, secret information is embedded into carrier image in an adaptive way according to the insertion cost value that network generates is generated The close image of load for being used for secret communication is generated in DCT coefficient, the insertion cost value is to distort probability conversion gained.
Preferably, described based on the JPEG domain image latent writing method for generating confrontation network, which is characterized in that described to pass Passing gradient JPEG conversion module includes image real time transfer and matrixing, and wherein image real time transfer includes Tensor data Batch separation, the piecemeal processing of single batch, the merging of piecemeal and the merging of batch;Gradient JPEG transformation can be transmitted Matrixing in module include 2-D discrete cosine matrixing, anti-two-dimension discrete cosine transform and corresponding quantization with it is anti- Quantification treatment, wherein inverse quantization does not use floor operation to ensure that gradient is effectively transmitted.
Preferably, the generation network in the step S2 is a full convolutional neural networks in parallel or a U-shaped structure Convolutional neural networks, wherein full convolutional neural networks in parallel are divided into four branches, each branch includes three convolutional layers, four The convolution kernel size of a branch is respectively 2,3,4,5, each convolutional layer includes 50 convolution kernels, is all made of band leakage rectification letter Number (Leak ReLU) is used as activation primitive.
Preferably, the convolutional neural networks that network is a U-shaped structure of generating in the step S2, including 16 groups of subnets Network structure, first 8 groups are convolutional layer group, each convolutional layer group includes convolutional layer batch, normalization layer and rectifies function with leakage, The size of characteristics of image figure is reduced with the increase of the network number of plies;8 groups are warp lamination group afterwards, comprising warp lamination, criticize and return One changes layer and rectifies function with leakage, and the size of characteristics of image figure becomes larger with the increase of the network number of plies, and first 8 layers and rear 8 Characteristic pattern between the corresponding image network layer of layer is all attached in a manner of series connection (concatenate).
Preferably, analog encoding insertion module is made of optimum code fitting function in step S3, and wherein optimum code is quasi- Closing the optimum code mode that function is fitted may be expressed as:
In above formula, pijThe each DCT coefficient for making a living into network output corresponding distorts probability, nijFor random noise matrix, mijTo distort matrix;Optimum code fitting function is characterized in that keeping gradient propagable while can be fitted above-mentioned optimal Coding mode;The wherein expression formula of optimum code fitting function are as follows:
mij=-k × fs(λ×(pij-2×nij))+k×fs(λ×(pij-2×(1-nij)))+c
Wherein λ is that its value of zoom factor is bigger, and the fitting effect of optimum code fitting function is better, and gradient is propagated More unfavorable, zoom factor λ value is smaller, is more conducive to the propagation of gradient, but fitting effect can be deteriorated, fsIndicate a Class Activation letter Number, such as: Tanh, Sigmoid, ReLU, k are weight coefficient, and c is a constant biasing.
Preferably, differentiation network described in step S5 is the steganalysis convolutional neural networks based on DenseNet, step Differentiation network described in S5 is the steganalysis convolutional neural networks based on DenseNet, including 1 pretreatment layer and 7 Dense convolutional layer group, wherein pretreatment layer includes the strong letter that 16 different types of high-pass filters are used to inhibit picture material Number, the weak signal of enhancing steganography insertion modification, each dense convolutional layer group includes 4 convolutional layers and 1 pond layer, convolutional layer All it is connected with its each convolutional layer for being located at front in the same dense convolutional layer group, the reuse of characteristic pattern is realized, using linear Function is rectified as activation primitive, final class probability is obtained using full articulamentum and softmax function and is exported.
It is reversely passed with the loss function that network is obtained using error in classification is differentiated using gradient preferably for network is generated The training for carrying out parameter is broadcast, every primary parameter for differentiating network of update then updates the parameter for generating network twice, wherein for more The loss function of newly-generated network also includes to be embedded in load capacity and targeted loads amount by distorting the fitting that probabilistic information entropy obtains Between error generate loss function.
Preferably, the iteration update times are greater than 120,000 time.
Preferably, the probabilistic information entropy calculation formula is as follows:
In above formula, H is probabilistic information entropy, and h is the height of image, the width that w is image,Indicate the DCT system for being located at (i, j) Number carries out+1 probability value distorted,Indicate that the DCT coefficient of position (i, j) carries out -1 probability value distorted,Indicate position The DCT coefficient of (i, j) is without the probability value distorted.
Preferably, the loss function for differentiating network is the cross entropy of error in classification, specific formula for calculation are as follows:
In above formula, yiIt indicates to differentiate the probability that network divides the image into the i-th class, yi' indicate the actual class label of image.
Preferably, the loss function of network is generated by the loss function of differentiation network and the loss of fitting insertion load capacity Function collectively constitutes, specific formula are as follows:
lG=α ×-lD+β×lp
Wherein lp=(H- γ × q)2For the loss function of fitting insertion load capacity, γ is non-zero in carrier image DCT coefficient The quantity of ac coefficient, q are the target insertion load capacity of setting.α and β is the weight coefficient for adjusting two loss functions, It is characterized in that, the selection of α and β setting value needs to weigh the fitting precision of steganography safety and insertion rate.
Preferably, the corresponding insertion cost value ρ of each DCT coefficient that network generates is generatedI, j, to distort Probability pI, jConversion Gained, specific conversion formula are as follows:
A kind of JPEG domain image latent writing system, which is characterized in that including hidden based on the JPEG domain image for generating confrontation network The generation network module that write method obtains, information coding module, JPEG conversion module, the specific steps are as follows:
The airspace carrier image of input is converted to DCT coefficient matrix using JPEG conversion module, then passes through the generation Network module generates distorting probability matrix and being converted to insertion cost value for corresponding DCT coefficient matrix, according to insertion cost value with Practical secret information distorts matrix using information coding module generation size identical as image, by the matrix and initial carrier figure As corresponding DCT matrix phase adduction is input to the close image of load that the generation of JPEG conversion module is used for practical secret communication.Wherein use The confrontation trained generation group of networks of network training module is generated by passing through in the generation network module of jpeg image steganographic system At.
Compared with prior art, the beneficial effect of technical solution of the present invention is:
1) present invention does not need a large amount of steganography using based on the JPEG domain image latent writing method fighting network and obtaining is generated The experience and priori knowledge in field.Final steganography model is shown that design is relatively easy by neural network after training, is easy to It realizes.
2) realize can disease gradient JPEG transformation, to image carry out frequency domain conversion while, do not influence to lose Backpropagation of the function in neural network.Have many advantages, such as precision it is high, it is high-efficient, do not need pre-training.
3) it is realized under the premise of guaranteeing not influencing the transmitting of neural network gradient to most by optimum code fitting function The fitting of excellent coding has been obviously improved the safety of steganographic algorithm.
4) proposed by the present invention based on the JPEG domain image latent writing method for generating confrontation network, core concept is made a living networking Game training between network and differentiation network, by the confrontation between two networks, effectively improves the adaptivity of steganographic algorithm With safety.
Detailed description of the invention
Fig. 1 is flowage structure figure of the invention;
Fig. 2 is the flow chart based on dual training in the JPEG domain image latent writing method for generating confrontation network;
Fig. 3 is that can transmit gradient JPEG conversion module structure chart in the present invention;
Fig. 4 is the full convolutional network model structure of four branch circuit parallel connections;
Fig. 5 is U-shaped structure Artificial Neural Network Structures figure;
Fig. 6 is double tangent optimum code fitting functions and actual optimum coding function effect contrast figure;
Fig. 7 is the steganalysis neural network structure figure based on DenseNet;
Specific embodiment
The attached figures are only used for illustrative purposes and cannot be understood as limitating the patent;
In order to better illustrate this embodiment, the certain components of attached drawing have omission, zoom in or out, and do not represent actual product Size;
To those skilled in the art, it is to be understood that certain known features and its explanation, which may be omitted, in attached drawing 's.
The following further describes the technical solution of the present invention with reference to the accompanying drawings and examples.
Embodiment 1
The present embodiment provides a kind of based on the JPEG domain image latent writing method for generating confrontation network, wherein generating confrontation network Trained detailed process is as shown in Figure 2, comprising the following steps:
S1: initial carrier image, which is input to, can transmit gradient JPEG conversion module, obtain individual load using slice function Body image carries out every carrier image the piecemeal of 8*8, by carrying out square to each matrix in block form and dct transform matrix Battle array variation operation, obtains the corresponding DCT matrix of spatial domain picture, then by the amount of DCT coefficient matrix and corresponding compression quality factor Q F Change the matrix DCT coefficient matrix after being quantified of being divided by finally obtain image by the splicing of piecemeal and correspond on JPEG domain DCT coefficient matrix.The specific implementation proposed by the present invention for transmitting gradient JPEG conversion module is as shown in Fig. 3.
S2: the DCT coefficient matrix of image being input to and is generated in network, by obtaining and carrier figure after generating network processes Probability matrix P is distorted as size is consistent, probability matrix is distorted for substituting in traditional steganographic algorithm, is got over wherein distorting probability Big point will be distorted preferentially.Generation network is a full convolutional neural networks in parallel, as shown in figure 4, it is divided into four branches, Each branch includes three convolutional layers, and the convolution kernel size of four branches is respectively 2,3,4,5, each convolutional layer includes 50 Convolution kernel is all made of band leakage rectification function as activation primitive.
S3: the random noise matrix (simulation secret information) for distorting probability matrix and identical size that step S2 is obtained It is input to analog encoding insertion module and generates DCT coefficient and distort matrix, carrier image matrix and step S1 will be distorted obtained DCT coefficient matrix be added to obtain the DCT coefficient matrix for carrying close image.
Wherein (double tangents are quasi- for the optimum code fitting function one of which specific implementation formula in analog encoding insertion module Close function) are as follows:
Wherein activation primitive fsAdopt tangent (tanh) function.In above formula, pijThe pixel for making a living into network output corresponding is usurped Change probability, nijFor random noise matrix, λ is the zoom factor of function, mijTo distort matrix;Zoom factor λ value is bigger, The effect for being fitted optimal embedding function is better, and it is more unfavorable that gradient is propagated, and zoom factor λ value is smaller, is more conducive to gradient Propagation, but fitting effect can be deteriorated.
When the zooming parameter λ value for being experimentally confirmed double tangent fitting functions is 100, before not influencing gradient transmitting It puts, can achieve preferable fitting effect, therefore testing λ value is 100.Attached drawing 6 illustrates double tangents proposed by the present invention The encoding efficiency of fitting function coding module (λ=100) and actual step function compares.
S4: the DCT coefficient matrix for carrying close image is converted to spatial domain picture by the JPEG conversion module by that can transmit gradient, Finally obtain the close image of load on airspace.
S5: the carrier image on airspace is input to differentiation network (i.e. steganalysis network, specific structure with close image is carried Corresponding tag along sort is obtained as shown in Fig. 7), by calculating error in classification:
Corresponding loss function is obtained, l is minimized by back-propagation algorithmsTo train differentiation network, maximization lsTraining Network is generated, while passing through the probabilistic information entropy of fitting insertion load capacity:
Obtain the loss function l of fitting insertion load capacityp=(H- γ × q)2, utilize loss function:
lG=α ×-lD+β×lp
Come train generate network make the insertion load capacity of steganographic algorithm meet setting value, wherein H be probabilistic information entropy, h Height, w for image are the width of image,Indicate that the DCT coefficient positioned at (i, j) carries out+1 probability value distorted,Indicate position The DCT coefficient for setting (i, j) carries out -1 probability value distorted,Indicate the DCT coefficient of position (i, j) without the probability distorted Value, γ are the quantity of non-zero ac coefficient in carrier image DCT coefficient, and q is the target insertion load capacity of setting.Weight coefficient α =1, β=10-7
Wherein differentiate that network uses the steganalysis network based on DenseNet of current better performances, specific structure is such as Shown in attached drawing 7, including 1 pretreatment layer and 7 convolutional layer groups, connected in a manner of intensive (dense) between characteristic pattern It connects, wherein pretreatment layer includes that 16 different types of high-pass filters are used for feature extraction, and each dense convolutional layer group includes 4 convolutional layers and 1 pond layer, convolutional layer are all located at each convolutional layer phase of front in the same dense convolutional layer group with it Even, the reuse of characteristic pattern is realized, using the linear unit function of amendment as activation primitive, using full articulamentum and softmax letter Number obtains final class probability output.
The opposite generation network of convergence rate due to differentiating network is very fast, and every iteration updates the primary ginseng for differentiating network Number, it is corresponding to update the parameter for generating network twice.Update is iterated to network parameter using Adam optimizer, batch having a size of 12, the number of iterations is greater than 120,000 time.
After training, by the good generation network of 120,000 time or more repetitive exercise and grid coding will be used The information coding module and JPEG conversion module of (Syndrometrelliscode, STC) combine, by secret information with certainly The mode of adaptation is embedded into the close image of load for generating in the DCT coefficient of carrier image and being used for secret communication.
Embodiment 2
The present embodiment provides a kind of based on the JPEG domain image latent writing method for generating confrontation network, wherein generating confrontation network Trained detailed process is as shown in Figure 2, comprising the following steps:
S1: initial carrier image, which is input to, can transmit gradient JPEG conversion module, obtain individual load using slice function Body image carries out the division of 8*8 block for every carrier image, by carrying out square to each matrix in block form and dct transform matrix Battle array variation operation, obtains the corresponding DCT coefficient matrix of spatial domain picture, then by DCT coefficient matrix and corresponding compression quality factor Q F The quantization matrix DCT coefficient matrix after being quantified of being divided by finally obtain image by the splicing of piecemeal and correspond to JPEG The DCT coefficient matrix with size identical as carrier on domain.The tool proposed by the present invention for transmitting gradient JPEG conversion module Body is realized as shown in Fig. 3.
S2: the DCT coefficient matrix of image being input to and is generated in network, by obtaining and carrier figure after generating network processes Probability matrix P is distorted as size is consistent, probability matrix is distorted for substituting in traditional steganographic algorithm, is got over wherein distorting probability Big point will be distorted preferentially.It generates network and uses U-shaped structure neural network shown in fig. 5, including 16 groups of sub-network structures, it is preceding 8 groups are convolutional layer group, each convolutional layer group includes convolutional layer batch, normalization layer and rectifies function, characteristics of image with leakage The size of figure is reduced with the increase of the network number of plies;Afterwards 8 groups be warp lamination group, comprising warp lamination, batch normalization layer with And function is rectified with leakage, the size of characteristics of image figure becomes larger with the increase of the network number of plies, and first 8 layers are corresponding with latter 8 layers Characteristic pattern between image network layer is all attached in a manner of series connection (concatenate).
S3: the random noise matrix (simulation secret information) for distorting probability matrix and identical size that step S2 is obtained It is input to analog encoding insertion module, generates and distorts matrix on Image DCT coefficient, the load that matrix will be distorted and step S1 is obtained The DCT coefficient matrix of body image is added to obtain the DCT coefficient matrix for carrying close image.
A kind of wherein specific implementation formula (double S type growths of the optimum code fitting function in analog encoding insertion module Iunction for curve) are as follows:
mij=-sigmoid (λ × (pij-2×nij))+sigmoid(λ×(pij-2×(1-nij))) wherein activation primitive fs Using S sigmoid growth curve (Sigmoid) function.In above formula, pijThe pixel for making a living into network output corresponding distorts probability, nij For random noise matrix, λ is the zoom factor of function, mijTo distort matrix;Zoom factor λ value is bigger, is fitted optimal embedding The effect for entering function is better, but more unfavorable for gradient propagation, and zoom factor λ value is smaller, is more conducive to the propagation of gradient, But fitting effect can be deteriorated.Wherein λ value is 100.
S4: the DCT coefficient matrix of the close image of carrier/load is converted to airspace by the JPEG conversion module by that can transmit gradient Image finally obtains the close image of carrier/load on airspace.
S5: the carrier image on airspace is input to differentiation network (i.e. steganalysis network, specific structure with close image is carried Corresponding tag along sort is obtained as shown in Fig. 7), by calculating error in classification:
Corresponding loss function is obtained, l is minimized by back-propagation algorithmsTo train differentiation network, maximization lsTraining Network is generated, while passing through the probabilistic information entropy of fitting insertion load capacity:
Obtain the loss function l of fitting insertion load capacityp=(H- γ × q)2, utilize loss function:
lG=α ×-lD+β×lp
It generates network to train the insertion load capacity of steganographic algorithm is made to meet setting value, in above formula, H is probabilistic information Entropy, h are the height of image, the width that w is image,Indicate that the DCT coefficient positioned at (i, j) carries out+1 probability value distorted,Table Show that the DCT coefficient of position (i, j) carries out -1 probability value distorted,Indicate the DCT coefficient of position (i, j) without distorting Probability value, γ are the quantity of non-zero ac coefficient in carrier image DCT coefficient, and q is the target insertion load capacity of setting.Weight system Number α=1, β=10-7
Wherein differentiate that network uses the steganalysis network based on DenseNet of current better performances, specific structure is such as Shown in attached drawing 7, including 1 pretreatment layer and 7 dense convolutional layer groups, wherein pretreatment layer includes 16 different types of High-pass filter expands insertion weak signal, each dense convolutional layer group includes 4 convolutional layers and 1 for inhibiting picture material Pond layer, convolutional layer are all connected with its each convolutional layer for being located at front in the same dense convolutional layer group, realize characteristic pattern It reuses, using linear unit function is corrected as activation primitive, final classification is obtained using full articulamentum and softmax function Probability output.
The opposite generation network of convergence rate due to differentiating network is very fast, and every iteration updates the primary ginseng for differentiating network Number, it is corresponding to update the parameter for generating network twice.Update is iterated to network parameter using exchange Adam optimizer, batch size It is 12, the number of iterations is greater than 120,000 time.
S6 training after, by trained generations network with use grid coding (Syndrometrelliscode, STC information coding module and JPEG conversion module) combines, and secret information is embedded into carrier figure in an adaptive way The close image of load for being used for secret communication is generated in the DCT coefficient of picture.
Embodiment 3
The present embodiment provides a kind of to fight net based on the jpeg image steganographic system for generating confrontation network, including based on generating The generation network module that the JPEG domain image latent writing method of network obtains, information coding module, JPEG conversion module are schemed as shown in figure 1 As shown in steganographic system, its step are as follows:
S1: the carrier image of input is converted into DCT coefficient matrix by JPEG conversion module.
S2: the DCT coefficient matrix of carrier image is input to and generates network module and obtains distorting probability matrix and be converted to Corresponding insertion cost value.Wherein generating and generating the parameter of network in network module is by generating confrontation network training module instruction Parameter after white silk.
S3: by the information coding module using grid coding (Syndrometrelliscode, STC) according to insertion cost What value and practical secret information generated size identical as image distorts matrix.
S4: matrix will be distorted and be added to obtain the DCT coefficient matrix for carrying close image with the DCT coefficient matrix of carrier image.
S5: the close image of the load on airspace is obtained using JPEG conversion module.
The same or similar label correspond to the same or similar components;
The terms describing the positional relationship in the drawings are only for illustration, should not be understood as the limitation to this patent;
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this Made any modifications, equivalent replacements, and improvements etc., should be included in the claims in the present invention within the spirit and principle of invention Protection scope within.

Claims (10)

1. a kind of based on the JPEG domain image latent writing method for generating confrontation network, which is characterized in that the generation fights network Including generating network, analog encoding insertion module and differentiating network, comprising the following steps:
S1: by carrier image by the way that gradient JPEG conversion module can be transmitted, the coefficient in the corresponding DCT domain of the carrier image is obtained Matrix;
S2: the corresponding DCT coefficient matrix of the carrier image is input in the generation network, generates correspondence by generating network With carrier image is of the same size distorts probability matrix, the numerical value of described each position for distorting probability matrix represents the position The probability that corresponding location of pixels DCT coefficient is tampered with;
S3: the probability matrix of distorting of generation is obtained with random noise matrix by analog encoding insertion module progress analog encoding With carrier image is of the same size distorts matrix, the random noise matrix and the probability matrix of distorting are in the same size, distort The value of element is ± 1 and 0 in matrix, and random noise matrix is for simulating random secret information;Matrix and carrier figure will be distorted As the matrix addition in corresponding DCT domain, the DCT that carries close image corresponding with carrier image DCT coefficient matrix in DCT domain is obtained Coefficient matrix;
S4: the DCT coefficient matrix of the close image of load in DCT domain is converted into airspace by that can transmit the JPEG conversion module of gradient On the close image of load;
S5: being input to differentiation network for the S4 carrier image for obtaining carrying close image and S1, by differentiate network to carrier image with It carries close image to classify, the error in classification for differentiating that network generates is fed back into differentiation as loss function, and by loss function Network and generation network simultaneously carry out dual training;
S6: after training, trained generation network is mutually tied with traditional information coding module and JPEG conversion module It closes, secret information is embedded into the DCT system of carrier image by the insertion cost value generated according to generation network in an adaptive way The close image of load for being used for secret communication is generated in number, the insertion cost value is to distort probability conversion gained, specific conversion formula Are as follows:
2. according to claim 1 based on the JPEG domain image latent writing method for generating confrontation network, which is characterized in that described It includes image real time transfer and matrixing that gradient JPEG conversion module, which can be transmitted, and wherein image real time transfer includes Tensor The batch of data is separated, the piecemeal processing of single batch, the merging of piecemeal and the merging of batch;Gradient JPEG can be transmitted Matrixing in conversion module includes 2-D discrete cosine matrixing, anti-two-dimension discrete cosine transform and corresponding quantization With inverse quantization processing, wherein inverse quantization does not use floor operation to ensure that gradient is effectively transmitted.
3. according to claim 1 based on the JPEG domain image latent writing method for generating confrontation network, which is characterized in that described The convolutional neural networks that network is a full convolutional neural networks or a U-shaped structure in parallel of generating in step S2, wherein Full convolutional neural networks in parallel are divided into four branches, and each branch includes three convolutional layers, the convolution kernel size of four branches Respectively 2,3,4,5, each convolutional layer include 50 convolution kernels, are all made of band leakage rectification function (Leak ReLU) conduct Activation primitive;Totally 16 groups of the convolutional neural networks of U-shaped structure, first 8 groups are convolutional layer group, each convolutional layer group includes convolutional layer It criticizes, normalize layer and rectify function with leakage, the size of characteristics of image figure is reduced with the increase of the network number of plies;8 groups afterwards For warp lamination group, function is rectified comprising warp lamination, batch normalization layer and with leakage, the size of characteristics of image figure is with net The increase of network layers number and become larger, the characteristic pattern between first 8 layers image network layer corresponding with latter 8 layers all with series connection (concatenate) mode is attached.
4. based on the JPEG domain image latent writing method for generating confrontation network according to claim 1, which is characterized in that step Analog encoding insertion module is made of optimum code fitting function in S3, the optimal volume that wherein optimum code fitting function is fitted Code mode may be expressed as:
In above formula, pijThe each DCT coefficient for making a living into network output corresponding distorts probability, nijFor random noise matrix, mijFor Distort matrix;Optimum code fitting function is characterized in that keeping gradient propagable while can be fitted above-mentioned optimum code Mode;The wherein expression formula of optimum code fitting function are as follows:
mij=-k × fs(λ×(pij-2×nij))+k×fs(λ×(pij-2×(1-nij)))+c
Wherein λ is that its value of zoom factor is bigger, and the fitting effect of optimum code fitting function is better, and gradient is propagated more not Benefit, zoom factor λ value is smaller, is more conducive to the propagation of gradient, but fitting effect can be deteriorated, fsIndicate a kind of activation primitive, Such as: Tanh, Sigmoid, ReLU, k are weight coefficient, and c is a constant biasing.
5. according to claim 1 based on the JPEG domain image latent writing method for generating confrontation network, it is characterised in that: step Differentiation network described in S5 is the steganalysis convolutional neural networks based on DenseNet, including 1 pretreatment layer and 7 Dense convolutional layer group, wherein pretreatment layer includes the strong letter that 16 different types of high-pass filters are used to inhibit picture material Number, the weak signal of enhancing steganography insertion modification, each dense convolutional layer group includes 4 convolutional layers and 1 pond layer, convolutional layer All it is connected with its each convolutional layer for being located at front in the same dense convolutional layer group, the reuse of characteristic pattern is realized, using linear Function is rectified as activation primitive, final class probability is obtained using full articulamentum and softmax function and is exported.
6. according to claim 1 based on the JPEG domain image latent writing method for generating confrontation network, which is characterized in that for It generates network and differentiates the training that network uses gradient backpropagation to carry out parameter using the loss function that error in classification obtains, often It updates the primary parameter for differentiating network and then updates the parameter for generating network twice, wherein being used for the loss function of more newly-generated network Also comprising by distorting the loss letter that error generates between the obtained fitting insertion load capacity of probabilistic information entropy and targeted loads amount Number.
7. according to claim 6 based on the JPEG domain image latent writing method for generating confrontation network, which is characterized in that described Iteration update times are greater than 120,000 times.
8. according to claim 6 based on the JPEG domain image latent writing method for generating confrontation network, which is characterized in that described Probabilistic information entropy calculation formula it is as follows:
In above formula, H is probabilistic information entropy, and h is the height of image, the width that w is image,Indicate positioned at (i, j) DCT coefficient into The probability value that row+1 is distorted,Indicate that the DCT coefficient of position (i, j) carries out -1 probability value distorted,It indicates position (i, j) DCT coefficient without the probability value distorted.
9. described in any item based on the JPEG domain image latent writing method for generating confrontation network, feature according to claim 6 to 8 It is, the loss function for differentiating network is the cross entropy of error in classification, specific formula for calculation are as follows:
In above formula, yiIt indicates to differentiate the probability that network divides the image into the i-th class, yi' indicate the actual class label of image;
The loss function for generating network is embedded in common group of loss function of load capacity by the loss function and fitting of differentiation network At specific formula are as follows:
lG=α ×-lD+β×lp
Wherein lp=(H- γ × q)2For the loss function of fitting insertion load capacity, γ is non-zero exchange in carrier image DCT coefficient The quantity of coefficient, q are the target insertion load capacity of setting, and α and β are the weight coefficient for adjusting two loss functions, special Sign is that the selection of α and β setting value needs to weigh the fitting precision of steganography safety and insertion rate.
10. a kind of based on the jpeg image steganographic system for generating confrontation network, which is characterized in that including based on generation confrontation network JPEG domain image latent writing method obtained generation network module, information coding module and JPEG conversion module, specific steps are such as Under:
The airspace carrier image of input is converted to DCT coefficient matrix using JPEG conversion module, then passes through the generation network Module generates distorting probability matrix and being converted to insertion cost value for corresponding DCT coefficient matrix, according to insertion cost value and reality Secret information distorts matrix using information coding module generation size identical as image, by the matrix and initial carrier image pair The DCT matrix phase adduction answered is input to JPEG conversion module and generates the close image of load for being used for practical secret communication.
CN201910368809.2A 2019-05-05 2019-05-05 JPEG domain image steganography method and system based on generation countermeasure network Expired - Fee Related CN110334805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910368809.2A CN110334805B (en) 2019-05-05 2019-05-05 JPEG domain image steganography method and system based on generation countermeasure network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910368809.2A CN110334805B (en) 2019-05-05 2019-05-05 JPEG domain image steganography method and system based on generation countermeasure network

Publications (2)

Publication Number Publication Date
CN110334805A true CN110334805A (en) 2019-10-15
CN110334805B CN110334805B (en) 2022-10-25

Family

ID=68139373

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910368809.2A Expired - Fee Related CN110334805B (en) 2019-05-05 2019-05-05 JPEG domain image steganography method and system based on generation countermeasure network

Country Status (1)

Country Link
CN (1) CN110334805B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110852316A (en) * 2019-11-07 2020-02-28 中山大学 Image tampering detection and positioning method adopting convolution network with dense structure
CN110879894A (en) * 2019-11-11 2020-03-13 陕西师范大学 Image encryption and decryption method based on lazy scale transformation and random layered fusion
CN111222583A (en) * 2020-01-15 2020-06-02 北京中科研究院 Image steganalysis method based on confrontation training and key path extraction
CN111263165A (en) * 2019-12-27 2020-06-09 郑州师范学院 Embedding method and extracting method of HEVC video steganography information
CN111327785A (en) * 2020-01-15 2020-06-23 郑州埃文计算机科技有限公司 Information steganography communication method based on automatic image construction of countermeasure generation network
CN111681154A (en) * 2020-06-09 2020-09-18 湖南大学 Color image steganography distortion function design method based on generation countermeasure network
CN111768326A (en) * 2020-04-03 2020-10-13 南京信息工程大学 High-capacity data protection method based on GAN amplification image foreground object
CN111882476A (en) * 2020-07-17 2020-11-03 广州大学 Image steganography method for automatically learning embedded cost based on deep reinforcement learning
CN112199693A (en) * 2020-09-30 2021-01-08 东南数字经济发展研究院 Steganography method based on cartoon image
CN112468677A (en) * 2020-11-27 2021-03-09 中国农业银行股份有限公司 Data encryption and decryption method and device and electronic equipment
CN112634118A (en) * 2020-12-24 2021-04-09 中国科学技术大学 Batch-resistant steganography method
CN112767226A (en) * 2021-01-15 2021-05-07 南京信息工程大学 Image steganography method and system based on GAN network structure automatic learning distortion
CN113077377A (en) * 2021-05-13 2021-07-06 海南大学 Color image steganography method based on generation countermeasure network
CN113076549A (en) * 2021-04-08 2021-07-06 上海电力大学 Confrontation network image steganography method based on novel U-Net structure generator
CN114051082A (en) * 2021-10-19 2022-02-15 河南师范大学 Steganography detection feature selection method and device based on distortion degree and information gain ratio
CN114900586A (en) * 2022-04-28 2022-08-12 中国人民武装警察部队工程大学 Information steganography method and device based on DCGAN
CN117939027A (en) * 2024-03-21 2024-04-26 南京信息工程大学 JPEG image steganography method and system based on DCT feature extraction

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080175429A1 (en) * 2007-01-19 2008-07-24 New Jersey Institute Of Technology Method and apparatus for steganalysis for texture images
US20080193031A1 (en) * 2007-02-09 2008-08-14 New Jersey Institute Of Technology Method and apparatus for a natural image model based approach to image/splicing/tampering detection
US20130208941A1 (en) * 2012-02-01 2013-08-15 Qingzhong Liu Steganalysis with neighboring joint density
CN103914839A (en) * 2014-03-27 2014-07-09 中山大学 Image stitching and tampering detection method and device based on steganalysis
CN106097240A (en) * 2016-06-13 2016-11-09 天津大学 A kind of color image-adaptive steganography method
CN106530200A (en) * 2016-10-23 2017-03-22 深圳大学 Deep-learning-model-based steganography image detection method and system
CN106791872A (en) * 2016-11-18 2017-05-31 南京邮电大学 Information concealing method based on SVD
CN106920206A (en) * 2017-03-16 2017-07-04 广州大学 A kind of steganalysis method based on confrontation neutral net
CN107563155A (en) * 2017-08-08 2018-01-09 中国科学院信息工程研究所 A kind of safe steganography method and device based on generation confrontation network
CN107908969A (en) * 2017-11-21 2018-04-13 中山大学 A kind of adaptive steganography method of jpeg image based on Spatial characteristic
CN107945204A (en) * 2017-10-27 2018-04-20 西安电子科技大学 A kind of Pixel-level portrait based on generation confrontation network scratches drawing method
CN108024028A (en) * 2017-12-12 2018-05-11 中国人民解放军战略支援部队信息工程大学 Jpeg image robust steganography method based on serial concatenation of codes and DCT coefficient relativeness
CN108346125A (en) * 2018-03-15 2018-07-31 中山大学 A kind of spatial domain picture steganography method and system based on generation confrontation network
CN108416725A (en) * 2018-03-13 2018-08-17 中山大学 A kind of asymmetric JPEG steganography methods based on elimination blocking artifact
CN108923922A (en) * 2018-07-26 2018-11-30 北京工商大学 A kind of text steganography method based on generation confrontation network
CN108921764A (en) * 2018-03-15 2018-11-30 中山大学 A kind of image latent writing method and system based on generation confrontation network
CN108961137A (en) * 2018-07-12 2018-12-07 中山大学 A kind of image latent writing analysis method and system based on convolutional neural networks
CN109040763A (en) * 2018-08-07 2018-12-18 北京飞搜科技有限公司 A kind of method for compressing image and system based on production confrontation network
CN109214973A (en) * 2018-08-24 2019-01-15 中国科学技术大学 For the confrontation safety barrier generation method of steganalysis neural network
CN109587372A (en) * 2018-12-11 2019-04-05 北京邮电大学 A kind of invisible image latent writing art based on generation confrontation network
CN109658322A (en) * 2018-12-11 2019-04-19 宁波大学 A kind of large capacity image latent writing method and secret information extraction method

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080175429A1 (en) * 2007-01-19 2008-07-24 New Jersey Institute Of Technology Method and apparatus for steganalysis for texture images
US20080193031A1 (en) * 2007-02-09 2008-08-14 New Jersey Institute Of Technology Method and apparatus for a natural image model based approach to image/splicing/tampering detection
US20130208941A1 (en) * 2012-02-01 2013-08-15 Qingzhong Liu Steganalysis with neighboring joint density
CN103914839A (en) * 2014-03-27 2014-07-09 中山大学 Image stitching and tampering detection method and device based on steganalysis
CN106097240A (en) * 2016-06-13 2016-11-09 天津大学 A kind of color image-adaptive steganography method
CN106530200A (en) * 2016-10-23 2017-03-22 深圳大学 Deep-learning-model-based steganography image detection method and system
CN106791872A (en) * 2016-11-18 2017-05-31 南京邮电大学 Information concealing method based on SVD
CN106920206A (en) * 2017-03-16 2017-07-04 广州大学 A kind of steganalysis method based on confrontation neutral net
CN107563155A (en) * 2017-08-08 2018-01-09 中国科学院信息工程研究所 A kind of safe steganography method and device based on generation confrontation network
CN107945204A (en) * 2017-10-27 2018-04-20 西安电子科技大学 A kind of Pixel-level portrait based on generation confrontation network scratches drawing method
CN107908969A (en) * 2017-11-21 2018-04-13 中山大学 A kind of adaptive steganography method of jpeg image based on Spatial characteristic
CN108024028A (en) * 2017-12-12 2018-05-11 中国人民解放军战略支援部队信息工程大学 Jpeg image robust steganography method based on serial concatenation of codes and DCT coefficient relativeness
CN108416725A (en) * 2018-03-13 2018-08-17 中山大学 A kind of asymmetric JPEG steganography methods based on elimination blocking artifact
CN108346125A (en) * 2018-03-15 2018-07-31 中山大学 A kind of spatial domain picture steganography method and system based on generation confrontation network
CN108921764A (en) * 2018-03-15 2018-11-30 中山大学 A kind of image latent writing method and system based on generation confrontation network
CN108961137A (en) * 2018-07-12 2018-12-07 中山大学 A kind of image latent writing analysis method and system based on convolutional neural networks
CN108923922A (en) * 2018-07-26 2018-11-30 北京工商大学 A kind of text steganography method based on generation confrontation network
CN109040763A (en) * 2018-08-07 2018-12-18 北京飞搜科技有限公司 A kind of method for compressing image and system based on production confrontation network
CN109214973A (en) * 2018-08-24 2019-01-15 中国科学技术大学 For the confrontation safety barrier generation method of steganalysis neural network
CN109587372A (en) * 2018-12-11 2019-04-05 北京邮电大学 A kind of invisible image latent writing art based on generation confrontation network
CN109658322A (en) * 2018-12-11 2019-04-19 宁波大学 A kind of large capacity image latent writing method and secret information extraction method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HANQI ZI ET AL.: "Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework", 《APSIPA ANNUAL SUMMIT AND CONFERENCE 2018》 *
WEIXUAN TANG ET AL.: "Automatic Steganographic Distortion Learning Using a Generative Adversarial Network", 《IEEE SIGNAL PROCESSING LETTERS》 *

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110852316B (en) * 2019-11-07 2023-04-18 中山大学 Image tampering detection and positioning method adopting convolution network with dense structure
CN110852316A (en) * 2019-11-07 2020-02-28 中山大学 Image tampering detection and positioning method adopting convolution network with dense structure
CN110879894A (en) * 2019-11-11 2020-03-13 陕西师范大学 Image encryption and decryption method based on lazy scale transformation and random layered fusion
CN111263165A (en) * 2019-12-27 2020-06-09 郑州师范学院 Embedding method and extracting method of HEVC video steganography information
CN111263165B (en) * 2019-12-27 2022-07-01 郑州师范学院 Embedding method and extracting method of HEVC video steganography information
CN111222583A (en) * 2020-01-15 2020-06-02 北京中科研究院 Image steganalysis method based on confrontation training and key path extraction
CN111327785A (en) * 2020-01-15 2020-06-23 郑州埃文计算机科技有限公司 Information steganography communication method based on automatic image construction of countermeasure generation network
CN111327785B (en) * 2020-01-15 2022-04-15 郑州埃文计算机科技有限公司 Information steganography communication method based on automatic image construction of countermeasure generation network
CN111222583B (en) * 2020-01-15 2023-11-17 北京中科研究院 Image steganalysis method based on countermeasure training and critical path extraction
CN111768326A (en) * 2020-04-03 2020-10-13 南京信息工程大学 High-capacity data protection method based on GAN amplification image foreground object
CN111768326B (en) * 2020-04-03 2023-08-25 南京信息工程大学 High-capacity data protection method based on GAN (gas-insulated gate bipolar transistor) amplified image foreground object
CN111681154A (en) * 2020-06-09 2020-09-18 湖南大学 Color image steganography distortion function design method based on generation countermeasure network
CN111681154B (en) * 2020-06-09 2022-06-21 湖南大学 Color image steganography distortion function design method based on generation countermeasure network
CN111882476A (en) * 2020-07-17 2020-11-03 广州大学 Image steganography method for automatically learning embedded cost based on deep reinforcement learning
CN111882476B (en) * 2020-07-17 2023-07-07 广州大学 Image steganography method for automatic learning embedding cost based on deep reinforcement learning
CN112199693A (en) * 2020-09-30 2021-01-08 东南数字经济发展研究院 Steganography method based on cartoon image
CN112468677B (en) * 2020-11-27 2022-09-27 中国农业银行股份有限公司 Data encryption and decryption method and device and electronic equipment
CN112468677A (en) * 2020-11-27 2021-03-09 中国农业银行股份有限公司 Data encryption and decryption method and device and electronic equipment
CN112634118B (en) * 2020-12-24 2022-09-30 中国科学技术大学 Anti-batch steganography method
CN112634118A (en) * 2020-12-24 2021-04-09 中国科学技术大学 Batch-resistant steganography method
CN112767226B (en) * 2021-01-15 2023-09-12 南京信息工程大学 Image steganography method and system based on automatic learning distortion of GAN network structure
CN112767226A (en) * 2021-01-15 2021-05-07 南京信息工程大学 Image steganography method and system based on GAN network structure automatic learning distortion
CN113076549A (en) * 2021-04-08 2021-07-06 上海电力大学 Confrontation network image steganography method based on novel U-Net structure generator
CN113076549B (en) * 2021-04-08 2023-05-12 上海电力大学 Novel U-Net structure generator-based countermeasures network image steganography method
CN113077377A (en) * 2021-05-13 2021-07-06 海南大学 Color image steganography method based on generation countermeasure network
CN114051082B (en) * 2021-10-19 2023-10-27 河南师范大学 Steganography detection feature selection method and device based on distortion degree and information gain ratio
CN114051082A (en) * 2021-10-19 2022-02-15 河南师范大学 Steganography detection feature selection method and device based on distortion degree and information gain ratio
CN114900586A (en) * 2022-04-28 2022-08-12 中国人民武装警察部队工程大学 Information steganography method and device based on DCGAN
CN114900586B (en) * 2022-04-28 2024-04-16 中国人民武装警察部队工程大学 Information steganography method and device based on DCGAN
CN117939027A (en) * 2024-03-21 2024-04-26 南京信息工程大学 JPEG image steganography method and system based on DCT feature extraction
CN117939027B (en) * 2024-03-21 2024-06-07 南京信息工程大学 JPEG image steganography method and system based on DCT feature extraction

Also Published As

Publication number Publication date
CN110334805B (en) 2022-10-25

Similar Documents

Publication Publication Date Title
CN110334805A (en) A kind of JPEG domain image latent writing method and system based on generation confrontation network
CN112634117B (en) End-to-end JPEG domain image steganography method based on generation of countermeasure network
CN112288658B (en) Underwater image enhancement method based on multi-residual joint learning
CN111275647B (en) Underwater image restoration method based on cyclic generation countermeasure network
Kim et al. Dynamic receptive field generation for full-reference image quality assessment
CN108346125A (en) A kind of spatial domain picture steganography method and system based on generation confrontation network
CN108399362A (en) A kind of rapid pedestrian detection method and device
CN113222800A (en) Robust image watermark embedding and extracting method and system based on deep learning
CN107977932A (en) It is a kind of based on can differentiate attribute constraint generation confrontation network face image super-resolution reconstruction method
Setyaningsih et al. Survey of hybrid image compression techniques
CN109300090A (en) A kind of single image to the fog method generating network based on sub-pix and condition confrontation
CN109658322B (en) A kind of large capacity image latent writing method and secret information extraction method
CN109191389A (en) A kind of x-ray image adaptive local Enhancement Method
CN109598732B (en) Medical image segmentation method based on three-dimensional space weighting
CN111681154B (en) Color image steganography distortion function design method based on generation countermeasure network
CN112528830A (en) Lightweight CNN mask face pose classification method combined with transfer learning
CN112287973A (en) Digital image countermeasure sample defense method based on truncated singular value and pixel interpolation
CN110490265A (en) A kind of image latent writing analysis method based on two-way convolution sum Fusion Features
CN112132737B (en) Image robust steganography method without reference generation
CN110490804A (en) A method of based on the generation super resolution image for generating confrontation network
CN114339258A (en) Information steganography method and device based on video carrier
CN107578365B (en) Wavelet digital watermark embedding and extracting method based on quantum weed optimizing mechanism
CN112560901A (en) Method for defending and confronting sample based on combination of image preprocessing and confronting training
Kumari et al. Flower pollination-based K-means algorithm for medical image compression
CN109087114A (en) A kind of red wine packaging anti-counterfei waterprint intelligent measurement method for tracing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20221025