CN114897658A - Image steganography model protection method based on extraction network parameter scrambling - Google Patents

Image steganography model protection method based on extraction network parameter scrambling Download PDF

Info

Publication number
CN114897658A
CN114897658A CN202210458370.4A CN202210458370A CN114897658A CN 114897658 A CN114897658 A CN 114897658A CN 202210458370 A CN202210458370 A CN 202210458370A CN 114897658 A CN114897658 A CN 114897658A
Authority
CN
China
Prior art keywords
scrambling
image
network model
extraction network
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210458370.4A
Other languages
Chinese (zh)
Other versions
CN114897658B (en
Inventor
段新涛
张永强
邵志强
刘孬
岳冬利
谢自梅
刘行兵
张恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Normal University
Original Assignee
Henan Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Normal University filed Critical Henan Normal University
Priority to CN202210458370.4A priority Critical patent/CN114897658B/en
Publication of CN114897658A publication Critical patent/CN114897658A/en
Application granted granted Critical
Publication of CN114897658B publication Critical patent/CN114897658B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding
    • G06T9/002Image coding using neural networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides an image steganography model protection method based on extraction network parameter scrambling, and belongs to the technical field of image encryption. Since the sender may be stolen by a third party when sending the extracting network to the receiver for the first time, the secret image of the subsequent transmission is leaked. For this, the sender scrambles the parameters of the extracted network model by a scrambling algorithm agreed with the receiver, and then reconstructs a new extracted network model by extracting the parameters of the network model after scrambling. When the sender sends the new extraction network and the secret-carrying image to the receiver, even if the extraction network model is acquired by a third party in the transmission process, the similarity between the secret image extracted from the secret-carrying image and the original secret image is low, so that the secret image is prevented from being leaked. And the receiver can restore the new extraction network model to the extraction network model before scrambling according to the agreed scrambling algorithm, and extract the secret image from the secret image, thereby enhancing the safety of the image steganography process.

Description

一种基于提取网络参数置乱的图像隐写模型保护方法An image steganographic model protection method based on extracting network parameters and scrambling

技术领域technical field

本发明涉及一种基于提取网络参数置乱的图像隐写模型保护方法,属于图像加密技术领域。The invention relates to an image steganographic model protection method based on extracting network parameter scrambling, and belongs to the technical field of image encryption.

背景技术Background technique

在日常工作中,我们离不开计算机传输信息,因为计算机能够满足人们的日常生活和工作需要。为了保证秘密信息能够在网络中安全地传输,人们通常会选择加密技术对信息进行保护,比如文件加密、图片加密,加密后的文件有一个明显的缺点,加密后的文件不能正常打开,所以加密后的文件在传输过程中很容易引起别人的怀疑。信息隐藏可以很好地解决上面遇到的问题,信息隐藏是指把我们要传输的秘密信息隐藏在可以公开的媒体中,而人们凭借直观的听觉和视觉很难发现秘密信息的存在。用作信息隐藏的载体有很多,比如图像、声音、视频、文档等。In daily work, we cannot do without computers to transmit information, because computers can meet people's daily life and work needs. In order to ensure that secret information can be safely transmitted in the network, people usually choose encryption technology to protect information, such as file encryption, image encryption, encrypted files have an obvious disadvantage, encrypted files cannot be opened normally, so encryption The post file can easily arouse suspicion from others during the transfer process. Information hiding can solve the above problems very well. Information hiding refers to hiding the secret information we want to transmit in the media that can be disclosed, and it is difficult for people to find the existence of secret information with intuitive hearing and vision. There are many carriers used for information hiding, such as images, sounds, videos, documents, etc.

数字图像是信息隐藏最常见的载体之一,选择数字图像作为载体主要有以下3个原因:(1)在信息技术时代背景下,互联网中存在大量图片信息,人们很容易获取到载体;(2)图像所包含的语义内容非常丰富,可以表述不同的信息;(3)与文本和音频相比,数字图像具有更大的存储容量和更大的数据冗余性,非常适合作为信息隐藏的载体,因此出现了图像隐写技术。图像隐写技术指:发送方通过一定的技术手段把要传输的秘密信息嵌入到载体图像中,然后把含有秘密图像的载密图像通过公开的网络信道发送给接收方,接收方收到载密图像后,通过解密技术把秘密信息从载体图像中提取出来,从而避免引起第三方的察觉。Digital images are one of the most common carriers of information hiding. There are three main reasons for choosing digital images as carriers: (1) In the context of the information technology era, there are a lot of picture information on the Internet, and people can easily obtain carriers; (2) ) The semantic content contained in the image is very rich and can express different information; (3) Compared with text and audio, digital images have larger storage capacity and greater data redundancy, and are very suitable as carriers for information hiding , hence the emergence of image steganography. Image steganography technology means that the sender embeds the secret information to be transmitted into the carrier image through certain technical means, and then sends the secret image containing the secret image to the receiver through an open network channel, and the receiver receives the secret image. After the image, the secret information is extracted from the carrier image through decryption technology, so as to avoid the third party's detection.

图像隐写大致经历了3个阶段。第1个阶段,研究人员通过修改图像的像素值实现图像隐写。比如LSB隐写,通过修改或者替换最低有效位实现信息隐藏的目的。这种方法不会对图像的整体视觉效果造成太大的影响,但是比较容易被隐写分析技术检测出来,LSB隐写技术很难满足现代通信安全的要求。第2个阶段,研究人员考虑到图像具有高度的复杂性和较多的冗余度,因此通过内容自适应隐写方法修改图像的内容实现信息隐藏,使得人们在视觉上难以察觉,并且很难被隐写分析技术手段检测出异常。比较常用的自适应隐写方法有HUGO、WOW、UNIWARD、HILL等,但随着隐写分析技术的进一步提升,SRM能够分析检测出自适应隐写。第3个阶段,随着深度卷积神经网络(Deep Convolutional Neural Networks,DCNN)在各领域的兴起,研究人员将DCNN引入到图像隐写领域,以实现更好的图像隐写效果。比如Baluja等人提出的编码器-解码器图像隐写框架,包括图像预处理阶段、隐藏网络、提取网络,不仅能够保证载密图像和载体图像保持一致,而且提取的秘密图像和原秘密图像在视觉上几乎没有失真,同时具有一定的抗隐写分析能力。Image steganography roughly goes through three stages. In the first stage, researchers implement image steganography by modifying the pixel values of the image. For example, LSB steganography, which achieves the purpose of information hiding by modifying or replacing the least significant bits. This method will not cause much impact on the overall visual effect of the image, but it is relatively easy to be detected by steganalysis technology, and LSB steganography technology is difficult to meet the requirements of modern communication security. In the second stage, the researchers consider that the image has a high degree of complexity and more redundancy, so the content of the image is modified by the content-adaptive steganography method to achieve information hiding, which makes it visually difficult for people to perceive and difficult to detect. Anomalies are detected by steganalysis techniques. The more commonly used adaptive steganography methods include HUGO, WOW, UNIWARD, HILL, etc., but with the further improvement of steganalysis technology, SRM can analyze and detect adaptive steganography. In the third stage, with the rise of Deep Convolutional Neural Networks (DCNN) in various fields, researchers introduced DCNN into the field of image steganography to achieve better image steganography. For example, the encoder-decoder image steganography framework proposed by Baluja et al., including image preprocessing stage, hidden network, and extraction network, can not only ensure that the secret image and the carrier image are consistent, but also the extracted secret image and the original secret image. There is almost no distortion visually, and it has a certain ability to resist steganalysis.

基于深度学习的图像隐写网络模型主要由隐藏网络和提取网络组成,首先,发送方选择自己的图片数据集进行训练,从而得到图像隐写网络模型,然后发送方和接收方通过训练好的隐写网络模型进行隐蔽通信。发送方和接收方在第一次通信时,发送方需要把训练好的提取网络模型的参数发送给接收方,这样就建立了隐蔽通信的准备工作,接收方只有拿到提取网络模型的参数才能建立提取网络模型,进而通过提取网络模型提取出隐藏在载密图像中的秘密信息。但是双方在第一次传输提取网络模型的参数时存在一定的泄露风险,安全程度较低,如果在传输过程中被第三方截获,那么往后的通信内容都可能被第三方通过提取网络所得到。The image steganography network model based on deep learning is mainly composed of a hidden network and an extraction network. First, the sender selects its own image data set for training to obtain an image steganography network model, and then the sender and receiver pass the trained hidden network model. Write network models for covert communication. When the sender and the receiver communicate for the first time, the sender needs to send the parameters of the trained extraction network model to the receiver, thus establishing the preparation for covert communication. The receiver can only get the parameters of the extraction network model. The extraction network model is established, and then the secret information hidden in the secret image is extracted through the extraction network model. However, there is a certain risk of leakage when the two parties extract the parameters of the network model for the first transmission, and the security level is low. If the third party intercepts the transmission process, the subsequent communication content may be obtained by the third party through the extraction network. .

发明内容SUMMARY OF THE INVENTION

本发明的目的在于提供一种基于提取网络参数置乱的图像隐写模型保护方法,用于解决图像隐写方法中,发送方将图像隐写网络中的提取网络模型发送至接收方时安全程度较低的问题。The purpose of the present invention is to provide an image steganographic model protection method based on scrambling extracted network parameters, which is used to solve the problem of the security level when the sender sends the extracted network model in the image steganography network to the receiver in the image steganography method. lower problem.

为了实现上述目的,本发明提供了一种基于提取网络参数置乱的图像隐写模型保护方法,包括如下步骤:In order to achieve the above object, the present invention provides an image steganographic model protection method based on extracting network parameters and scrambling, comprising the following steps:

S1、发送方通过已训练好的隐藏网络模型将待发送的秘密图像隐藏到载体图像中,得到对应的载密图像,并获取已训练好的提取网络模型,隐藏网络模型和提取网络模型共同构成深度学习的图像隐写网络;S1. The sender hides the secret image to be sent into the carrier image through the trained hidden network model, obtains the corresponding secret image, and obtains the trained extraction network model. The hidden network model and the extraction network model together constitute Deep learning image steganography network;

S2、发送方通过约定的置乱算法对已训练好的提取网络模型的参数进行置乱操作,并根据置乱后的提取网络模型的参数进行重构,得到新的提取网络模型;发送方将载密图像和新的提取网络模型发送至接收方;约定的置乱算法满足:对于同一载密图像,置乱前的提取网络模型与置乱后的提取网络模型提取出的秘密图像的相似度低于设定阈值;S2. The sender performs a scramble operation on the parameters of the trained extraction network model through the agreed scrambling algorithm, and reconstructs the parameters of the scrambled extraction network model to obtain a new extraction network model; the sender will The secret image and the new extraction network model are sent to the receiver; the agreed scrambling algorithm satisfies: for the same secret image, the similarity of the secret image extracted by the extraction network model before scrambling and the extraction network model after scrambled below the set threshold;

S3、接收方收到新的提取网络模型后,按照所述约定的置乱算法对新的提取网络模型进行置乱解密,得到置乱前的提取网络模型,并根据置乱前的提取网络模型对收到的载密图像进行提取,从而得到所述秘密图像。S3. After receiving the new extraction network model, the receiver scrambles and decrypts the new extraction network model according to the agreed scrambling algorithm to obtain the extraction network model before scrambling, and according to the extraction network model before scrambling The received secret image is extracted to obtain the secret image.

由于发送方在第一次向接收方发送提取网络时,可能被第三方窃取,导致后续传输的秘密图像泄露。对此,发送方先通过与接收方约定好的置乱算法对提取网络模型的参数进行置乱,进而通过置乱后提取网络模型的参数重构出新的提取网络模型。发送方将新的提取网络和载密图像发送至接收方时,即使在传输过程中提取网络模型被第三方获取,但是从载密图像中提取出的秘密图像与原来的秘密图像仍然存在较大差距,相似度较低,从而避免了秘密图像泄露。而接收方可以根据约定的置乱算法将新的提取网络模型恢复为置乱前的提取网络模型,并对载密图像进行提取,得到有效的秘密图像,增强了图像隐写过程的安全性。When the sender sends the extraction network to the receiver for the first time, it may be stolen by a third party, resulting in the disclosure of the secret images of subsequent transmissions. In this regard, the sender first scrambles the parameters of the extracted network model through a scrambling algorithm agreed with the receiver, and then reconstructs a new extracted network model by scrambling the parameters of the extracted network model. When the sender sends the new extraction network and the secret image to the receiver, even if the extraction network model is acquired by a third party during the transmission process, the secret image extracted from the secret image is still larger than the original secret image. gap, the similarity is low, thus avoiding the leakage of secret images. The receiver can restore the new extraction network model to the extraction network model before scrambling according to the agreed scrambling algorithm, and extract the secret image to obtain an effective secret image, which enhances the security of the image steganography process.

进一步地,在上述方法中,隐藏网络模型和提取网络模型均采用深度神经卷积网络,置乱操作指对已训练好的提取网络模型中一个或多个卷积层中卷积核的位置进行层内置乱,或者对不同卷积层中卷积核的位置进行层间置乱;层内置乱时卷积核的位置仅在卷积层内发生变化,层间置乱时卷积核的位置在不同卷积层间发生变化。Further, in the above method, both the hidden network model and the extraction network model use a deep neural convolutional network, and the scrambling operation refers to performing a scrambling operation on the positions of the convolution kernels in one or more convolutional layers in the trained extraction network model. Inter-layer scrambling, or inter-layer scrambling for the positions of convolution kernels in different convolutional layers; when intra-layer scrambling occurs, the position of the convolution kernel only changes within the convolution layer, and the position of the convolution kernel when inter-layer scrambling occurs Changes between different convolutional layers.

提取网络模型采用深度神经卷积网络,包括多个卷积层。置乱操作时,对已训练好的提取网络模型进行层内置乱或层间置乱,层内置乱的方法为:将卷积层内卷积核的位置进行改变;层间置乱的方法为:将不同卷积层的卷积核的位置进行改变。通过改变卷积层的位置,改变了载密图像输入提取网络模型后的卷积操作顺序,从而实现对提取网络模型的加密,增强图像隐写过程的安全性。The extraction network model adopts a deep neural convolutional network, including multiple convolutional layers. During the scrambling operation, perform intra-layer scrambling or inter-layer scrambling on the trained extraction network model. The method for intra-layer scrambling is to change the position of the convolution kernel in the convolution layer; the method for inter-layer scrambling is: : Change the positions of the convolution kernels of different convolutional layers. By changing the position of the convolution layer, the sequence of convolution operations after the encrypted image is input to the extraction network model is changed, thereby realizing the encryption of the extraction network model and enhancing the security of the image steganography process.

进一步地,在上述方法中,所述约定的置乱算法采用超Lorenz混沌系统。Further, in the above method, the agreed scrambling algorithm adopts a super Lorenz chaotic system.

针对约定的置乱算法,提供一种具体的实现方法,发送方与接收方通过相互约定超Lorenz混沌系统的控制参数以及上述置乱操作的过程,以此实现置乱算法的约定。For the agreed scrambling algorithm, a specific implementation method is provided. The sender and the receiver mutually agree on the control parameters of the super-Lorenz chaotic system and the process of the above scrambling operation, so as to realize the agreement of the scrambling algorithm.

进一步地,在上述方法中,采用结构相似性分析方法SSIM确定所述相似度。Further, in the above method, the structural similarity analysis method SSIM is used to determine the similarity.

对于同一载密图像,需要对置乱前的提取网络模型与置乱后的提取网络模型提取出的秘密图像的相似度进行分析,提供一种具体的方法来确定相似度,便于本发明的实施。For the same secret image, it is necessary to analyze the similarity between the extraction network model before scrambling and the secret image extracted by the extraction network model after scrambling, and provide a specific method to determine the similarity, which is convenient for the implementation of the present invention .

进一步地,在上述方法中,所述提取网络模型包括相互连接的上采样模块、池化层、下采样模块和卷积层;上采样模块和下采样模块均包括4个卷积层。Further, in the above method, the extraction network model includes an upsampling module, a pooling layer, a downsampling module and a convolutional layer that are connected to each other; the upsampling module and the downsampling module each include 4 convolutional layers.

提供一种具体的提取网络模型,便于本发明的实施。A specific extraction network model is provided to facilitate the implementation of the present invention.

进一步地,在上述方法中,步骤S2中进行置乱操作时,对上采样模块中的第1个、第2个或第4个卷积层进行层内置乱,或者对下采样模块的第3个或第4个卷积层进行层内置乱。Further, in the above method, when the scrambling operation is performed in step S2, in-layer scrambling is performed on the first, second or fourth convolutional layer in the upsampling module, or the third convolutional layer in the downsampling module is scrambled. 1st or 4th convolutional layer for intra-layer scrambling.

对于上述提到的提取网络模型,通过对上采样模块中的第1个、第2个或第4个卷积层进行层内置乱,或者对下采样模块的第3个或第4个卷积层进行层内置乱,即可重构出效果较好的新的提取网络模型,操作简单。For the extraction network model mentioned above, by performing intra-layer scrambling on the 1st, 2nd or 4th convolutional layer in the upsampling module, or by scrambling the 3rd or 4th convolutional layer in the downsampling module By layer-by-layer chaos, a new extraction network model with better effect can be reconstructed, and the operation is simple.

进一步地,在上述方法中,步骤S2中进行置乱操作时,对上采样模块中的第1个、第2个和第4个卷积层,以及下采样模块的第3个和第4个卷积层进行层间置乱。Further, in the above method, when the scrambling operation is performed in step S2, the first, second and fourth convolutional layers in the up-sampling module, and the third and fourth in the down-sampling module are The convolutional layers perform inter-layer scrambling.

对于上述提到的提取网络模型,通过对上采样模块中的第1个、第2个和第4个卷积层,以及下采样模块的第3个和第4个卷积层进行层间置乱,即可重构出效果较好的新的提取网络模型,便于本发明的实施,而且安全程度高。For the extraction network model mentioned above, the first, second and fourth convolutional layers in the upsampling module and the third and fourth convolutional layers in the downsampling module are inter-layered. A new extraction network model with better effect can be reconstructed, which is convenient for the implementation of the present invention and has a high degree of security.

进一步地,在上述方法中,步骤S2中进行置乱操作时,对上采样模块的4个卷积层进行层间置乱。Further, in the above method, when the scrambling operation is performed in step S2, inter-layer scrambling is performed on the four convolutional layers of the upsampling module.

对于上述提到的提取网络模型,通过对上采样模块的4个卷积层进行层间置乱,即可重构出效果较好的新的提取网络模型,便于本发明的实施,而且安全程度高。For the extraction network model mentioned above, a new extraction network model with better effect can be reconstructed by performing inter-layer scrambling on the four convolutional layers of the upsampling module, which is convenient for the implementation of the present invention, and has a high degree of security. high.

进一步地,在上述方法中,步骤S2中进行置乱操作时,对下采样模块的4个卷积层进行层间置乱。Further, in the above method, when the scrambling operation is performed in step S2, inter-layer scrambling is performed on the four convolutional layers of the downsampling module.

对于上述提到的提取网络模型,通过对下采样模块的4个卷积层进行层间置乱,即可重构出效果较好的新的提取网络模型,便于本发明的实施,而且安全程度高。For the extraction network model mentioned above, a new extraction network model with better effect can be reconstructed by performing inter-layer scrambling on the four convolutional layers of the downsampling module, which is convenient for the implementation of the present invention, and has a high degree of security. high.

进一步地,在上述方法中,步骤S2中进行置乱操作时,对提取网络模型中的9个卷积层进行层间置乱。Further, in the above method, when the scrambling operation is performed in step S2, inter-layer scrambling is performed on the 9 convolutional layers in the extraction network model.

对于上述提到的提取网络模型,通过对提取网络模型中的9个卷积层进行层间置乱,即可重构出效果较好的新的提取网络模型,便于本发明的实施,而且安全程度高。For the extraction network model mentioned above, a new extraction network model with better effect can be reconstructed by performing inter-layer scrambling on the 9 convolutional layers in the extraction network model, which is convenient for the implementation of the present invention and safe high degree.

附图说明Description of drawings

图1为本发明方法实施例中基于提取网络参数置乱的图像隐写模型保护方法的流程框图;Fig. 1 is the flow chart of the image steganographic model protection method based on extracting network parameter scrambling in the method embodiment of the present invention;

图2为本发明方法实施例中图像隐写网络模型的工作过程示意图;Fig. 2 is the working process schematic diagram of the image steganography network model in the method embodiment of the present invention;

图3为本发明方法实施例中图像隐写网络模型工作效果示意图;3 is a schematic diagram of the working effect of an image steganography network model in an embodiment of the method of the present invention;

图4为本发明方法实施例中提取网络中单层卷积层置乱方案的效果示意图;4 is a schematic diagram of the effect of extracting a single-layer convolution layer scrambling scheme in a network in an embodiment of the method of the present invention;

图5为本发明方法实施例中提取网络中多层卷积层置乱方案的效果示意图;5 is a schematic diagram of the effect of extracting a multi-layer convolution layer scrambling scheme in a network in an embodiment of the method of the present invention;

图6为本发明方法实施例中最后一层卷积层中卷积核位置置乱的效果示意图。FIG. 6 is a schematic diagram of the effect of scrambling the positions of convolution kernels in the last convolution layer in the method embodiment of the present invention.

具体实施方式Detailed ways

为了使本发明的目的、技术方案及优点更加清楚明了,以下结合附图及实施例,对本发明进行进一步详细说明。In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and embodiments.

方法实施例:Method example:

本发明通过混沌系统加密算法对提取网络模型进行置乱操作,即使提取网络模型在传输过程中被第三方获取,也不能通过提取网络模型从载密图像中提取出有用的秘密图像,而接收方可以根据提前约定的置乱算法将置乱后的提取网络模型恢复出正确的提取网络,以此提高发送方和接收方通信过程的安全性和可靠性。The present invention performs scrambling operation on the extracted network model through the chaotic system encryption algorithm. Even if the extracted network model is acquired by a third party during the transmission process, the useful secret image cannot be extracted from the encrypted image through the extracted network model. The scrambled extraction network model can be restored to the correct extraction network according to the scrambling algorithm agreed in advance, so as to improve the security and reliability of the communication process between the sender and the receiver.

如图2所示,本发明利用深度神经卷积网络的图像隐写模型框架,以及编码器和解码器的思想,构建图像隐写网络模型。图像隐写网络模型包括隐藏网络模型(HidingNetwork)和提取网络模型(Extraction Network),隐藏网络模型利用编码功能将秘密图像(Secret image)和载体图像(Cover image)连接为一个6通道的张量,然后输出一张3通道的载密图像(Container image),提取网络模型能够对载密图像中的秘密信息进行提取,从而恢复出载密图像中的秘密图像(Recovered image)。As shown in FIG. 2 , the present invention constructs an image steganographic network model by using the image steganography model framework of the deep neural convolutional network and the ideas of the encoder and the decoder. The image steganography network model includes a hidden network model (HidingNetwork) and an extraction network model (Extraction Network). The hidden network model uses the encoding function to connect the secret image (Secret image) and the carrier image (Cover image) into a 6-channel tensor, Then a 3-channel container image is output, and the extraction network model can extract the secret information in the container image, so as to recover the secret image (Recovered image) in the container image.

如图1所示,本发明的基于提取网络参数置乱的图像隐写模型保护方法包括如下步骤:As shown in Figure 1, the image steganographic model protection method based on extracting network parameter scrambling of the present invention comprises the following steps:

1、构建隐藏网络模型及提取网络模型。1. Build the hidden network model and extract the network model.

隐藏网络模型和提取网络模型的结构如下表1所示,提取网络模型主要包括3部分内容,分别为上采样模块、池化模块(Pooling Module)、下采样模块和卷积模块,上采样包括4层相互连接的卷积层Conv和BN(Batch Normalization)层,池化模块包括1层池化层,下采样模块包括4层相互连接的反卷积层DeConv和BN层,卷积模块包括1层相互连接的卷积层Conv和BN层。上采样模块和下采样模块采用激活函数ReLU,卷积模块采用激活函数Sigmoid。The structure of the hidden network model and the extraction network model is shown in Table 1 below. The extraction network model mainly includes three parts, namely the upsampling module, the pooling module, the downsampling module and the convolution module. The upsampling includes 4 The convolutional layers Conv and BN (Batch Normalization) layers are connected to each other, the pooling module includes 1 pooling layer, the downsampling module includes 4 interconnected deconvolution layers DeConv and BN layers, and the convolution module includes 1 layer Interconnected convolutional layers Conv and BN layers. The upsampling module and the downsampling module use the activation function ReLU, and the convolution module uses the activation function Sigmoid.

表1隐藏网络模型和提取网络模型内部结构表Table 1. Internal structure table of hidden network model and extracted network model

Figure BDA0003619551980000061
Figure BDA0003619551980000061

Figure BDA0003619551980000071
Figure BDA0003619551980000071

从表1中可以看出,提取网络模型中前4个卷积层中的卷积核个数分别为32、64、128和256,卷积核的大小分别为3×3、4×4、4×4和4×4;后4个反卷积层的卷积核个数分别为128、64、32和16,卷积核大小分别为4×4、4×4、4×4和3×3;最后1个卷积层的卷积核个数为3,卷积核大小为3×3。前4层卷积层对输入的载密图像(Container image)依次进行卷积操作,将载密图像从3通道转为256通道的特征图,后4层反卷积层进行反卷积操作,最后1个卷积层生成3通道的秘密图像。As can be seen from Table 1, the number of convolution kernels in the first 4 convolutional layers in the extraction network model are 32, 64, 128 and 256, respectively, and the sizes of the convolution kernels are 3×3, 4×4, 4×4 and 4×4; the number of convolution kernels of the last 4 deconvolution layers are 128, 64, 32 and 16, respectively, and the convolution kernel sizes are 4×4, 4×4, 4×4 and 3, respectively ×3; the number of convolution kernels in the last convolutional layer is 3, and the size of the convolution kernel is 3×3. The first four convolution layers perform convolution operations on the input dense image (Container image) in turn, converting the dense image from 3 channels to 256 channel feature maps, and the last four deconvolution layers perform deconvolution operations. The last 1 convolutional layer generates a 3-channel secret image.

从ImageNet数据集中随机选取100000张图片,其中98000张图片作为训练集、1000张作为验证集、剩下的1000张作为测试集。通过200个epochs训练和测试,得到图像隐写网络模型的隐写网络模型和提取网络模型。100,000 images are randomly selected from the ImageNet dataset, of which 98,000 images are used as the training set, 1,000 are used as the validation set, and the remaining 1,000 are used as the test set. Through 200 epochs training and testing, the steganographic network model and extraction network model of the image steganographic network model are obtained.

如图3所示,图中第一行是载体图像,第二行是隐藏秘密图像后的载密图像,第三行是发送方需要发送给接收方的秘密图像,第四行是接收方通过提取网络模型从载密图像中提取到的秘密图像。从图3展示的内容可以看出,载体图像与载密图像在视觉效果方面几乎没有差距,提取出来的秘密图像和原来隐藏的秘密图像之间也看不出损失,表明训练出的图像隐写网络模型的误差损失较小,隐藏效果和提取效果较佳。As shown in Figure 3, the first row is the carrier image, the second row is the secret image after hiding the secret image, the third row is the secret image that the sender needs to send to the receiver, and the fourth row is the receiver through Extract the secret image extracted by the network model from the secret image. From the content shown in Figure 3, it can be seen that there is almost no gap between the carrier image and the secret image in terms of visual effects, and there is no loss between the extracted secret image and the original hidden secret image, indicating that the trained image steganography The error loss of the network model is smaller, and the hiding effect and extraction effect are better.

2、发送方通过约定的置乱算法对已训练好的提取网络模型的参数进行置乱操作,并根据置乱后的提取网络模型的参数进行重构,得到新的提取网络模型,发送方再将载密图像和新的提取网络模型发送至接收方。2. The sender scrambles the parameters of the trained extraction network model through the agreed scrambling algorithm, and reconstructs the parameters of the scrambled extraction network model to obtain a new extraction network model. Send the encrypted image and the new extracted network model to the recipient.

具体方法为:根据提取网络模型中卷积层和反卷积层的个数,将提取网络模型的参数分成9个参数文件,在每个参数文件中,将卷积核看作一个最小操作单位,在MATLAB中利用超Lorenz混沌系统置乱算法对每一个卷积层和反卷积层中卷积核的位置进行置乱加密,从而得出置乱后的参数文件,利用置乱后的参数文件重构出新的提取网络模型。The specific method is: according to the number of convolution layers and deconvolution layers in the extracted network model, the parameters of the extracted network model are divided into 9 parameter files, and in each parameter file, the convolution kernel is regarded as a minimum operation unit , in MATLAB, the super Lorenz chaotic system scrambling algorithm is used to scramble and encrypt the position of the convolution kernel in each convolution layer and deconvolution layer, so as to obtain a scrambled parameter file, and use the scrambled parameters The file reconstructs a new extraction network model.

超Lorenz混沌系统具有鲜明的非线性动力学特征,对初值敏感,因此广泛应用于数字图像加密。通常,混动系统对图像像素位置进行置乱,从而实现对图像进行加密,但是这种方法和文件加密一样,加密后的图像在公开的信道传输时,很容易引起怀疑,有可能被第三方阻止双方之间的通信,接收方根本收不到发送方的信息。Super-Lorenz chaotic systems have distinct nonlinear dynamic characteristics and are sensitive to initial values, so they are widely used in digital image encryption. Usually, the hybrid system scrambles the pixel position of the image to encrypt the image, but this method is the same as file encryption. When the encrypted image is transmitted in an open channel, it is easy to cause suspicion and may be used by a third party. Communication between the two parties is blocked, and the receiver does not receive the sender's information at all.

超Lorenz混沌系统置乱算法的系统模型如下所示:The system model of the super-Lorenz chaotic system scrambling algorithm is as follows:

Figure BDA0003619551980000081
Figure BDA0003619551980000081

式中,x,y,z,w是超Lorenz混沌系统的状态变量,a,b,c,r是超Lorenz混沌系统的控制参数。当混沌系统的控制参数a=10,b=8/3,c=28,-1.52<r≤-0.06时,系统处于超混沌状态。超混沌状态是一种无序的、不可预测的、混乱的状态。In the formula, x, y, z, w are the state variables of the super-Lorenz chaotic system, a, b, c, r are the control parameters of the super-Lorenz chaotic system. When the control parameters of the chaotic system a=10, b=8/3, c=28, -1.52<r≤-0.06, the system is in a hyperchaotic state. A hyperchaotic state is a disordered, unpredictable, and chaotic state.

超Lorenz混沌系统的状态变量x,y,z,w是置乱加密的密钥,以此产生一维的混沌序列。因此,置乱加密过程为:首先,通过超Lorenz混沌系统产生一维的混沌序列,把每层的卷积核加载到超Lorenz混沌系统后,通过一维的混沌序列对参数文件中卷积核的位置进行置乱操作,从而得出置乱后的参数文件,再利用置乱后的参数文件重构出新的提取网络模型。对卷积核的位置进行置乱操作的方法包括如下两种:The state variables x, y, z, and w of the super-Lorenz chaotic system are the keys for scrambled encryption, thereby generating a one-dimensional chaotic sequence. Therefore, the scrambling encryption process is as follows: First, a one-dimensional chaotic sequence is generated through the super-Lorenz chaotic system, and the convolution kernel of each layer is loaded into the super-Lorenz chaotic system, and the convolution kernel in the parameter file is adjusted by the one-dimensional chaotic sequence Scrambling is performed at the position of the scrambled parameter file to obtain a scrambled parameter file, and then a new extraction network model is reconstructed by using the scrambled parameter file. There are two methods for scrambling the position of the convolution kernel:

一、层内置乱。对每个卷积层中卷积核的位置进行置乱操作,即:将每个卷积层和反卷积层中卷积核的位置进行无重复的随机排列。例如,将第1个卷积层中32个卷积核的位置打乱,载密图像输入后通过第1个卷积层进行卷积操作时,输出的32通道特征图与原来第1个卷积层输出的32通道特征图不同。同理,将其他卷积层和反卷积层中卷积核的位置打乱,则在进行卷积操作和反卷积操作时,输出的特征图不同。First, the layer is chaotic. The positions of the convolution kernels in each convolutional layer are scrambled, that is, the positions of the convolution kernels in each convolutional layer and deconvolutional layer are randomly arranged without repetition. For example, when the positions of the 32 convolution kernels in the first convolutional layer are scrambled, and the convolution operation is performed through the first convolutional layer after the dense image is input, the output 32-channel feature map is the same as that of the original first convolutional layer. The 32-channel feature maps output by the stack layer are different. In the same way, if the positions of the convolution kernels in other convolution layers and deconvolution layers are scrambled, the output feature maps will be different when the convolution operation and the deconvolution operation are performed.

如图4所示,图中第一行从左向右第一张图为通过原提取网络模型(即置乱加密前的提取网络模型)提取出的秘密图像,第一行从左向右第二张图到第五张图分别为对前4个卷积层进行层内置乱得到的提取网络提取出的秘密图像,第二行从左向右的五张图分别为对后4个反卷积层和最后一个卷积层进行层内置乱得到的提取网络提取出的秘密图像。As shown in Figure 4, the first row from left to right in the figure is the secret image extracted by the original extraction network model (that is, the extraction network model before scrambling and encryption). The first row is from left to right. The second picture to the fifth picture are the secret images extracted by the extraction network obtained by scrambling the first 4 convolutional layers. The convolutional layer and the last convolutional layer perform layer-in-layer scrambling to obtain the secret image extracted by the extraction network.

从图4中可以直观地看出,第1个、第2个、第4个、第7个和第8个卷积层进行层内置乱得到的提取网络模型提取出的秘密图像发生较大变化。为此,引入结构相似性分析方法SSIM(Structural Similarity Index Measurement)对图像之间的相似度进行分析。第1个、第2个、第4个、第7个和第8个卷积层进行层内置乱得到的提取网络模型提取出的秘密图像与原秘密图像(即原提取网络提取出的秘密图像)之间的相似度较低,低于设定阈值k,而第3个、第5个、第6个和第9个卷积层进行层内置乱得到的提取网络模型提取出的秘密图像与原秘密图像之间的相似度高于设定阈值k。因此,若发送方将第1个、第2个、第4个、第7个或第8个卷积层进行层内置乱得到的提取网络模型发送至接收方时,即使第三方获取到提取网络模型,也难以从载密图像中获取到完好的秘密图像,这些提取网络模型即可作为发送至接收方的提取网络。本实施例中,设定阈值k取0.1。It can be seen intuitively from Fig. 4 that the secret images extracted by the extraction network model obtained by the 1st, 2nd, 4th, 7th and 8th convolutional layers by intra-layer scrambling have changed greatly. . To this end, a structural similarity analysis method SSIM (Structural Similarity Index Measurement) is introduced to analyze the similarity between images. The 1st, 2nd, 4th, 7th and 8th convolutional layers perform layer-in-layer scrambling to obtain the secret image extracted from the extraction network model and the original secret image (that is, the secret image extracted by the original extraction network). ), the similarity between the The similarity between the original secret images is higher than the set threshold k. Therefore, if the sender sends the extraction network model obtained by in-layer scrambling of the 1st, 2nd, 4th, 7th or 8th convolutional layer to the receiver, even if the third party obtains the extraction network It is also difficult to obtain a complete secret image from the secret image, and these extraction network models can be used as the extraction network sent to the receiver. In this embodiment, the set threshold value k is set to be 0.1.

二、层间置乱。对不同卷积层中卷积核的位置进行置乱操作,即:随机选择其中多个卷积层,将每个卷积层中卷积核的位置进行无重复的随机排列,此时卷积核的位置变化不止发生在层内,还会变化到其他的卷积层或反卷积层。Second, inter-layer chaos. Scramble the positions of the convolution kernels in different convolutional layers, that is, randomly select multiple convolutional layers, and randomly arrange the positions of the convolutional kernels in each convolutional layer without repetition. The position of the kernel changes not only within the layer, but also to other convolutional or deconvolutional layers.

本实施例中,提供4种层间置乱后的提取网络模型提取出的秘密图像进行展示,分别为:1)选择第1个、第2个、第4个、第7个和第8个卷积层的卷积核进行层间置乱;2)选择前4个卷积层进行层间置乱;3)选择后4个反卷积层进行层间置乱;4)选择将全部的卷积层和反卷积层进行层间置乱。In this embodiment, 4 secret images extracted by the extraction network model after inter-layer scrambling are provided for display, respectively: 1) Select the 1st, 2nd, 4th, 7th and 8th images The convolution kernel of the convolutional layer performs inter-layer scrambling; 2) selects the first 4 convolutional layers for inter-layer scrambling; 3) selects the last 4 deconvolution layers for inter-layer scrambling; 4) selects all the The convolutional and deconvolutional layers perform inter-layer scrambling.

如图5所示,第一张图像为原秘密图像,第二至第5张图像分别为上述4种层间置乱后得到的提取网络模型从载密图像中提取出的秘密图像。同样采用结构相似性分析方法SSIM进行相似度分析,可以得出各秘密图像与原秘密图像之间的相似度小于设定阈值k。因此,若发送方将上述4种层间置乱后得到的提取网络模型发送至接收方时,即使第三方获取到提取网络模型,也难以从载密图像中获取到完好的秘密图像,这些提取网络模型即可作为发送至接收方的提取网络模型。As shown in Figure 5, the first image is the original secret image, and the second to fifth images are the secret images extracted from the secret image by the extraction network model obtained after the above four inter-layer scrambling. Similarly, the structural similarity analysis method SSIM is used to analyze the similarity, and it can be concluded that the similarity between each secret image and the original secret image is less than the set threshold k. Therefore, if the sender sends the extracted network model obtained after the above four inter-layer scrambling to the receiver, even if a third party obtains the extracted network model, it is difficult to obtain a complete secret image from the encrypted image. The network model can then be used as the extracted network model sent to the receiver.

此外,从图4中最后一张图像可以看出,对最后1个卷积层进行层内置乱时,得出的提取网络模型在提取秘密图像时,可能仅对图像的颜色造成影响。为此,单独对最后1个卷积层进行层内置乱,最后1个卷积层只有3个卷积核,其初始位置为123,层内置乱后卷积核的位置只有5种情况:132、213、231、312和321。如图6所示,单独对最后一个卷积层中卷积核的位置进行层内置乱,仅会使得提取网络模型提取出的秘密图像与原秘密图像颜色不同,仍然会使秘密图像中的信息暴露,因此,不采用单独对最后一个卷积层中卷积核的位置进行层内置乱得到的提取网络模型。In addition, as can be seen from the last image in Figure 4, when the last convolutional layer is scrambled, the resulting extraction network model may only affect the color of the image when extracting the secret image. For this reason, the last convolutional layer is scrambled separately. The last convolutional layer has only 3 convolution kernels, its initial position is 123, and the position of the convolution kernel after the scramble in the layer is only 5 cases: 132 , 213, 231, 312 and 321. As shown in Figure 6, scrambling the position of the convolution kernel in the last convolutional layer alone will only make the secret image extracted by the extraction network model different from the original secret image, and will still make the information in the secret image different. Expose, therefore, does not use the extraction network model obtained by in-layer scrambling of the positions of the convolution kernels in the last convolutional layer alone.

发送方通过将超混沌置乱系统的控制参数a=10,b=8/3,c=28,-1.52<r≤-0.06以及状态变量发送至接收方,并与接收方约定置乱算法的方式为层内置乱还是层间置乱,对哪些卷积层或反卷积层进行置乱,从而实现置乱算法的提前约定。The sender sends the control parameters a=10, b=8/3, c=28, -1.52<r≤-0.06 and state variables of the hyperchaotic scrambling system to the receiver, and agrees with the receiver on the scrambling algorithm. The method is intra-layer scrambling or inter-layer scrambling, and which convolutional or deconvolutional layers are scrambled, so as to realize the advance agreement of the scrambling algorithm.

作为其他实施方式,也可约定采用较为简单的置乱方法,此时,发送方与接收方无需提前约定控制参数。例如,对于层内置乱,将某个卷积层中卷积核的位置按照约定的规则进行调换,如首尾调换或者关于卷积核的中间位置对称调换;对于层间置乱,将某两层卷积层中相同位置的卷积核位置调换。As other implementation manners, a relatively simple scrambling method may also be agreed upon. In this case, the sender and receiver do not need to agree on control parameters in advance. For example, for intra-layer scrambling, the positions of the convolution kernels in a convolutional layer are exchanged according to the agreed rules, such as the end-to-end exchange or the symmetrical exchange about the middle position of the convolution kernels; for inter-layer scrambling, some two layers The position of the convolution kernel at the same position in the convolutional layer is swapped.

为提高后续图像隐写过程的安全性,发送方也可定期与接收方重新约定置乱算法。In order to improve the security of the subsequent image steganography process, the sender can also regularly re-agree with the receiver on the scrambling algorithm.

3、接收方收到提取网络模型后,首先根据发送方预先发送的混沌置乱系统的控制参数a=10,b=8/3,c=28,-1.52<r≤-0.06重构混沌置乱系统模型,然后将收到的状态变量作为密钥,将收到的提取网络作为待解密的对象,将状态变量和提取网络输入重构出的混沌置乱系统模型,通过约定的置乱算法对提取网络模型进行置乱解密,将其恢复为原提取网络模型。因此,接收方能够利用原提取网络模型对隐藏有秘密图像的载密图像进行提取,从而得到秘密图像。3. After receiving the extracted network model, the receiver first reconstructs the chaotic scrambling system according to the control parameters a=10, b=8/3, c=28, -1.52<r≤-0.06 of the chaotic scrambling system sent by the sender in advance. Then use the received state variable as the key and the received extraction network as the object to be decrypted, reconstruct the chaotic scrambled system model from the state variable and the extracted network input, and use the agreed scrambling algorithm Scramble and decrypt the extracted network model and restore it to the original extracted network model. Therefore, the receiver can use the original extraction network model to extract the secret image with the secret image hidden, so as to obtain the secret image.

采用本发明,能够对图像隐写网络模型中的提取网络模型进行加密,进一步提高了图像隐写的安全性。By adopting the invention, the extraction network model in the image steganography network model can be encrypted, and the security of image steganography is further improved.

Claims (10)

1. An image steganography model protection method based on extraction network parameter scrambling is characterized by comprising the following steps:
s1, hiding the secret image to be sent into a carrier image by a sender through the trained hidden network model to obtain a corresponding secret-carrying image, and obtaining a trained extraction network model, wherein the hidden network model and the extraction network model jointly form an image steganography network for deep learning;
s2, the sender scrambles the trained parameters of the extraction network model through an agreed scrambling algorithm, and reconstructs the parameters according to the scrambled parameters of the extraction network model to obtain a new extraction network model; the sender sends the secret-carrying image and the new extraction network model to the receiver; the promised scrambling algorithm satisfies the following conditions: for the same secret-carrying image, the similarity of the secret image extracted by the extraction network model before scrambling and the secret image extracted by the extraction network model after scrambling is lower than a set threshold value;
and S3, after receiving the new extracted network model, the receiver scrambles and decrypts the new extracted network model according to the agreed scrambling algorithm to obtain the extracted network model before scrambling, and extracts the received secret-carrying image according to the extracted network model before scrambling to obtain the secret image.
2. The image steganography model protection method based on extraction network parameter scrambling of claim 1, wherein the steganography network model and the extraction network model both adopt a deep neural convolution network, and the scrambling operation refers to performing in-layer scrambling on positions of convolution kernels in one or more convolutional layers in the trained extraction network model or performing interlayer scrambling on positions of convolution kernels in different convolutional layers; the position of the convolution kernel is changed only in the convolution layer when the layers are scrambled, and the position of the convolution kernel is changed in different convolution layers when the layers are scrambled.
3. The image steganography model protection method based on extraction network parameter scrambling of claim 2, wherein the agreed scrambling algorithm employs a hyper-Lorenz chaotic system.
4. The image steganography model protection method based on extraction network parameter scrambling as claimed in claim 1, wherein the similarity is determined by using structural similarity analysis method SSIM.
5. The image steganography model protection method based on extraction network parameter scrambling of claim 2, wherein the extraction network model comprises an upsampling module, a pooling layer, a downsampling module, and a convolution layer connected to each other; the upsampling module and the downsampling module each include 4 convolutional layers.
6. The image steganography model protection method based on extraction network parameter scrambling of claim 5, wherein in the scrambling operation in step S2, the 1 st, 2 nd or 4 th convolution layer of the up-sampling module is subjected to intra-layer scrambling, or the 3 rd or 4 th convolution layer of the down-sampling module is subjected to intra-layer scrambling.
7. The image steganography model protection method based on extraction network parameter scrambling of claim 5, wherein in the scrambling operation of step S2, the 1 st, 2 nd and 4 th convolution layers of the up-sampling module and the 3 rd and 4 th convolution layers of the down-sampling module are subjected to interlayer scrambling.
8. The image steganography model protection method based on extraction network parameter scrambling of claim 5, wherein in the scrambling operation in step S2, the 4 convolution layers of the upsampling module are subjected to interlayer scrambling.
9. The image steganography model protection method based on extracted network parameter scrambling as claimed in claim 5, wherein in step S2, when the scrambling operation is performed, the inter-layer scrambling is performed on 4 convolution layers of the down-sampling module.
10. The method for protecting an image steganography model based on extracted network parameter scrambling of claim 5, wherein in the scrambling operation in step S2, the layers of 9 convolution layers in the extracted network model are scrambled.
CN202210458370.4A 2022-04-27 2022-04-27 A method for protecting image steganography model based on extracting network parameter scrambling Active CN114897658B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210458370.4A CN114897658B (en) 2022-04-27 2022-04-27 A method for protecting image steganography model based on extracting network parameter scrambling

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210458370.4A CN114897658B (en) 2022-04-27 2022-04-27 A method for protecting image steganography model based on extracting network parameter scrambling

Publications (2)

Publication Number Publication Date
CN114897658A true CN114897658A (en) 2022-08-12
CN114897658B CN114897658B (en) 2024-08-16

Family

ID=82718787

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210458370.4A Active CN114897658B (en) 2022-04-27 2022-04-27 A method for protecting image steganography model based on extracting network parameter scrambling

Country Status (1)

Country Link
CN (1) CN114897658B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024255196A1 (en) * 2023-06-15 2024-12-19 杭州海康威视数字技术股份有限公司 Image processing method, apparatus and system and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165082A1 (en) * 2015-04-15 2016-10-20 中国科学院自动化研究所 Image stego-detection method based on deep learning
CN112926607A (en) * 2021-04-28 2021-06-08 河南大学 Two-branch network image steganography framework and method based on convolutional neural network
CN113034336A (en) * 2021-03-29 2021-06-25 大连海事大学 Encryption and steganography dual-image protection method based on 2D-TSCC chaotic system
CN113298689A (en) * 2021-06-22 2021-08-24 河南师范大学 Large-capacity image steganography method
CN114049246A (en) * 2021-11-10 2022-02-15 长春理工大学 Information hiding method and system based on wavelet transformation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165082A1 (en) * 2015-04-15 2016-10-20 中国科学院自动化研究所 Image stego-detection method based on deep learning
CN113034336A (en) * 2021-03-29 2021-06-25 大连海事大学 Encryption and steganography dual-image protection method based on 2D-TSCC chaotic system
CN112926607A (en) * 2021-04-28 2021-06-08 河南大学 Two-branch network image steganography framework and method based on convolutional neural network
CN113298689A (en) * 2021-06-22 2021-08-24 河南师范大学 Large-capacity image steganography method
CN114049246A (en) * 2021-11-10 2022-02-15 长春理工大学 Information hiding method and system based on wavelet transformation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
付章杰;王帆;孙星明;王彦;: "基于深度学习的图像隐写方法研究", 计算机学报, no. 09, 15 September 2020 (2020-09-15) *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024255196A1 (en) * 2023-06-15 2024-12-19 杭州海康威视数字技术股份有限公司 Image processing method, apparatus and system and device

Also Published As

Publication number Publication date
CN114897658B (en) 2024-08-16

Similar Documents

Publication Publication Date Title
Khan et al. IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network
Prasad et al. An RGB colour image steganography scheme using overlapping block-based pixel-value differencing
Anand et al. Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare
CN107240061A (en) A kind of watermark insertion, extracting method and device based on Dynamic BP neural
Bhautmage et al. Advanced video steganography algorithm
Kanzariya Nitin et al. Comparison of various images steganography techniques
Huang et al. The Study of Data Hiding in Medical Images.
CN113992810B (en) Agile image encryption method based on deep learning
Neamah et al. Hide text depending on the three channels of pixels in color images using the modified LSB algorithm
Abdullah et al. Secure data transfer over internet using image steganography
CN114567711A (en) Large-capacity encrypted image information hiding method based on block capacity label
Wang et al. TPE-ISE: approximate thumbnail preserving encryption based on multilevel DWT information self-embedding
CN114897658B (en) A method for protecting image steganography model based on extracting network parameter scrambling
Hegde et al. Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis
CN103971321B (en) Method and system for steganalysis of JPEG compatibility
Rizzi et al. Digital watermarking for healthcare: a survey of ECG watermarking methods in telemedicine
El-Shafai et al. Proposed Privacy Preservation Technique for Color Medical Images.
Chinniyan et al. Image Steganography Using Deep Neural Networks.
Qiu Generative image steganography scheme based on deep learning
Ch et al. Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network
Osman et al. Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes
CN114092306B (en) Medical image robust watermark embedding and extracting method based on InceptionV deep learning network
Thakre et al. Dual image steganography for communicating high security information
Milli et al. DEVELOPMENT OF NOVEL COMPARISON BASED STEGANOGRAPHY ALGORITHMS ON MULTIMEDIA TO HIDE PRIVATE DATA
Pundkar et al. Steganographic scheme for outsourced biomedical time series data using an intelligent learning-a research

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant