CN113298689B - Large-capacity image steganography method - Google Patents

Large-capacity image steganography method Download PDF

Info

Publication number
CN113298689B
CN113298689B CN202110693663.6A CN202110693663A CN113298689B CN 113298689 B CN113298689 B CN 113298689B CN 202110693663 A CN202110693663 A CN 202110693663A CN 113298689 B CN113298689 B CN 113298689B
Authority
CN
China
Prior art keywords
image
network
secret
layers
output
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110693663.6A
Other languages
Chinese (zh)
Other versions
CN113298689A (en
Inventor
段新涛
王文鑫
张恩
岳冬利
谢自梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Normal University
Original Assignee
Henan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Normal University filed Critical Henan Normal University
Priority to CN202110693663.6A priority Critical patent/CN113298689B/en
Publication of CN113298689A publication Critical patent/CN113298689A/en
Application granted granted Critical
Publication of CN113298689B publication Critical patent/CN113298689B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/50Image enhancement or restoration using two or more images, e.g. averaging or subtraction

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Molecular Biology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Image Processing (AREA)

Abstract

The invention belongs to the technical field of image steganography, and particularly relates to a high-capacity image steganography method. Inputting the carrier image and the two secret images into a trained image steganography model to obtain a carrier image and two extracted images; the image steganography model comprises a hiding stage and an extracting stage; the hiding stage comprises a carrier image preprocessing network, a secret image preprocessing network and a hiding network; the hidden network is used for processing the output of the cascaded carrier image preprocessing network and the output of the secret image preprocessing network to obtain a carrier image containing two secret images. The method can embed the two secret images into the carrier image to obtain the carrier secret image, so that the visual effect of the carrier secret image is consistent with that of the carrier image, the steganography capacity is obviously improved, and the imperceptibility and the anti-detection performance of the carrier secret image are maintained; moreover, the invention can also extract two extracted images, and the two extracted images and the two secret images are basically consistent in visual effect.

Description

Large-capacity image steganography method
Technical Field
The invention belongs to the technical field of image steganography, and particularly relates to a high-capacity image steganography method.
Background
With the rapid development of communication technology in recent years, information security issues accompanying communication technology have attracted attention of individuals, enterprises, governments, and related research fields. In the communication process of some individuals or organizations, the confidential information transmitted by the individuals or organizations is not desired to be intercepted by a third party or even sensed by the third party to be existed, and meanwhile, the holders are desired to protect the copyright owned by the digital media works generated in the modern network. The existing cryptography technology cannot meet the requirements well. Steganography (Steganography), which is an information hiding technique that pursues imperceptibility, embeds confidential information into the carrier while maintaining its original perceptual properties, and also hides the communication behavior itself, makes Steganography well suited to meet the above requirements. Nowadays, digital images on the internet are seen everywhere, and due to the characteristics of low acquisition difficulty and large redundancy, the digital images are very suitable to be used as carriers of Steganography, so that Image Steganography (Image Steganography) becomes a large research hotspot in the field of information hiding.
Image steganography generally has three metrics, capacity, imperceptibility, and resistance to detection. Capacity: the length of the secret information embedded in the carrier image; imperceptibility: the perception characteristic of the secret image is kept, namely the similarity of the secret image and the original carrier image in visual effect is kept; resistance to detection: that is, the method should have a certain anti-detection property for detection means such as steganalysis that may be encountered in the communication process.
The traditional image steganography is based on a cost function designed by professionals, and the embedding position of secret information in a spatial domain or a frequency domain of a carrier image is determined by calculating single-point loss and global loss through the cost function so as to ensure that the influence on the perception characteristic of the carrier image is minimum. However, the traditional steganalysis method has the defects of low capacity, poor visual effect, difficulty in resisting steganalysis and the like.
With the development of deep learning, the fields of convolutional neural network object classification, image segmentation, scene recognition and the like are fully applied, and great results are obtained. Meanwhile, an image steganography scheme taking a deep convolutional neural network as an implementation means is also rapidly developed. The steganography and the extraction of the image are realized by extracting and fusing the features of the image by utilizing a deep convolutional neural network. In the training process of the network model, by means of the constraint of a loss function, the network weight is updated through a back propagation algorithm, and a final hidden network and an extracted network are obtained after a loss value is converged, but the problem of low steganography capacity still exists.
Disclosure of Invention
The invention provides a high-capacity image steganography method which is used for solving the problem that the capacity of a steganography method in the prior art is low.
In order to solve the technical problem, the technical scheme of the invention comprises the following steps:
the invention discloses a steganography method for a large-capacity image, which comprises the following steps of:
inputting the carrier image and the two secret images into a trained image steganography model to obtain a secret-carrying image and two extracted images, wherein the secret-carrying image and the carrier image are kept consistent in visual effect, and the two extracted images are respectively kept consistent in visual effect with the two secret images;
wherein the image steganography model comprises a hiding phase and an extracting phase;
the hiding stage comprises a carrier image preprocessing network, a secret image preprocessing network and a hiding network; the carrier image preprocessing network is used for preprocessing an input carrier image; the secret image preprocessing network is used for preprocessing the two cascaded secret images; the hidden network is used for processing the output of the cascaded carrier image preprocessing network and the output of the secret image preprocessing network to obtain a carrier image containing two secret images;
the extraction phase comprises two extraction networks; the two extraction networks are used for respectively processing the input secret-carrying images to obtain corresponding extraction images.
The beneficial effects of the above technical scheme are: the image steganography model constructed by the invention can embed two secret images into the carrier image to obtain the secret carrying image, so that the visual effect of the secret carrying image is consistent with that of the carrier image, the steganography capacity is obviously improved, and the imperceptibility and the detectability resistance of the secret carrying image are kept; moreover, the invention can also extract two extracted images, and the two extracted images and the two secret images are basically consistent in visual effect.
Further, in order to extract high-frequency texture features of the carrier image to help the hiding network to embed secret information into a high-frequency texture area of the carrier to enhance the visual effect of the carrier image, the carrier image preprocessing network comprises a jump connection, and a convolution layer and a maximum pooling layer which are connected in sequence; the input of the convolution layer of the carrier image preprocessing network is a carrier image; the jump connection is used for cascading the output of the maximum pooling layer with the carrier image, and the result after cascading is the output of the carrier image preprocessing network.
Further, in order to preserve the global features of the secret image to maintain the integrity of the secret image in the feature extraction of the subsequent network, the secret image preprocessing network comprises a convolution layer and an average pooling layer which are connected in sequence, the input of the convolution layer of the secret image preprocessing network is two secret images after concatenation, and the output of the average pooling layer is the output of the secret image preprocessing network.
Further, in order to keep the secret-carrying image consistent with the carrier image in visual effect, the hidden network comprises a down-sampling module, a pyramid pooling module and an up-sampling module; the down-sampling module of the hidden network comprises four convolution layers which are sequentially connected, wherein the input of the first convolution layer in the four convolution layers is the input of the hidden network, and the output of the last convolution layer is the input of the pyramid pooling module; the up-sampling module of the hidden network comprises five convolution layers and four jump connections, wherein the four jump connections are used for cascading the outputs of the first four convolution layers in the five convolution layers with the outputs of the convolution layers with the corresponding sizes in the down-sampling module, the input of the first convolution layer is the output of the pyramid pooling module, the inputs of the last four convolution layers are the outputs of the four jump connections respectively, and the output of the last convolution layer is the output of the hidden network.
Further, in order to be suitable for image steganography, the pyramid pooling module of the hidden network comprises five pooling layers, five convolution layers and five upsampling layers; the inputs of the five pooling layers are all the outputs of the down-sampling module of the hidden network; the inputs of the five convolution layers are the outputs of the five pooling layers respectively; the inputs of the five upsampling layers are the outputs of the five convolutional layers, and the output is the output of the pyramid pooling module of the hidden network.
Furthermore, in order to keep the extracted image consistent with the secret image in visual effect, the two extraction networks have the same structure, and each extraction network comprises a down-sampling module, a pyramid pooling module and an up-sampling module; the down-sampling module of the extraction network comprises four convolution layers which are sequentially connected, wherein the input of the first convolution layer in the four convolution layers is the input of the extraction network, and the output of the last convolution layer is the input of the pyramid pooling module; the up-sampling module of the extraction network comprises five convolution layers and four jump connections, the four jump connections are used for cascading outputs of the first four convolution layers in the five convolution layers with outputs of convolution layers with corresponding sizes in the down-sampling module, the input of the first convolution layer is the output of the pyramid pooling module, the inputs of the last four convolution layers are the outputs of the four jump connections respectively, and the output of the last convolution layer is the output of the extraction network.
Further, in order to be suitable for image steganography, the pyramid pooling module of the extraction network comprises five pooling layers, five convolution layers and five upsampling layers; the inputs of the five pooling layers are all the outputs of the down-sampling module of the extraction network; the inputs of the five convolution layers are the outputs of the five pooling layers respectively; the inputs of the five upsampling layers are the outputs of the five convolutional layers, and the output is the output of the pyramid pooling module of the extraction network.
Further, in order to obtain a better trained image steganography model, in the process of training the image steganography model, the total loss function adopted is as follows:
Figure BDA0003127582090000031
therein, loss Sum Representing the total loss function, lossH i Representing the hidden loss function, lossE, of each group i Represents the extraction loss function for each group, phi is a weighting value, and n represents the total number of groups.
Further, the loss value is calculated using the mean square error as a concealment loss function.
Further, the loss value is calculated using the mean square error as an extraction loss function.
Drawings
FIG. 1 is an overall framework diagram of the image steganography model of the present invention;
FIG. 2 is an architectural diagram of the carrier image pre-processing network of the present invention;
FIG. 3 is an architecture diagram of the secret image pre-processing network of the present invention;
FIG. 4 is an architecture diagram of the pyramid pooling module of the present invention;
FIG. 5 is an architecture diagram of the hidden network of the present invention;
FIG. 6 is a block diagram of the abstraction network of the present invention;
FIG. 7 is a sample graph of the present invention for image steganography and extraction;
FIG. 8 is a graph showing the results of the assay for resistance to detection according to the present invention.
Detailed Description
According to the high-capacity image steganography method, two secret images can be embedded into a carrier image through a trained image steganography model to obtain a secret-carrying image, so that the secret-carrying image and the carrier image are consistent in visual effect, and imperceptibility and anti-detection performance of the secret-carrying image are kept; and the secret-carrying images can be extracted, two extracted images are successfully extracted from the secret-carrying images, and the two extracted images are consistent with the two secret images embedded in advance in visual effect. The method is described in detail below with reference to the accompanying drawings.
Step one, constructing an image steganography model. In this embodiment, the image steganography model is based on a deep convolutional neural network model, and the basic architecture thereof is shown in fig. 1. The image steganography model includes a hiding phase and an extraction phase.
The hiding phase comprises a carrier image preprocessing network, a secret image preprocessing network and a hiding network. In fig. 2 to 6, (D, H, W), D represents the number of channels of the tensor (also the number of convolution kernels of the convolution layer that outputs the tensor), and H and W represent the height and width of the tensor, respectively; the rectangles in the figure represent tensors, and the differently shaped arrows represent corresponding convolution, pooling, upsampling, and concatenation operations.
The carrier image preprocessing network is used for preprocessing an input carrier image, extracting a feature tensor containing high-frequency features of the carrier image, cascading the feature tensor containing the high-frequency features of the carrier image with the carrier image, and outputting a cascaded result as the carrier image preprocessing network. As shown in fig. 2, in the present embodiment, the carrier image preprocessing network includes a jump connection, and a convolution layer and a max-pooling layer connected in sequence. The maximum pooling layer can extract high-frequency texture features of the carrier image, and is beneficial to embedding secret information into a high-frequency texture area of the carrier image by a hidden network, so that the visual effect of the carrier image is enhanced. Considering that the final goal of the hiding stage is to generate a carrier image similar to the carrier image as much as possible, a jump connection is added in the carrier image preprocessing network, and the carrier image and the feature tensor output by the maximum pooling layer are cascaded to reduce the loss of the carrier image features in the subsequent feature extraction.
The secret image preprocessing network is used for preprocessing the two cascaded secret images and extracting a feature tensor containing global features of the two secret images. As shown in fig. 3, in the present embodiment, the secret image preprocessing network includes a convolution layer and an average pooling layer connected in sequence. The average pooling layer may preserve global features of the secret image, thereby preserving the integrity of the secret image in feature extraction of subsequent networks.
The hidden network is used for processing the output of the cascaded secret image preprocessing network and the output of the carrier image preprocessing network, namely: and performing feature extraction/fusion processing on the feature tensor containing the global features of the secret images and the feature tensor containing the high-frequency features of the carrier images to obtain the secret-carrying images embedded with the two secret images, wherein the secret-carrying images are consistent with the carrier images in visual effect.
As shown in fig. 5, in the present embodiment, the hidden network includes a downsampling module, a pyramid pooling module, and an upsampling module. The down-sampling module comprises four convolution layers which are sequentially connected, the input of the first convolution layer in the four convolution layers is the input of the hidden network, the output of the last convolution layer is the input of the pyramid pooling module, the size of the input tensor is halved by the continuous four convolution layers, and meanwhile, the number of channels is increased. The up-sampling module of the hidden network comprises five convolution layers and four jump connections, wherein the four jump connections are used for cascading the outputs of the first four convolution layers in the five convolution layers with the outputs of the convolution layers with the corresponding sizes in the down-sampling module, the input of the first convolution layer is the output of the pyramid pooling module, the inputs of the last four convolution layers are the outputs of the four jump connections respectively, and the output of the last convolution layer is the output of the hidden network. The functions are as follows: the first four convolutional layers double the size of the input tensor, reduce the number of channels at the same time, which can be regarded as the inverse process of down-sampling, and finally reduce the number of channels to 3 through one convolutional layer to output a secret-carrying image; furthermore, the added four-hop connection can cascade down-sampled tensors into up-sampling steps of corresponding size, which helps to reduce the loss of important features.
As shown in fig. 4, the pyramid pooling module includes five pooling layers, five convolution layers and five upsampling layers; the inputs of the five pooling layers are all the outputs of the down-sampling module of the hidden network; the inputs of the five convolution layers are the outputs of the five pooling layers respectively; the input of the five upsampling layers is the output of the five convolutional layers, and the input of the upsampling module of the hidden network is the output of the pyramid pooling module. The function is as follows: the pyramid pooling module performs downsampling on the input tensor with different sizes through five parallel convolution layers, then expands the input tensor to the same size through five upsampling layers and then performs cascade output.
The extraction stage comprises two extraction networks, the two extraction networks have the same structure, and the two extraction networks are used for respectively processing the input secret-carrying images to obtain corresponding extraction images. As shown in fig. 6, in this embodiment, the structure of each extraction network (including the pyramid pooling module therein) is substantially the same as that of the hidden network, and the difference is the number of convolution kernels of the input layer, where the hidden network is 21 and the extraction network is 3. Furthermore, the two extraction networks have the same structure, but they are two networks with different parameter values.
And step two, after the image steganography model is constructed, the image steganography model needs to be trained to obtain the trained image steganography model. The specific process is as follows:
1. 40,000 images were randomly selected from ImageNet and formed into training, validation and test sets in the quantitative ratio of 6. The training set is used for training the network, the verification set is used for verifying the performance of the network model obtained after each round of training is finished, and the test set is used for testing the performance of the obtained optimal network model after the whole training process is finished.
2. All images of the training set are randomly divided into two groups of carrier images and secret images, the number of the two groups of images is the same, and only one carrier image and two secret images are input each time.
3. And inputting the carrier image and the two secret images into the image steganography model so as to finally obtain two different extracted images. The specific process is as follows: inputting the carrier image into a corresponding carrier preprocessing network to obtain a result of cascade connection of a characteristic tensor of high-frequency characteristics of the carrier image and the carrier image; two secret images are cascaded and then input to a corresponding secret image preprocessing network, and a feature tensor containing the global features of the secret images is extracted; the output of the carrier preprocessing network and the output of the secret image preprocessing network are cascaded and input to the hidden network to obtain a secret image containing two secret images; and respectively and simultaneously inputting the secret-carrying images into two extraction networks with the same structure, and extracting two different extraction images.
4. Judging whether all the images of the training set are input into the image steganography model: if yes, the training in the current round is considered to be finished, and the next step is continued; if so, returning to the step 3 to continue the training of the current round.
5. After the training of the current round is finished, images of the verification set are randomly divided into two groups, namely a carrier image and a secret image, the two groups are input into the current model, and a corresponding carrier image and an extraction image are obtained.
6. After all the images of the verification set are input, the mean square error is used as a hiding loss function to calculate hiding loss values between each group of secret images and the original secret images, and the mean square error is used as an extraction loss function to calculate extraction loss values between each group of extracted images and the corresponding original secret images. The mean square error is calculated as follows:
Figure BDA0003127582090000061
where X represents the original image and Y represents the modified image.
7. And weighting the hidden loss value and the extracted loss value of each group to obtain a corresponding total loss value, and then calculating the average value to be used as the total loss value of the current round. The total loss value is calculated as follows:
Figure BDA0003127582090000062
therein, loss Sum Representing the total loss function, lossH i Representing the hidden loss function, lossE, of each group i Represents the extraction loss function of each group, phi is a weighted value, in this embodiment, phi is 0.5, and n represents the total number of groups.
8. Comparing whether the total loss value of the previous round is less than the previous minimum total loss value: if yes, the weight value of the current model is saved, and if not, the weight value is not saved.
9. Judging whether the number of training rounds reaches a threshold value: if so, ending the training, otherwise returning to the step 3 to continue the next round of training.
10. And after training is finished, testing the images of the test set by using the stored multiple groups of models. And measuring the obtained image by using indexes such as peak signal-to-noise ratio, structural similarity and the like, wherein a group of models with the optimal result are the final result, namely the trained image steganography model is obtained.
And step three, after the trained image steganography model is obtained, inputting one color carrier image and two color secret images into the trained image steganography model, thereby obtaining a secret carrier image which is embedded with the two color secret images and has no difference with the carrier image in visual effect, and obtaining two color extraction images which are extracted from the secret carrier image and have no difference with the two secret images in visual effect.
In order to verify the effectiveness of the method, the method is trained and verified on data sets such as ImageNet, COCO, celeA and the like, and a remote sensing image is added for testing, wherein a sample is shown in FIG. 7, and the original carrier image and the secret image, the original secret image and the extracted image can be observed to be consistent in visual effect. After the model is trained, the performance of the model is tested by using a test set (the test set is the ImageNet test set mentioned in the second part 1 of the specification), and after the test is finished, a secret image and an original carrier image are obtained. From the test results, 350 secret images and 50 carrier images were randomly selected and analyzed using steganalysis software (i.e., the software attempted to distinguish which secret images were carrier images from which carrier images), resulting in a graph of the results of the detection resistance analysis as shown in fig. 8. The meaning of fig. 8 is: the closer the zigzag line is to the dotted line, the better the detection resistance of the steganographic model. As can be seen from this figure, the method of the present invention is more resistant to detection.
In summary, the large-capacity image steganography method of the present invention has the following characteristics:
1. the method can hide two secret images with the same size at the same time, improves the steganographic capacity from 1 byte/pixel to 2bytes/pixel, obviously improves the steganographic capacity, and simultaneously keeps the imperceptibility and the anti-detection performance of steganography.
2. The invention only uses the hidden network and the extraction network to carry out synchronous training, and has high convergence speed.
3. The hidden stage and the extraction stage in the image steganography model provided by the invention have small parameter quantity and low calculation quantity, and the requirement on hardware during training is not high (the hardware equipment in the embodiment of the invention is only NVIDIA GeForce GTX 1080-8 GB).

Claims (7)

1. A steganography method for a large-capacity image is characterized by comprising the following steps:
inputting the carrier image and the two secret images into a trained image steganography model to obtain a secret-carrying image and two extracted images, wherein the secret-carrying image and the carrier image are kept consistent in visual effect, and the two extracted images are respectively kept consistent in visual effect with the two secret images;
wherein the image steganography model comprises a hiding stage and an extraction stage;
the hiding stage comprises a carrier image preprocessing network, a secret image preprocessing network and a hiding network; the carrier image preprocessing network is used for preprocessing an input carrier image; the secret image preprocessing network is used for preprocessing the two cascaded secret images; the hidden network is used for processing the output of the cascaded carrier image preprocessing network and the output of the secret image preprocessing network to obtain a carrier image containing two secret images;
the extraction phase comprises two extraction networks; the two extraction networks are used for respectively processing the input secret-carrying images to obtain corresponding extraction images;
the carrier image preprocessing network comprises a jump connection, a convolution layer and a maximum pooling layer which are connected in sequence; the input of the convolution layer of the carrier image preprocessing network is a carrier image; the jump connection is used for cascading the output of the maximum pooling layer with the carrier image, and the result after cascading is the output of the carrier image preprocessing network;
the secret image preprocessing network comprises a convolution layer and an average pooling layer which are sequentially connected, the input of the convolution layer of the secret image preprocessing network is two secret images after cascade connection, and the output of the average pooling layer is the output of the secret image preprocessing network;
in the process of training the image steganography model, the total loss function adopted is as follows:
Figure FDA0004119856290000011
therein, loss Sum Representing the total loss function, lossH i Representing the hidden loss function, lossH, of each group i Represents the extraction loss function for each group, phi is a weighting value, and n represents the total number of groups.
2. A large-capacity image steganography method as claimed in claim 1, wherein the hidden network comprises a down-sampling module, a pyramid pooling module and an up-sampling module; the down-sampling module of the hidden network comprises four convolution layers which are sequentially connected, wherein the input of the first convolution layer in the four convolution layers is the input of the hidden network, and the output of the last convolution layer is the input of the pyramid pooling module; the up-sampling module of the hidden network comprises five convolution layers and four jump connections, wherein the four jump connections are used for cascading the outputs of the first four convolution layers in the five convolution layers with the outputs of the convolution layers with the corresponding sizes in the down-sampling module, the input of the first convolution layer is the output of the pyramid pooling module, the inputs of the last four convolution layers are the outputs of the four jump connections respectively, and the output of the last convolution layer is the output of the hidden network.
3. A large-capacity image steganography method as claimed in claim 2, wherein the pyramid pooling module of the hidden network comprises five pooling layers, five convolution layers and five upsampling layers; the inputs of the five pooling layers are all the outputs of the down-sampling module of the hidden network; the inputs of the five convolution layers are the outputs of the five pooling layers respectively; the inputs of the five upsampling layers are the outputs of the five convolutional layers, and the output is the output of the pyramid pooling module of the hidden network.
4. A large-capacity image steganography method as claimed in claim 1, wherein the two extraction networks have the same structure, and each extraction network comprises a down-sampling module, a pyramid pooling module and an up-sampling module; the down-sampling module of the extraction network comprises four convolution layers which are sequentially connected, wherein the input of the first convolution layer in the four convolution layers is the input of the extraction network, and the output of the last convolution layer is the input of the pyramid pooling module; the up-sampling module of the extraction network comprises five convolution layers and four jump connections, wherein the four jump connections are used for cascading the outputs of the first four convolution layers in the five convolution layers with the outputs of the convolution layers with the corresponding sizes in the down-sampling module, the input of the first convolution layer is the output of the pyramid pooling module, the inputs of the last four convolution layers are the outputs of the four jump connections respectively, and the output of the last convolution layer is the output of the extraction network.
5. A large-capacity image steganography method as claimed in claim 4, wherein the pyramid pooling module of the extraction network comprises five pooling layers, five convolution layers and five upsampling layers; the inputs of the five pooling layers are all the outputs of the down-sampling module of the extraction network; the inputs of the five convolution layers are the outputs of the five pooling layers respectively; the inputs of the five upsampling layers of the extraction network are the outputs of the five convolutional layers, and the output is the output of the pyramid pooling module of the extraction network.
6. A large-capacity image steganography method according to any one of claims 1-5, wherein the loss value is calculated using a mean square error as a concealment loss function.
7. A large-capacity image steganography method according to any one of claims 1 to 5, wherein the loss value is calculated using a mean square error as an extraction loss function.
CN202110693663.6A 2021-06-22 2021-06-22 Large-capacity image steganography method Active CN113298689B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110693663.6A CN113298689B (en) 2021-06-22 2021-06-22 Large-capacity image steganography method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110693663.6A CN113298689B (en) 2021-06-22 2021-06-22 Large-capacity image steganography method

Publications (2)

Publication Number Publication Date
CN113298689A CN113298689A (en) 2021-08-24
CN113298689B true CN113298689B (en) 2023-04-18

Family

ID=77329119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110693663.6A Active CN113298689B (en) 2021-06-22 2021-06-22 Large-capacity image steganography method

Country Status (1)

Country Link
CN (1) CN113298689B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116958006B (en) * 2023-09-19 2024-01-02 湖北微模式科技发展有限公司 Equal-size image superposition algorithm based on pixel bidirectional fusion
CN117132671B (en) * 2023-10-27 2024-02-23 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) Multi-task steganography method, system and medium based on depth self-adaptive steganography network

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107845116A (en) * 2017-10-16 2018-03-27 北京京东尚科信息技术有限公司 The method and apparatus for generating the compressed encoding of plane picture

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6557103B1 (en) * 1998-04-13 2003-04-29 The United States Of America As Represented By The Secretary Of The Army Spread spectrum image steganography
WO2016165082A1 (en) * 2015-04-15 2016-10-20 中国科学院自动化研究所 Image stego-detection method based on deep learning
CN109492416B (en) * 2019-01-07 2022-02-11 南京信息工程大学 Big data image protection method and system based on safe area
CN109934761B (en) * 2019-01-31 2022-11-29 中山大学 JPEG image steganalysis method based on convolutional neural network
CN112529758B (en) * 2020-12-18 2022-08-09 海南大学 Color image steganography method based on convolutional neural network
CN112950445B (en) * 2021-03-11 2023-11-17 河南师范大学 Compensation-based detection feature selection method in image steganalysis

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107845116A (en) * 2017-10-16 2018-03-27 北京京东尚科信息技术有限公司 The method and apparatus for generating the compressed encoding of plane picture

Also Published As

Publication number Publication date
CN113298689A (en) 2021-08-24

Similar Documents

Publication Publication Date Title
CN110349136A (en) A kind of tampered image detection method based on deep learning
WO2016165082A1 (en) Image stego-detection method based on deep learning
CN112580782B (en) Channel-enhanced dual-attention generation countermeasure network and image generation method
CN113298689B (en) Large-capacity image steganography method
CN108961137A (en) A kind of image latent writing analysis method and system based on convolutional neural networks
WO2022237078A1 (en) Color image steganography method based on generative adversarial network
CN112150450A (en) Image tampering detection method and device based on dual-channel U-Net model
CN110210492B (en) Stereo image visual saliency detection method based on deep learning
Wang et al. HidingGAN: High capacity information hiding with generative adversarial network
CN111222583B (en) Image steganalysis method based on countermeasure training and critical path extraction
Fu et al. CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis
CN111476727B (en) Video motion enhancement method for face-changing video detection
CN114663986B (en) Living body detection method and system based on double decoupling generation and semi-supervised learning
CN115311117A (en) Image watermarking system and method for style migration depth editing
Wang et al. Adaptor: Improving the robustness and imperceptibility of watermarking by the adaptive strength factor
Zhang et al. Image steganalysis network based on dual-attention mechanism
CN113887573A (en) Human face forgery detection method based on visual converter
CN116310839A (en) Remote sensing image building change detection method based on feature enhancement network
CN112862655B (en) JPEG image steganalysis method based on channel space attention mechanism
CN116152061A (en) Super-resolution reconstruction method based on fuzzy core estimation
CN113592693B (en) Digital watermarking method, device and system based on Y-Net
Chen et al. A features decoupling method for multiple manipulations identification in image operation chains
CN116958800A (en) Remote sensing image change detection method based on hierarchical attention residual unet++
Mansour et al. A Robust Deep Learning-Based Video Watermarking Using Mosaic Generation.
Golea et al. A novel multi-objective genetic algorithm optimization for blind RGB color image watermarking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant