CN117611422B - Image steganography method based on Moire pattern generation - Google Patents

Image steganography method based on Moire pattern generation Download PDF

Info

Publication number
CN117611422B
CN117611422B CN202410089255.3A CN202410089255A CN117611422B CN 117611422 B CN117611422 B CN 117611422B CN 202410089255 A CN202410089255 A CN 202410089255A CN 117611422 B CN117611422 B CN 117611422B
Authority
CN
China
Prior art keywords
image
sub
mole
pattern
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410089255.3A
Other languages
Chinese (zh)
Other versions
CN117611422A (en
Inventor
冯丙文
覃铁伟
夏志华
缪雨豪
尹舟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN202410089255.3A priority Critical patent/CN117611422B/en
Publication of CN117611422A publication Critical patent/CN117611422A/en
Application granted granted Critical
Publication of CN117611422B publication Critical patent/CN117611422B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • G06N3/0455Auto-encoder networks; Encoder-decoder networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/0464Convolutional networks [CNN, ConvNet]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/0475Generative networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/094Adversarial learning
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02TCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
    • Y02T10/00Road transport of goods or passengers
    • Y02T10/10Internal combustion engine [ICE] based vehicles
    • Y02T10/40Engine management systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an image steganography method based on mole pattern generation, which belongs to the field of image information hiding and comprises the following steps: acquiring a clean image and a noise vector; inputting the clean image and the noise vector into a condition generation countermeasure network to obtain sub-mole pattern with different layers; acquiring a secret message, hiding the secret message in the sub-mole pattern based on an encoder, and obtaining a sub-mole pattern of the hidden message; and generating a secret-containing image based on the sub-mole pattern of the hidden message and the clean image. The invention uses the conditional gan frame to generate the mole pattern, which simplifies the artificial design flow in the traditional synthesis mode; the secret message is hidden in the sub-mole pattern through the encoder, so that the sub-mole pattern of the hidden message is obtained; the embedding strategy of the present invention can improve the non-detectability of conventional steganalysis tools.

Description

Image steganography method based on Moire pattern generation
Technical Field
The invention belongs to the technical field of image information hiding, and particularly relates to an image steganography method based on Moire pattern generation.
Background
Steganography is a secret communication technique. It uses common media such as text, audio, image or video to hide the secret information so that any third party other than the sender and the receiver cannot find the existence of the secret information. Therefore, it is widely used as a necessary complement to cryptography to ensure privacy of data.
Most image generation-based steganography schemes currently attempt to synthesize realistic images. In practice, depth synthesis can synthesize not only images, but also noise and distortion on natural images. Since these noise and distortions are characteristic of natural images, secret information therein can be hidden without being suspected. For this, we explore the moire pattern on natural images, which is typically caused by shooting screen content using a smartphone. They are very common and come in a variety of shapes, colors and frequency ranges. This is advantageous for their application in hiding secret messages.
Currently existing moire synthesis is accomplished by simulating the screen shot process. It requires a series of manual designs and takes into account a number of influencing factors, the process is complex and difficult to control.
Disclosure of Invention
The invention provides an image steganography method based on mole pattern generation, which utilizes the advantage of deep learning, reduces the artificial design of mole pattern generation, and improves the robustness and safety of the steganography method so as to solve the technical problems in the prior art.
In order to achieve the above object, the present invention provides an image steganography method based on moire generation, including:
acquiring a clean image and a noise vector;
inputting the clean image and the noise vector into a condition generation countermeasure network to obtain sub-mole pattern with different layers;
Acquiring a secret message, hiding the secret message in the sub-mole pattern based on an encoder, and obtaining a sub-mole pattern of the hidden message;
And generating a secret-containing image based on the sub-mole pattern of the hidden message and the clean image.
Preferably, the condition generating countermeasure network includes: a generator, a discriminator and an analyzer, by which the clean image and the noise vector are generated into different levels of sub-moire patterns.
Preferably, the generator is a multi-branch structure, each branch comprising: a downsampled block, a number of convolutions blocks, and an upsampled block.
Preferably, the method further comprises:
adding the sub moire patterns to obtain moire patterns, and generating moire images based on the moire patterns and the clean images;
And identifying the authenticity of the Moire image through the identifier.
Preferably, hiding the secret message in the sub-moire pattern based on an encoder includes:
and acquiring a binary secret message, converting the secret message into a two-dimensional vector with the same size as the sub-mole pattern, and inputting the two-dimensional vector and the sub-mole pattern into an encoder to obtain the sub-mole pattern of the hidden message.
Preferably, the encoder comprises: a number of convolution blocks and a gaussian low pass filter layer, the convolution blocks comprising: the convolutional layers, batchnorm layers, and relu activate functions.
Preferably, the method further comprises:
and adding the sub-mole pattern of the unhidden message to the clean image to obtain a generated mole pattern image.
Preferably, the method further comprises:
and distinguishing the secret image and the moire image respectively based on whether the secret message is contained or not by the analyzer.
Preferably, the method further comprises: and inputting the secret image to a decoder to obtain a secret message.
Preferably, the decoder comprises: a number of convolution blocks, an adaptive averaging pooling layer and a linear layer, the convolution blocks comprising: the convolutional layers, batchnorm layers, and relu activate functions.
Compared with the prior art, the invention has the following advantages and technical effects:
The invention provides an image steganography method based on mole pattern generation, which is characterized in that the clean image and the noise vector are input into a condition generation countermeasure network to obtain sub-mole pattern patterns with different layers; the invention uses the conditional gan frame to generate the mole pattern, which simplifies the artificial design flow in the traditional synthesis mode;
the secret message is hidden in the sub-mole pattern through the encoder, so that the sub-mole pattern of the hidden message is obtained; the method embeds the message into the moire pattern caused by the shooting screen instead of the image content, and the embedding strategy can improve the undetectability of the traditional steganography analysis tool, and meanwhile, the moire pattern caused by the shooting screen does not cause excessive influence on the content of the clean image, so that the method has certain attractive appearance. Each branch is connected with an encoder, so that messages are repeatedly embedded into sub-moire patterns of different layers, the frequency range of the embedding is increased, and the structure of a plurality of encoders enables the invention to be more robust to noise.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
FIG. 1 is a flow chart of an image steganography method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a multi-branch generator network according to an embodiment of the present invention;
Fig. 3 is a schematic diagram of an encoder network structure according to an embodiment of the present invention.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
Example 1
As shown in fig. 1, in this embodiment, an image steganography method based on moire generation is provided, which specifically includes:
Step 1, reading 50000 the clean image and the corresponding real moire image from the moire data set tip2018, performing central clipping on the image according to the size of 600x600, and uniformly scaling the clipped image to the size of 256x 256.
Step 2, randomly sampling a noise vector of 3x256x256 from normal distribution; the noise vector and the clean image are spliced according to the channel dimension and input to the generator.
As shown in fig. 2, the generator is a multi-branch structure with 6 convolutions blocks and corresponding upsampling blocks for each branch. The first convolution block consists of a layer of convolution layers with the convolution kernel size of 3 and the step length of 1, relu activation functions and a layer of convolution layers with the convolution kernel size of 3 and the step length of 1 in sequence; the remaining convolution blocks consist of a sequence of convolutions of 3 convolutions of step size 1 and relu activation functions. The first convolution blocks of the other branches, except the first branch, all perform a downsampling operation of halving the input features. The output of the first convolution block of each branch is the input of the next branch. The first branch inputs a noise vector and a clean image. The upsampling block consists of a layer of deconvolution layers and relu activation functions. Each branch needs to be enlarged to the same size as the original image and has a channel number of 3. Thus, five different levels of sub-moire patterns can be obtained.
The loss function of the generator is:
where A denotes a discriminator, G denotes a generator, Z is a noise vector, I C is a clean image, T C is a true moire pattern (obtained by subtracting the true moire image from the clean image), L C is an L1 distance, and λ 0 is set to 0.1.
Step 3, adding the five sub-mole pattern patterns with different layers to obtain a generated mole pattern; adding a clean image to the generated moire pattern to obtain a generated moire image; the generated moire image and the real moire image are input into a discriminator; the discriminator judges the authenticity and improves the generation quality of the generator.
The discriminator network architecture is PatchGAN of the discriminator. The discriminator has five convolutions in total. The first four convolution blocks consist of a layer of downsampled convolutions, batchnorm layers and leakrelu activation functions, and the last convolution block consists of a layer of downsampled convolutions and sigmoid functions.
The loss function of the discriminator is:
in this embodiment, in the training process of the generator, the Adam optimizer is used to update the network parameters, and the learning rate is 0.0002. After training, a pre-training model of the generator is obtained.
Step 4, randomly sampling 0/1 binary message. Each bit of message is copied into a two-dimensional vector consistent with the image size, and the copied message vector is input to an encoder together with the sub-mole pattern.
Each sub-moire pattern corresponds to one encoder. Multiple encoders are advantageous to improve the robustness of the method.
As shown in fig. 3, the encoder consists of 6 convolution blocks and a gaussian low pass filter layer. Each convolution block consists of a layer of convolutions, batchnorm layers and relu activation function sequences. The first convolution block inputs a sub-moire pattern. The fifth convolution block inputs the concatenation of the intermediate feature and the message. The last output is the sub-moire pattern of the hidden message.
The sub-mole pattern of the hidden message is multiplied by a weight coefficient to adjust the robustness and security of the steganography.
The encoder loss function is:
Where S is the analyzer, E i is the i-th encoder, T i is the i-th generated sub-moire pattern, m represents a secret message, λ 1 is 1, and λ 2 is 0.001.
And 5, adding the sub-mole pattern of the hidden message and the sub-mole pattern of the non-hidden message to the clean image respectively to obtain a secret image and a generated mole pattern image.
And 6, inputting the secret image and the generated moire image into an analyzer, and distinguishing by the analyzer to improve the safety of the method.
The analyzer loss function is:
And 7, inputting the secret image into a decoder through Gaussian noise and jpeg compressed disturbance.
The decoder extracts the secret message from the secret-containing image. The decoder consists of seven convolution blocks, an adaptive average pooling layer and a linear layer. Each convolution block consists of a layer of convolutions, batchnorm layers and relu activation function sequences.
The decoder loss function is:
Wherein the method comprises the steps of Is a secret image and D is a decoder.
In this embodiment, in the decoder training process, an Adam optimizer is used to update network parameters, and the learning rate is 0.001.
The present application is not limited to the above-mentioned embodiments, and any changes or substitutions that can be easily understood by those skilled in the art within the technical scope of the present application are intended to be included in the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.

Claims (7)

1. An image steganography method based on moire generation, comprising:
acquiring a clean image and a noise vector;
inputting the clean image and the noise vector into a condition generation countermeasure network to obtain sub-mole pattern with different layers;
the condition generating countermeasure network includes: a generator, a discriminator, and an analyzer, through which the clean image and the noise vector are generated into different levels of sub-moire patterns;
The generator is a multi-branch structure, each branch comprising: a downsampling block, a plurality of convolution blocks and an upsampling block; the output of each branch in the multi-branch structure is a sub-mole pattern with different layers;
Acquiring a secret message, hiding the secret message in the sub-mole pattern based on an encoder, and obtaining a sub-mole pattern of the hidden message;
And generating a secret-containing image based on the sub-mole pattern of the hidden message and the clean image.
2. The mole-based image steganography method of claim 1, further comprising:
adding the sub moire patterns to obtain moire patterns, and generating moire images based on the moire patterns and the clean images;
And identifying the authenticity of the Moire image through the identifier.
3. The mole-based generated image steganography method of claim 1, wherein hiding the secret message in the sub-mole pattern based on an encoder comprises:
and acquiring a binary secret message, converting the secret message into a two-dimensional vector with the same size as the sub-mole pattern, and inputting the two-dimensional vector and the sub-mole pattern into an encoder to obtain the sub-mole pattern of the hidden message.
4. The mole-based image steganography method of claim 1, wherein the encoder comprises: a number of convolution blocks and a gaussian low pass filter layer, the convolution blocks comprising: the convolutional layers, batchnorm layers, and relu activate functions.
5. The mole-based image steganography method of claim 2, further comprising:
and distinguishing the secret image and the moire image respectively based on whether the secret message is contained or not by the analyzer.
6. The mole-based image steganography method of claim 1, further comprising: and inputting the secret image to a decoder to obtain a secret message.
7. The mole-based image steganography method of claim 6, wherein the decoder comprises: a number of convolution blocks, an adaptive averaging pooling layer and a linear layer, the convolution blocks comprising: the convolutional layers, batchnorm layers, and relu activate functions.
CN202410089255.3A 2024-01-23 2024-01-23 Image steganography method based on Moire pattern generation Active CN117611422B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410089255.3A CN117611422B (en) 2024-01-23 2024-01-23 Image steganography method based on Moire pattern generation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410089255.3A CN117611422B (en) 2024-01-23 2024-01-23 Image steganography method based on Moire pattern generation

Publications (2)

Publication Number Publication Date
CN117611422A CN117611422A (en) 2024-02-27
CN117611422B true CN117611422B (en) 2024-05-07

Family

ID=89958242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410089255.3A Active CN117611422B (en) 2024-01-23 2024-01-23 Image steganography method based on Moire pattern generation

Country Status (1)

Country Link
CN (1) CN117611422B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002279480A (en) * 2001-03-19 2002-09-27 Dainippon Printing Co Ltd Image forming body and device for determining authenticity thereof
CN113486377A (en) * 2021-07-22 2021-10-08 维沃移动通信(杭州)有限公司 Image encryption method and device, electronic equipment and readable storage medium
CN114827381A (en) * 2022-06-30 2022-07-29 北京大学深圳研究生院 Strong robustness image steganography method and system based on condition standardization flow model
WO2023151511A1 (en) * 2022-02-08 2023-08-17 维沃移动通信有限公司 Model training method and apparatus, image moire removal method and apparatus, and electronic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002279480A (en) * 2001-03-19 2002-09-27 Dainippon Printing Co Ltd Image forming body and device for determining authenticity thereof
CN113486377A (en) * 2021-07-22 2021-10-08 维沃移动通信(杭州)有限公司 Image encryption method and device, electronic equipment and readable storage medium
WO2023151511A1 (en) * 2022-02-08 2023-08-17 维沃移动通信有限公司 Model training method and apparatus, image moire removal method and apparatus, and electronic device
CN114827381A (en) * 2022-06-30 2022-07-29 北京大学深圳研究生院 Strong robustness image steganography method and system based on condition standardization flow model

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Image hiding based on time-averaging moiré;Minvydas Ragulskis , Algiment Aleksa;Optics Communications;20091231;第2752-2759页 *
Minvydas Ragulskis, Algiment Aleksa, Jurate Ragulskiene.Image Hiding Based on Circular Moiré Fringes.WSEAS TRANSACTIONS on MATHEMATICS.第90-99页. *
基于微结构网点的信息隐藏防伪技术研究;郭凌华 等;西安理工大学学报;20161230(第04期);第416-421页 *
基于随机相位矩阵的版权信息隐藏方法;曹超;陈汝钧;;计算机应用;20081215(第S2期);第257-259页 *

Also Published As

Publication number Publication date
CN117611422A (en) 2024-02-27

Similar Documents

Publication Publication Date Title
CN108346125B (en) Airspace image steganography method and system based on generation countermeasure network
Miller et al. Applying informed coding and embedding to design a robust high-capacity watermark
CN109993678B (en) Robust information hiding method based on deep confrontation generation network
Wang et al. Image hiding by optimal LSB substitution and genetic algorithm
CN111640444B (en) CNN-based adaptive audio steganography method and secret information extraction method
CN112634117B (en) End-to-end JPEG domain image steganography method based on generation of countermeasure network
Wei et al. Generative steganography network
CN110232650B (en) Color image watermark embedding method, detection method and system
CN115131188A (en) Robust image watermarking method based on generation countermeasure network
CN112132737B (en) Image robust steganography method without reference generation
CN114157773B (en) Image steganography method based on convolutional neural network and frequency domain attention
CN111681155A (en) GIF dynamic image watermarking method based on deep learning
CN116091288A (en) Diffusion model-based image steganography method
CN111327785B (en) Information steganography communication method based on automatic image construction of countermeasure generation network
Liao et al. GIFMarking: The robust watermarking for animated GIF based deep learning
Chanchal et al. A comprehensive survey on neural network based image data hiding scheme
CN117611422B (en) Image steganography method based on Moire pattern generation
CN115880125B (en) Soft fusion robust image watermarking method based on Transformer
CN114630130B (en) Face-changing video tracing method and system based on deep learning
CN114900586B (en) Information steganography method and device based on DCGAN
CN116456037A (en) Diffusion model-based generated image steganography method
CN105279728A (en) Intelligent mobile terminal image steganography method based on secret information encryption pretreatment
DING et al. High quality data hiding in halftone image based on block conjugate
CN108416726B (en) A kind of digital picture steganography method keeping pixel frequency balance
Wu et al. Modified multiway pixel-value differencing methods based on general quantization ranges for image steganography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant