WO2022237078A1 - Color image steganography method based on generative adversarial network - Google Patents

Color image steganography method based on generative adversarial network Download PDF

Info

Publication number
WO2022237078A1
WO2022237078A1 PCT/CN2021/125637 CN2021125637W WO2022237078A1 WO 2022237078 A1 WO2022237078 A1 WO 2022237078A1 CN 2021125637 W CN2021125637 W CN 2021125637W WO 2022237078 A1 WO2022237078 A1 WO 2022237078A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
feature map
network
convolution
steganographic
Prior art date
Application number
PCT/CN2021/125637
Other languages
French (fr)
Chinese (zh)
Inventor
李京兵
曾城
刘婧
黄梦醒
Original Assignee
海南大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 海南大学 filed Critical 海南大学
Publication of WO2022237078A1 publication Critical patent/WO2022237078A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/048Activation functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components

Definitions

  • the invention relates to the technical field of signal processing, in particular to a color image steganography method based on generating an adversarial network.
  • Convolutional neural network has superior feature extraction and feature representation capabilities, and has been widely used in tasks such as computer vision and natural language processing, and has achieved remarkable results. Therefore, many scholars try to use the powerful feature extraction ability of deep learning to apply deep learning theory to image steganography.
  • the evaluation indicators of image steganography mainly include imperceptibility, security and steganographic capacity.
  • the imperceptibility mainly refers to the fact that the steganographic image cannot be detected by human eyes
  • the security mainly refers to the ability to resist certain anti-steganographic analysis
  • the steganographic capacity refers to the ability to embed enough information in the carrier.
  • the more secret information is embedded the less imperceptible the image will be.
  • a color image steganography method based on generative confrontation network including:
  • an image steganographic model consisting of a preprocessing network, a hidden network, an extraction network and a steganalysis network;
  • the preprocessing network is used to preprocess the carrier image and the secret image;
  • the hidden network is used to hiding the secret image in the carrier image to obtain a steganographic image;
  • the extraction network is used to obtain an extracted image from the steganographic image;
  • the steganalysis network is used to analyze the carrier image and the steganographic image Steganalysis of steganographic images;
  • the image steganography model constructed is trained and parameter-tuned through the training set and the verification set; the hidden network and the steganalysis network form an adversarial training;
  • test set to test the performance of the image steganography model after parameter tuning.
  • the training of the constructed image steganography model includes:
  • the carrier image and the secret image are respectively input into the preprocessing network to obtain a first feature map, include:
  • the cover image and the secret image are respectively input into the two branches of the preprocessing network, and the cover image and the secret image pass through the first convolutional layer of each branch respectively, and are activated with a ReLU activation function , get the first carrier feature map and the first secret feature map respectively;
  • the input of the first feature map into the hidden network to obtain the steganographic image includes:
  • the first feature map is input to the first convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain a second feature map;
  • the first feature map is merged with the second feature map by skip connection, and input to the second convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the third feature picture;
  • the first feature map and the second feature map are merged by skip connection and the third feature map respectively, and input to the third convolutional layer of the hidden network for convolution and using ReLU
  • the function is activated to obtain the fourth feature map
  • the steganographic image is obtained by adding the cover image to the seventh feature map through skip connections.
  • the inputting the steganographic image into the extraction network to obtain the extraction image includes:
  • the steganographic image is input to the first convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the first steganographic feature map;
  • the fifth steganographic feature map is input to the sixth convolutional layer of the extraction network for convolution and activation using a Tanh function to obtain the extracted image.
  • the carrier image and the steganographic image are input into the steganalysis network as input images to obtain the The analysis results of the above input image, including:
  • the sixth input feature map is input to the pyramid pooling layer to obtain the first vector
  • the first vector is input to the fully connected layer, activated by a Sigmoid function, and the second vector is obtained as an analysis result of the input image.
  • the convolution kernels of the preprocessing network are all 3x3, and the step size is 1; each branch of the preprocessing network
  • the number of convolution kernels in the first convolution layer is 128, the number of convolution kernels in the second convolution layer is 64, and the number of convolution kernels in the third convolution layer is 32;
  • the convolution kernels of the hidden network are all 3x3, and the step size is 1; the number of convolution kernels in the first convolution layer of the hidden network is 32, and the number of convolution kernels in the second convolution layer
  • the number of convolution kernels in the third convolution layer is 128, the number of convolution kernels in the fourth convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 64.
  • the number of convolution kernels in each convolutional layer is 3;
  • the convolution kernels of the extraction network are all 3x3, and the step size is 1; the number of convolution kernels in the first convolution layer of the extraction network is 32, and the number of convolution kernels in the second convolution layer
  • the number of convolution kernels in the third convolution layer is 128, the number of convolution kernels in the fourth convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 64.
  • the number of convolution kernels in each convolutional layer is 3;
  • the convolution kernels of the steganalysis network are all 1x1, and the step size is 2; the number of convolution kernels in the first convolution layer of the steganalysis network is 24, and the number of convolution kernels in the second convolution layer is 24.
  • the number of convolution kernels is 48, the number of convolution kernels in the third convolution layer is 96, the number of convolution kernels in the fourth convolution layer is 128, and the number of convolution kernels in the fifth convolution layer is 128.
  • the number of convolution kernels in the sixth convolution layer is 128.
  • the parameter tuning of the constructed image steganography model includes:
  • the performance test of the image steganography model after parameter tuning includes:
  • the generalization ability test is carried out on the image steganography model after parameter tuning.
  • the quality test is performed on the output steganographic image and the extracted image corresponding to the test set, including:
  • the quality test result is obtained.
  • a color image steganography method based on generative adversarial networks includes: making a carrier image dataset and a secret image dataset, and separating the carrier image dataset and the secret image dataset Divided into training set, validation set and test set; the cover image in the cover image dataset and the secret image in the secret image dataset have the same size; build an image steganography network consisting of a preprocessing network, a hidden network, an extraction network and a steganalysis network model; the preprocessing network is used to preprocess the cover image and the secret image; the hidden network is used to hide the secret image into the cover image to obtain the steganographic image; the extraction network is used to extract the image from the steganographic image; the steganographic The analysis network is used to conduct steganalysis on the carrier image and the steganographic image; the image steganography model constructed through the training set and the verification set is trained and the parameters are tuned; the hidden network and the steganalysis network form an adversarial
  • the image steganography model finally obtained by the above-mentioned color image steganography method provided by the present invention can embed color images into color images of the same size, and can obtain high-quality steganographic images and extracted images through confrontation training, and simultaneously steganographic images It has a certain ability to resist steganalysis.
  • FIG. 1 shows a flow chart of a color image steganography method based on a generative adversarial network provided by an embodiment of the present invention
  • FIG. 2 shows a schematic structural diagram of an image steganography model provided by an embodiment of the present invention
  • FIG. 3 shows a schematic diagram of a specific structure of an image steganography model provided by an embodiment of the present invention
  • Fig. 4 shows the anti-steganalysis ROC diagram provided by the embodiment of the present invention.
  • the present invention provides a kind of color image steganography method based on generation confrontation network, as shown in Figure 1, comprises the following steps:
  • 24,000 images can be randomly selected from the ImageNet dataset, and the size of the images is adjusted to the same size (such as 256x256), and divided into a cover image dataset and a secret image dataset; and then these two datasets are divided into three disjoint parts, where the training set has a total of 20,000 images, the validation set has a total of 2,000 images, and the test set has a total of 2,000 images.
  • S102 Construct an image steganography model consisting of a preprocessing network, a hidden network, an extraction network, and a steganalysis network; the preprocessing network is used to preprocess the carrier image and the secret image to improve the hiding efficiency of the hidden network; the hidden network is used to It is used to hide the secret image into the cover image to obtain the steganographic image; the extraction network is used to obtain the extracted image from the steganographic image; the steganalysis network is used to steganalyze the cover image and the steganographic image.
  • the preprocessing network is used to preprocess the carrier image and the secret image to improve the hiding efficiency of the hidden network
  • the hidden network is used to It is used to hide the secret image into the cover image to obtain the steganographic image
  • the extraction network is used to obtain the extracted image from the steganographic image
  • the steganalysis network is used to steganalyze the cover image and the steganographic image.
  • the preprocessing network has two input branches and one output; the input of the hidden network is the output of the preprocessing network, and the output is the steganographic image; the extraction network extracts the secret image from the steganographic image; the steganalysis network can Determine whether the input image is a natural image or a steganographic image.
  • the hidden network uses a dense residual module, which can transfer the low-level features of the image to each subsequent layer, which helps to hide the details of the secret image. Simultaneous adversarial training of hidden network and steganalysis network can improve the quality and security of steganographic images.
  • test set Use the test set to perform a performance test on the image steganography model after parameter tuning.
  • the finally obtained image steganography model can embed color images into color images of the same size, and high-quality steganography can be obtained through adversarial training Image and image extraction, while the steganographic image has a certain ability to resist steganalysis.
  • step S103 trains the constructed image steganography model, which may include the following steps:
  • Step 1 Input the carrier image C(0) and the secret image S(0) respectively into the preprocessing network to obtain the first feature map I(1);
  • Step 2 Input the first feature map I(1) into the hidden network to obtain the steganographic image C'(0);
  • Step 3 Input the steganographic image C'(0) into the extraction network to obtain the extracted image S'(0);
  • Step 4 Input the carrier image C(0) and the steganographic image C'(0) as the input image R(0) into the steganalysis network to obtain the analysis result of the input image R(0).
  • the first feature map I(1) is obtained, which may specifically include the following steps:
  • the cover image C(0) and the secret image S(0) are respectively input into the two branches of the preprocessing network, and the cover image C(0) and the secret image S(0) respectively pass through the first convolutional layer of each branch , activate with the ReLU activation function to obtain the first carrier feature map C(1) and the first secret feature map S(1);
  • the convolution kernels of the preprocessing network are all 3x3, and the step size is 1; as shown in Figure 3 , the number of convolution kernels in the first convolution layer of each branch of the preprocessing network is 128, the number of convolution kernels in the second convolution layer is 64, and the number of convolution kernels in the third convolution layer for 32.
  • Writing the image C'(0) may specifically include the following steps:
  • the first feature map I(1) is merged with the second feature map I(2) by skip connection, and input to the second convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the first Three feature map I(3);
  • the first feature map I(1) and the second feature map I(2) are merged by skip connection and the third feature map I(3), respectively, and input to the third convolutional layer of the hidden network for convolution
  • the product sum is activated using the ReLU function to obtain the fourth feature map I(4);
  • the first feature map I(1), the second feature map I(2), the third feature map I(3) and the fourth feature map I(4) are respectively passed through the skip connection and the fifth feature map I(5) Merge and input to the fifth convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the sixth feature map I(6);
  • the first feature map I(1), the second feature map I(2), the third feature map I(3), the fourth feature map I(4) and the fifth feature map I(5) are respectively connected by skipping Merge with the sixth feature map I(6), and input it to the sixth convolutional layer of the hidden network for convolution and activation using the Tanh function to obtain the seventh feature map I(7);
  • the convolution kernels of the hidden network are all 3x3, and the step size is 1; as shown in Figure 3,
  • the number of convolution kernels in the first convolution layer of the hidden network is 32
  • the number of convolution kernels in the second convolution layer is 64
  • the number of convolution kernels in the first convolution layer is 64
  • the number of convolution kernels in the fifth convolution layer is 32
  • the number of convolution kernels in the sixth convolution layer is 3.
  • step 3 the steganographic image C'(0) is input to the extraction network to obtain the extraction
  • the image S'(0) may specifically include the following steps:
  • the convolution kernels of the extraction network are all 3x3, and the step size is 1; as shown in Figure 3,
  • the number of convolution kernels in the first convolution layer of the extraction network is 32
  • the number of convolution kernels in the second convolution layer is 64
  • the number of convolution kernels in the first convolution layer is 64
  • the number of convolution kernels in the fifth convolution layer is 32
  • the number of convolution kernels in the sixth convolution layer is 3.
  • step 4 the carrier image C(0) and the steganographic image C'(0) As the input image R(0) is input to the steganalysis network to obtain the analysis result of the input image R(0), which may specifically include the following steps:
  • the convolution kernel of the steganalysis network is 1x1, and the step size is 2; as shown in Figure 3 It shows that the number of convolution kernels in the first convolution layer of the steganalysis network is 24, the number of convolution kernels in the second convolution layer is 48, and the number of convolution kernels in the third convolution layer is 96.
  • the number of convolution kernels in the fourth convolution layer is 128, the number of convolution kernels in the fifth convolution layer is 128, and the number of convolution kernels in the sixth convolution layer is 128.
  • the process of constructing the image steganography model in the process of constructing the image steganography model, it is necessary to set the relevant parameters of model training, that is, to set the learning rate of the network model, Set the batch_size of images processed in a batch in the network model, set the iteration cycle epoch, set the optimizer of the network model optimizer, and set the training steps of the network, which can be trained in two steps: the first step is to train the steganalysis network, The second step trains the preprocessing network, hidden network and extraction network.
  • the process of tuning the parameters of the constructed image steganography model may include: the learning rate of the constructed image steganography network model, the number of batches of images batch_size, the iteration cycle epoch and the optimizer optimizer These parameters are tuned.
  • step S104 performs a performance test on the image steganography model after parameter tuning, which may specifically include: first, centralize the test The cover image and the secret image of the parameter are respectively input into the image steganographic network model after parameter tuning, and the steganographic image and the extracted image corresponding to the test set are output; then, the quality of the steganographic image and the extracted image corresponding to the output test set are Test; conduct a security test on the steganographic image corresponding to the output test set; conduct a generalization ability test on the image steganography model after parameter tuning.
  • the resulting steganographic image has high quality and security, and the model has good generalization ability.
  • the quality test of the steganographic image and the extracted image corresponding to the output test set may include : Calculate the PSNR (peak signal-to-noise ratio) value and SSIM (structural similarity) value between the steganographic image corresponding to the output test set and the cover image in the test set, and calculate the extracted image and test corresponding to the output test set The PSNR value and SSIM value between the concentrated secret images; according to the calculated PSNR value and SSIM value, the quality test result is obtained.
  • PSNR peak signal-to-noise ratio
  • SSIM structural similarity
  • the test set of the ImageNet dataset is tested, assuming that the test set has a total of 2000 images, of which 1000 images can be selected as carrier images, and the other 1000 images are secret images.
  • the quality test results are: the PSNR and SSIM of the carrier image and the steganographic image are 44.15 and 0.99, respectively, and the PSNR and SSIM of the secret image and the extracted image are 40.03 and 0.98, respectively, indicating that the image steganography model after parameter tuning High-quality steganographic images and extracted images can be obtained.
  • the steganalysis tool StegExpose can be used to perform steganographic analysis on the image, and the result is shown in Figure 4, a straight line in Figure 4 Indicates random prediction, and the curve on the upper left of the straight line represents the steganalysis of the image. It can be found that the curve is close to the straight line, indicating that StegExpose's steganalysis of the steganographic image is close to random prediction, indicating that the steganographic image has a certain anti-steganographic analysis ability.
  • 2000 images can be selected from each of the three data sets of LFW, VOC2007 and CoCo to verify the generalization of the image steganography model capabilities, as shown in Table 1:
  • RAM random access memory
  • ROM read-only memory
  • EEPROM electrically programmable ROM
  • EEPROM electrically erasable programmable ROM
  • registers hard disk, removable disk, CD-ROM, or any other Any other known storage medium.
  • a color image steganography method based on generative adversarial networks includes: making a carrier image data set and a secret image data set, and dividing the carrier image data set and the secret image data set into a training set and a verification set respectively and the test set; the size of the cover image in the cover image dataset and the secret image in the secret image dataset are the same; construct an image steganographic model consisting of a preprocessing network, a hidden network, an extraction network and a steganalysis network; the preprocessing network is used for Preprocess the cover image and the secret image; the hidden network is used to hide the secret image into the cover image to obtain the steganographic image; the extraction network is used to extract the image from the steganographic image; the steganalysis network is used to analyze the cover image Steganalysis with steganographic images; training and parameter tuning of the constructed image steganographic model through the training set and verification set; hidden network and steganalysis network form confrontation training; use the test set to optimize the parameters of the
  • the image steganography model finally obtained through the above-mentioned color image steganography method provided by the present invention can embed color images into color images of the same size, and can obtain high-quality steganographic images and extracted images through confrontational training, and simultaneously steganographic images It has a certain ability to resist steganalysis.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Molecular Biology (AREA)
  • Computational Linguistics (AREA)
  • Biophysics (AREA)
  • Biomedical Technology (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Image Processing (AREA)
  • Image Analysis (AREA)

Abstract

A color image steganography method based on a generative adversarial network. The method comprises: manufacturing a carrier image data set and a secret image data set, and dividing each of the carrier image data set and the secret image data set into a training set, a verification set and a test set (S101); constructing an image steganography model, which is composed of a pre-processing network, a hiding network, an extraction network and a steganalysis network (S102), wherein the pre-processing network is used for pre-processing a carrier image and a secret image, the hiding network is used for hiding the secret image in the carrier image, so as to obtain a steganographic image, the extraction network is used for obtaining an extracted image from the steganographic image, and the steganalysis network is used for performing steganalysis on the carrier image and the steganographic image; performing training and parameter tuning on the model by using the training set and the verification set, and forming adversarial training by using the hiding network and the steganalysis network (S103); and performing a performance test on the model by using the test set (S104). In this way, a high-quality steganographic image and extracted image can be obtained, and the steganographic image has an anti-steganalysis capability.

Description

一种基于生成对抗网络的彩色图像隐写方法A Color Image Steganography Method Based on Generative Adversarial Networks
本申请要求于2021年05月13日提交中国专利局、申请号为202110523597.8、发明名称为“一种基于生成对抗网络的彩色图像隐写方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202110523597.8 and the invention title "A Color Image Steganography Method Based on Generative Adversarial Network" submitted to the China Patent Office on May 13, 2021, the entire contents of which are incorporated by reference incorporated in this application.
技术领域technical field
本发明涉及信号处理技术领域,具体涉及一种基于生成对抗网络的彩色图像隐写方法。The invention relates to the technical field of signal processing, in particular to a color image steganography method based on generating an adversarial network.
背景技术Background technique
随着计算机技术的发展,信息的传递越来越方便,但是与此同时,信息的安全问题也面临着巨大的挑战。为了应对这些挑战,研究者提出了许多举措,比如数字水印,密码学和信息隐藏。信息隐藏一直是信息安全研究的重要领域,相比于其他领域,比如密码学是防止秘密消息被发现,而信息隐藏则需要隐藏信息传递的过程。相比于文字和音频,图像具有丰富的冗余信息,通常作为信息隐藏的载体,目前大多数信息隐藏研究都是以图像为载体,而秘密消息则可以是图像、文本或者音频等。图像隐写可以看作是一种伪装的加密技术,但它不同于传统的加密技术,图像隐写将消息嵌入到图像中而不改变其感知特性,保证嵌入秘密信息的载体在视觉上看起来与原始图像非常相似,从而避免监控者的注意和怀疑,避免被监控者截获和攻击。With the development of computer technology, the transmission of information is more and more convenient, but at the same time, the security of information is also facing great challenges. To deal with these challenges, researchers have proposed many measures, such as digital watermarking, cryptography and information hiding. Information hiding has always been an important field of information security research. Compared with other fields, such as cryptography is to prevent secret messages from being discovered, while information hiding needs to hide the process of information transmission. Compared with text and audio, images have rich redundant information, and are usually used as the carrier of information hiding. At present, most information hiding research uses images as carriers, while secret messages can be images, texts, or audios. Image steganography can be seen as a disguised encryption technique, but it is different from traditional encryption techniques. Image steganography embeds messages into images without changing their perceptual characteristics, ensuring that the carrier embedded with secret information looks visually It is very similar to the original image, so as to avoid the attention and suspicion of the monitor, and avoid being intercepted and attacked by the monitor.
卷积神经网络具有优越的特征提取和特征表示能力,在计算机视觉和自然语言处理等任务中得到了广泛的应用,并取得了显著的效果。因此许多学者试图利用深度学习强大的特征提取能力,将深度学习理论应用于图像隐写。图像隐写的评价指标主要包括不可感知性、安全性和隐写容量。不可感知性主要是隐写图像不能够被人眼所察觉出异样,安全性主要是指能够抵抗一定的抗隐写分析能力,隐写容量是在载体中能够嵌入足够的信息。但是,在传统的图像隐写方法中,嵌入的秘密信息越多,图像的不可感知性就会越差。Convolutional neural network has superior feature extraction and feature representation capabilities, and has been widely used in tasks such as computer vision and natural language processing, and has achieved remarkable results. Therefore, many scholars try to use the powerful feature extraction ability of deep learning to apply deep learning theory to image steganography. The evaluation indicators of image steganography mainly include imperceptibility, security and steganographic capacity. The imperceptibility mainly refers to the fact that the steganographic image cannot be detected by human eyes, the security mainly refers to the ability to resist certain anti-steganographic analysis, and the steganographic capacity refers to the ability to embed enough information in the carrier. However, in traditional image steganography methods, the more secret information is embedded, the less imperceptible the image will be.
因此,如何平衡好图像的安全性与隐写容量,是本领域技术人员亟待解决的技术问题。Therefore, how to balance the security of the image and the steganography capacity is a technical problem to be solved urgently by those skilled in the art.
发明内容Contents of the invention
基于此,有必要针对上述技术问题,提供一种基于生成对抗网络的彩色图像隐写方法,可以得到高质量的隐写图像和提取图像,同时隐写图像具有一定的抗隐写分析能力。其具体方案如下:Based on this, it is necessary to address the above technical problems and provide a color image steganography method based on generative adversarial networks, which can obtain high-quality steganographic images and extracted images, and steganographic images have a certain ability to resist steganalysis. The specific plan is as follows:
一种基于生成对抗网络的彩色图像隐写方法,包括:A color image steganography method based on generative confrontation network, including:
制作载体图像数据集和秘密图像数据集,将所述载体图像数据集和秘密图像数据集分别分为训练集、验证集和测试集;所述载体图像数据集中的载体图像和所述秘密图像数据集中的秘密图像大小相同;Making a carrier image data set and a secret image data set, dividing the carrier image data set and the secret image data set into a training set, a verification set and a test set respectively; the carrier image in the carrier image data set and the secret image data The secret images in the set are of the same size;
构建由预处理网络、隐藏网络、提取网络和隐写分析网络组成的图像隐写模型;所述预处理网络用于对所述载体图像和所述秘密图像进行预处理;所述隐藏网络用于将所述秘密图像隐藏到所述载体图像中,得到隐写图像;所述提取网络用于从所述隐写图像中得到提取图像;所述隐写分析网络用于对所述载体图像和所述隐写图像进行隐写分析;Construct an image steganographic model consisting of a preprocessing network, a hidden network, an extraction network and a steganalysis network; the preprocessing network is used to preprocess the carrier image and the secret image; the hidden network is used to hiding the secret image in the carrier image to obtain a steganographic image; the extraction network is used to obtain an extracted image from the steganographic image; the steganalysis network is used to analyze the carrier image and the steganographic image Steganalysis of steganographic images;
通过所述训练集和所述验证集对构建的所述图像隐写模型进行训练和参数调优;所述隐藏网络和所述隐写分析网络形成对抗训练;The image steganography model constructed is trained and parameter-tuned through the training set and the verification set; the hidden network and the steganalysis network form an adversarial training;
利用所述测试集对参数调优后的所述图像隐写模型进行性能测试。Using the test set to test the performance of the image steganography model after parameter tuning.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述对构建的所述图像隐写模型进行训练,包括:Preferably, in the above-mentioned color image steganography method based on generative confrontation network provided by the embodiment of the present invention, the training of the constructed image steganography model includes:
将所述载体图像和所述秘密图像分别输入到所述预处理网络,得到第一特征图;Inputting the carrier image and the secret image into the preprocessing network respectively to obtain a first feature map;
将所述第一特征图输入到所述隐藏网络,得到所述隐写图像;inputting the first feature map into the hidden network to obtain the steganographic image;
将所述隐写图像输入到所述提取网络,得到所述提取图像;inputting the steganographic image into the extraction network to obtain the extracted image;
将所述载体图像和所述隐写图像作为输入图像输入到所述隐写分析网络,得到所述输入图像的分析结果。Inputting the carrier image and the steganographic image as input images into the steganalysis network to obtain an analysis result of the input image.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述将所述载体图像和所述秘密图像分别输入到所述预处理网 络,得到第一特征图,包括:Preferably, in the above-mentioned color image steganography method based on generative adversarial networks provided by the embodiments of the present invention, the carrier image and the secret image are respectively input into the preprocessing network to obtain a first feature map, include:
将所述载体图像和所述秘密图像分别输入到所述预处理网络的两个分支中,所述载体图像和所述秘密图像分别通过各分支的第一个卷积层,用ReLU激活函数激活,分别得到第一载体特征图和第一秘密特征图;The cover image and the secret image are respectively input into the two branches of the preprocessing network, and the cover image and the secret image pass through the first convolutional layer of each branch respectively, and are activated with a ReLU activation function , get the first carrier feature map and the first secret feature map respectively;
将所述第一载体特征图和所述第一秘密特征图分别通过各分支的第二个卷积层,用ReLU激活函数激活,分别得到第二载体特征图和第二秘密特征图;passing the first carrier feature map and the first secret feature map through the second convolutional layer of each branch, and activating with a ReLU activation function to obtain a second carrier feature map and a second secret feature map;
将所述第二载体特征图和所述第二秘密特征图分别通过各分支的第三个卷积层,用ReLU激活函数激活,分别得到第三载体特征图和第三秘密特征图;passing the second carrier feature map and the second secret feature map through the third convolutional layer of each branch, and activating with a ReLU activation function to obtain a third carrier feature map and a third secret feature map;
将所述第三载体特征图和所述第三秘密特征图进行合并,得到第一特征图。Combining the third carrier feature map and the third secret feature map to obtain a first feature map.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述将所述第一特征图输入到所述隐藏网络,得到所述隐写图像,包括:Preferably, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, the input of the first feature map into the hidden network to obtain the steganographic image includes:
将所述第一特征图输入到所述隐藏网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第二特征图;The first feature map is input to the first convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain a second feature map;
将所述第一特征图通过跳过连接和所述第二特征图进行合并,并输入到所述隐藏网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第三特征图;The first feature map is merged with the second feature map by skip connection, and input to the second convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the third feature picture;
将所述第一特征图和所述第二特征图分别通过跳过连接和所述第三特征图进行合并,并输入到所述隐藏网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第四特征图;The first feature map and the second feature map are merged by skip connection and the third feature map respectively, and input to the third convolutional layer of the hidden network for convolution and using ReLU The function is activated to obtain the fourth feature map;
将所述第一特征图、所述第二特征图和所述第三特征图分别通过跳过连接和所述第四特征图进行合并,并输入到所述隐藏网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第五特征图;Combining the first feature map, the second feature map and the third feature map through skip connections and the fourth feature map respectively, and inputting them into the fourth convolutional layer of the hidden network Perform convolution and use the ReLU function for activation to obtain the fifth feature map;
将所述第一特征图、所述第二特征图、所述第三特征图和所述第四特征图分别通过跳过连接和所述第五特征图进行合并,并输入到所述隐藏网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第六特征 图;Merging the first feature map, the second feature map, the third feature map and the fourth feature map through skip connections and the fifth feature map respectively, and inputting them into the hidden network In the fifth convolutional layer of the convolution and activation using the ReLU function, the sixth feature map is obtained;
将所述第一特征图、所述第二特征图、所述第三特征图、所述第四特征图和所述第五特征图分别通过跳过连接和所述第六特征图进行合并,并输入到所述隐藏网络的第六个卷积层中进行卷积和使用Tanh函数进行激活,得到第七特征图;merging the first feature map, the second feature map, the third feature map, the fourth feature map, and the fifth feature map via skip connections and the sixth feature map, respectively, And input to the sixth convolutional layer of the hidden network for convolution and activation using the Tanh function to obtain the seventh feature map;
将所述载体图像通过跳过连接和所述第七特征图相加,得到所述隐写图像。The steganographic image is obtained by adding the cover image to the seventh feature map through skip connections.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述将所述隐写图像输入到所述提取网络,得到所述提取图像,包括:Preferably, in the above-mentioned color image steganography method based on GAN provided by an embodiment of the present invention, the inputting the steganographic image into the extraction network to obtain the extraction image includes:
将所述隐写图像输入到所述提取网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第一隐写特征图;The steganographic image is input to the first convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the first steganographic feature map;
将所述第一隐写特征图输入到所述提取网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第二隐写特征图;Inputting the first steganographic feature map into the second convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a second steganographic feature map;
将所述第二隐写特征图输入到所述提取网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第三隐写特征图;Inputting the second steganographic feature map into the third convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a third steganographic feature map;
将所述第三隐写特征图输入到所述提取网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第四隐写特征图;Inputting the third steganographic feature map into the fourth convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a fourth steganographic feature map;
将所述第四隐写特征图输入到所述提取网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第五隐写特征图;Inputting the fourth steganographic feature map into the fifth convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a fifth steganographic feature map;
将所述第五隐写特征图输入到所述提取网络的第六个卷积层中进行卷积和使用Tanh函数进行激活,得到所述提取图像。The fifth steganographic feature map is input to the sixth convolutional layer of the extraction network for convolution and activation using a Tanh function to obtain the extracted image.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述将所述载体图像和所述隐写图像作为输入图像输入到所述隐写分析网络,得到所述输入图像的分析结果,包括:Preferably, in the above-mentioned color image steganography method based on generative adversarial networks provided by the embodiments of the present invention, the carrier image and the steganographic image are input into the steganalysis network as input images to obtain the The analysis results of the above input image, including:
将所述输入图像输入到所述隐写分析网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第一输入特征图;Inputting the input image into the first convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a first input feature map;
将所述第一输入特征图输入到所述隐写分析网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第二输入特征图;Inputting the first input feature map into the second convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a second input feature map;
将所述第二输入特征图输入到所述隐写分析网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第三输入特征图;Inputting the second input feature map into the third convolutional layer of the steganalysis network for convolution and activation using the ReLU function to obtain a third input feature map;
将所述第三输入特征图输入到所述隐写分析网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第四输入特征图;Inputting the third input feature map into the fourth convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a fourth input feature map;
将所述第四输入特征图输入到所述隐写分析网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第五输入特征图;Inputting the fourth input feature map into the fifth convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a fifth input feature map;
将所述第五输入特征图输入到所述隐写分析网络的第六个卷积层中进行卷积和使用ReLU函数进行激活,得到第六输入特征图;Inputting the fifth input feature map into the sixth convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a sixth input feature map;
将所述第六输入特征图输入到金字塔池化层,得到第一向量;The sixth input feature map is input to the pyramid pooling layer to obtain the first vector;
将所述第一向量输入到全连接层,使用Sigmoid函数激活,得到第二向量作为对所述输入图像的分析结果。The first vector is input to the fully connected layer, activated by a Sigmoid function, and the second vector is obtained as an analysis result of the input image.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述预处理网络的卷积核均为3x3,步长均为1;所述预处理网络的各分支的第一个卷积层中卷积核个数为128、第二个卷积层中卷积核个数为64,第三个卷积层中卷积核个数为32;Preferably, in the above-mentioned color image steganography method based on generative confrontation network provided by the embodiment of the present invention, the convolution kernels of the preprocessing network are all 3x3, and the step size is 1; each branch of the preprocessing network The number of convolution kernels in the first convolution layer is 128, the number of convolution kernels in the second convolution layer is 64, and the number of convolution kernels in the third convolution layer is 32;
所述隐藏网络的卷积核均为3x3,步长均为1;所述隐藏网络的第一个卷积层中卷积核个数为32、第二个卷积层中卷积核个数为64、第三个卷积层中卷积核个数为128、第四个卷积层中卷积核个数为64、第五个卷积层中卷积核个数为32、第六个卷积层中卷积核个数为3;The convolution kernels of the hidden network are all 3x3, and the step size is 1; the number of convolution kernels in the first convolution layer of the hidden network is 32, and the number of convolution kernels in the second convolution layer The number of convolution kernels in the third convolution layer is 128, the number of convolution kernels in the fourth convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 64. The number of convolution kernels in each convolutional layer is 3;
所述提取网络的卷积核均为3x3,步长均为1;所述提取网络的第一个卷积层中卷积核个数为32、第二个卷积层中卷积核个数为64、第三个卷积层中卷积核个数为128、第四个卷积层中卷积核个数为64、第五个卷积层中卷积核个数为32、第六个卷积层中卷积核个数为3;The convolution kernels of the extraction network are all 3x3, and the step size is 1; the number of convolution kernels in the first convolution layer of the extraction network is 32, and the number of convolution kernels in the second convolution layer The number of convolution kernels in the third convolution layer is 128, the number of convolution kernels in the fourth convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 64. The number of convolution kernels in each convolutional layer is 3;
所述隐写分析网络的卷积核均为1x1,步长均为2;所述隐写分析网络的第一个卷积层中卷积核个数为24、第二个卷积层中卷积核个数为48、第三个卷积层中卷积核个数为96、第四个卷积层中卷积核个数为128、第五个卷积层中卷积核个数为128、第六个卷积层中卷积核个数为128。The convolution kernels of the steganalysis network are all 1x1, and the step size is 2; the number of convolution kernels in the first convolution layer of the steganalysis network is 24, and the number of convolution kernels in the second convolution layer is 24. The number of convolution kernels is 48, the number of convolution kernels in the third convolution layer is 96, the number of convolution kernels in the fourth convolution layer is 128, and the number of convolution kernels in the fifth convolution layer is 128. The number of convolution kernels in the sixth convolution layer is 128.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述对构建的所述图像隐写模型进行参数调优,包括:Preferably, in the above-mentioned GAN-based color image steganography method provided in an embodiment of the present invention, the parameter tuning of the constructed image steganography model includes:
对构建的所述图像隐写网络模型的学习率、批次处理图像的张数、迭代周期和优化器进行调优。Tuning the learning rate of the constructed image steganography network model, the number of images to be processed in batches, the iteration cycle and the optimizer.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,所述对参数调优后的所述图像隐写模型进行性能测试,包括:Preferably, in the above-mentioned GAN-based color image steganography method provided in an embodiment of the present invention, the performance test of the image steganography model after parameter tuning includes:
将所述测试集中的载体图像和秘密图像分别输入到参数调优后的所述图像隐写网络模型中,输出所述测试集对应的隐写图像和提取图像;Input the carrier image and the secret image in the test set into the image steganography network model after parameter tuning respectively, and output the steganographic image and the extracted image corresponding to the test set;
对输出的所述测试集对应的隐写图像和提取图像进行质量测试;Carrying out a quality test on the steganographic image and the extracted image corresponding to the output test set;
对输出的所述测试集对应的隐写图像进行安全性测试;Performing a security test on the steganographic image corresponding to the output test set;
对参数调优后的所述图像隐写模型进行泛化能力测试。The generalization ability test is carried out on the image steganography model after parameter tuning.
优选地,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,对输出的所述测试集对应的隐写图像和提取图像进行质量测试,包括:Preferably, in the above-mentioned GAN-based color image steganography method provided in an embodiment of the present invention, the quality test is performed on the output steganographic image and the extracted image corresponding to the test set, including:
计算出输出的所述测试集对应的隐写图像和所述测试集中的载体图像之间的PSNR值和SSIM值,以及计算输出的所述测试集对应的提取图像和所述测试集中的秘密图像之间的PSNR值和SSIM值;Calculate the output PSNR value and SSIM value between the steganographic image corresponding to the test set and the cover image in the test set, and calculate and output the extracted image corresponding to the test set and the secret image in the test set PSNR value and SSIM value between;
根据计算出PSNR值和SSIM值的大小,得到质量测试结果。According to the calculated PSNR value and SSIM value, the quality test result is obtained.
从上述技术方案可以看出,本发明所提供的一种基于生成对抗网络的彩色图像隐写方法,包括:制作载体图像数据集和秘密图像数据集,将载体图像数据集和秘密图像数据集分别分为训练集、验证集和测试集;载体图像数据集中的载体图像和秘密图像数据集中的秘密图像大小相同;构建由预处理网络、隐藏网络、提取网络和隐写分析网络组成的图像隐写模型;预处理网络用于对载体图像和秘密图像进行预处理;隐藏网络用于将秘密图像隐藏到载体图像中,得到隐写图像;提取网络用于从隐写图像中得到提取图像;隐写分析网络用于对载体图像和隐写图像进行隐写分析;通过训练集和验证集对构建的图像隐写模型进行训练和参数调优;隐藏网络和隐写分析网络形成对抗训练;利用测试集对参数调优后的图像隐写模型进行性能测试。It can be seen from the above technical solutions that a color image steganography method based on generative adversarial networks provided by the present invention includes: making a carrier image dataset and a secret image dataset, and separating the carrier image dataset and the secret image dataset Divided into training set, validation set and test set; the cover image in the cover image dataset and the secret image in the secret image dataset have the same size; build an image steganography network consisting of a preprocessing network, a hidden network, an extraction network and a steganalysis network model; the preprocessing network is used to preprocess the cover image and the secret image; the hidden network is used to hide the secret image into the cover image to obtain the steganographic image; the extraction network is used to extract the image from the steganographic image; the steganographic The analysis network is used to conduct steganalysis on the carrier image and the steganographic image; the image steganography model constructed through the training set and the verification set is trained and the parameters are tuned; the hidden network and the steganalysis network form an adversarial training; the test set is used The performance test of the image steganography model after parameter tuning is carried out.
通过本发明提供的上述彩色图像隐写方法最终得到的图像隐写模型能够将彩色图像嵌入到相同尺寸的彩色图像中,通过对抗训练可以得到高质 量的隐写图像和提取图像,同时隐写图像具有一定的抗隐写分析能力。The image steganography model finally obtained by the above-mentioned color image steganography method provided by the present invention can embed color images into color images of the same size, and can obtain high-quality steganographic images and extracted images through confrontation training, and simultaneously steganographic images It has a certain ability to resist steganalysis.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solution of the present invention. In order to better understand the technical means of the present invention, it can be implemented according to the contents of the description, and in order to make the above and other purposes, features and advantages of the present invention more obvious and understandable , the specific embodiments of the present invention are enumerated below.
附图说明Description of drawings
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiment. The drawings are only for the purpose of illustrating a preferred embodiment and are not to be considered as limiting the invention. Also throughout the drawings, the same reference numerals are used to designate the same parts. In the attached picture:
图1示出了本发明实施例提供的基于生成对抗网络的彩色图像隐写方法的流程图;FIG. 1 shows a flow chart of a color image steganography method based on a generative adversarial network provided by an embodiment of the present invention;
图2示出了本发明实施例提供的图像隐写模型的结构示意图;FIG. 2 shows a schematic structural diagram of an image steganography model provided by an embodiment of the present invention;
图3示出了本发明实施例提供的图像隐写模型的具体结构示意图;FIG. 3 shows a schematic diagram of a specific structure of an image steganography model provided by an embodiment of the present invention;
图4示出了本发明实施例提供的抗隐写分析ROC图。Fig. 4 shows the anti-steganalysis ROC diagram provided by the embodiment of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
本发明提供一种基于生成对抗网络的彩色图像隐写方法,如图1所示,包括以下步骤:The present invention provides a kind of color image steganography method based on generation confrontation network, as shown in Figure 1, comprises the following steps:
S101、制作载体图像数据集和秘密图像数据集,将载体图像数据集和秘密图像数据集分别分为训练集、验证集和测试集;载体图像数据集中的载体图像和秘密图像数据集中的秘密图像大小相同。S101. Make a carrier image data set and a secret image data set, divide the carrier image data set and the secret image data set into a training set, a verification set and a test set respectively; the carrier image in the carrier image data set and the secret image in the secret image data set same size.
具体地,可以随机从ImageNet数据集中选取24000张图像,将图像的 尺寸调整为相同大小(如256x256),分为载体图像数据集和秘密图像数据集;然后将这两个数据集分别划分为三个不相交的部分,其中训练集共有20000张图像、验证集共有2000张图像和测试集共有2000张图像。Specifically, 24,000 images can be randomly selected from the ImageNet dataset, and the size of the images is adjusted to the same size (such as 256x256), and divided into a cover image dataset and a secret image dataset; and then these two datasets are divided into three disjoint parts, where the training set has a total of 20,000 images, the validation set has a total of 2,000 images, and the test set has a total of 2,000 images.
S102、构建由预处理网络、隐藏网络、提取网络和隐写分析网络组成的图像隐写模型;预处理网络用于对载体图像和秘密图像进行预处理以提高隐藏网络的隐藏效率;隐藏网络用于将秘密图像隐藏到载体图像中,得到隐写图像;提取网络用于从隐写图像中得到提取图像;隐写分析网络用于对载体图像和隐写图像进行隐写分析。S102. Construct an image steganography model consisting of a preprocessing network, a hidden network, an extraction network, and a steganalysis network; the preprocessing network is used to preprocess the carrier image and the secret image to improve the hiding efficiency of the hidden network; the hidden network is used to It is used to hide the secret image into the cover image to obtain the steganographic image; the extraction network is used to obtain the extracted image from the steganographic image; the steganalysis network is used to steganalyze the cover image and the steganographic image.
需要说明的是,预处理网络有两个输入分支,一个输出;隐藏网络的输入是预处理网络的输出,输出是隐写图像;提取网络从隐写图像中提取秘密图像;隐写分析网络可判断输入图像是自然图像还是隐写图像。It should be noted that the preprocessing network has two input branches and one output; the input of the hidden network is the output of the preprocessing network, and the output is the steganographic image; the extraction network extracts the secret image from the steganographic image; the steganalysis network can Determine whether the input image is a natural image or a steganographic image.
S103、通过训练集和验证集对构建的图像隐写模型进行训练和参数调优;隐藏网络和隐写分析网络形成对抗训练。S103. Perform training and parameter tuning on the constructed image steganography model through the training set and the verification set; the hidden network and the steganalysis network form an adversarial training.
需要说明的是,对模型进行整体参数调优,要使模型损失函数尽可能小。隐藏网络使用密集残差模块,可以将图像的低级特征传输到每个后续层,这有助于隐藏秘密图像的细节。同时隐藏网络和隐写分析网络的对抗训练可以提高隐写图像的质量和安全性。It should be noted that the overall parameter tuning of the model should make the model loss function as small as possible. The hidden network uses a dense residual module, which can transfer the low-level features of the image to each subsequent layer, which helps to hide the details of the secret image. Simultaneous adversarial training of hidden network and steganalysis network can improve the quality and security of steganographic images.
S104、利用测试集对参数调优后的图像隐写模型进行性能测试。S104. Use the test set to perform a performance test on the image steganography model after parameter tuning.
在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,最终得到的图像隐写模型能够将彩色图像嵌入到相同尺寸的彩色图像中,通过对抗训练可以得到高质量的隐写图像和提取图像,同时隐写图像具有一定的抗隐写分析能力。In the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, the finally obtained image steganography model can embed color images into color images of the same size, and high-quality steganography can be obtained through adversarial training Image and image extraction, while the steganographic image has a certain ability to resist steganalysis.
在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,如图2所示,步骤S103对构建的图像隐写模型进行训练,可以包括以下步骤:In specific implementation, in the above-mentioned color image steganography method based on generative confrontation network provided by the embodiment of the present invention, as shown in FIG. 2 , step S103 trains the constructed image steganography model, which may include the following steps:
步骤一、将载体图像C(0)和秘密图像S(0)分别输入到预处理网络,得到第一特征图I(1);Step 1. Input the carrier image C(0) and the secret image S(0) respectively into the preprocessing network to obtain the first feature map I(1);
步骤二、将第一特征图I(1)输入到隐藏网络,得到隐写图像C'(0);Step 2. Input the first feature map I(1) into the hidden network to obtain the steganographic image C'(0);
步骤三、将隐写图像C'(0)输入到提取网络,得到提取图像S'(0);Step 3: Input the steganographic image C'(0) into the extraction network to obtain the extracted image S'(0);
步骤四、将载体图像C(0)和隐写图像C'(0)作为输入图像R(0)输入到隐写分析网络,得到输入图像R(0)的分析结果。Step 4: Input the carrier image C(0) and the steganographic image C'(0) as the input image R(0) into the steganalysis network to obtain the analysis result of the input image R(0).
在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,如图3所示,步骤一中将载体图像C(0)和秘密图像S(0)分别输入到预处理网络,得到第一特征图I(1),具体可以包括以下步骤:In specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, as shown in FIG. To the preprocessing network, the first feature map I(1) is obtained, which may specifically include the following steps:
将载体图像C(0)和秘密图像S(0)分别输入到预处理网络的两个分支中,载体图像C(0)和秘密图像S(0)分别通过各分支的第一个卷积层,用ReLU激活函数激活,分别得到第一载体特征图C(1)和第一秘密特征图S(1);The cover image C(0) and the secret image S(0) are respectively input into the two branches of the preprocessing network, and the cover image C(0) and the secret image S(0) respectively pass through the first convolutional layer of each branch , activate with the ReLU activation function to obtain the first carrier feature map C(1) and the first secret feature map S(1);
将第一载体特征图C(1)和第一秘密特征图S(1)分别通过各分支的第二个卷积层,用ReLU激活函数激活,分别得到第二载体特征图C(2)和第二秘密特征图S(2);Pass the first carrier feature map C(1) and the first secret feature map S(1) respectively through the second convolutional layer of each branch, and use the ReLU activation function to activate the second carrier feature map C(2) and The second secret feature map S(2);
将第二载体特征图C(2)和第二秘密特征图S(2)分别通过各分支的第三个卷积层,用ReLU激活函数激活,分别得到第三载体特征图C(3)和第三秘密特征图S(3);Pass the second carrier feature map C(2) and the second secret feature map S(2) respectively through the third convolutional layer of each branch, and use the ReLU activation function to activate, respectively, to obtain the third carrier feature map C(3) and The third secret feature map S(3);
将第三载体特征图C(3)和第三秘密特征图S(3)进行合并,得到第一特征图I(1)。Merge the third carrier feature map C(3) and the third secret feature map S(3) to obtain the first feature map I(1).
进一步地,在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,预处理网络的卷积核均为3x3,步长均为1;如图3所示,预处理网络的各分支的第一个卷积层中卷积核个数为128、第二个卷积层中卷积核个数为64,第三个卷积层中卷积核个数为32。Further, in specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, the convolution kernels of the preprocessing network are all 3x3, and the step size is 1; as shown in Figure 3 , the number of convolution kernels in the first convolution layer of each branch of the preprocessing network is 128, the number of convolution kernels in the second convolution layer is 64, and the number of convolution kernels in the third convolution layer for 32.
在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,如图3所示,步骤二中将第一特征图I(1)输入到隐藏网络,得到隐写图像C'(0),具体可以包括以下步骤:In specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, as shown in FIG. Writing the image C'(0) may specifically include the following steps:
将第一特征图I(1)输入到隐藏网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第二特征图I(2);Input the first feature map I(1) into the first convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the second feature map I(2);
将第一特征图I(1)通过跳过连接和第二特征图I(2)进行合并,并输入到隐藏网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第三特征图I(3);The first feature map I(1) is merged with the second feature map I(2) by skip connection, and input to the second convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the first Three feature map I(3);
将第一特征图I(1)和第二特征图I(2)分别通过跳过连接和第三特征图I(3)进行合并,并输入到隐藏网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第四特征图I(4);The first feature map I(1) and the second feature map I(2) are merged by skip connection and the third feature map I(3), respectively, and input to the third convolutional layer of the hidden network for convolution The product sum is activated using the ReLU function to obtain the fourth feature map I(4);
将第一特征图I(1)、第二特征图I(2)和第三特征图I(3)分别通过跳过连接和第四特征图I(4)进行合并,并输入到隐藏网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第五特征图I(5);Merge the first feature map I(1), the second feature map I(2) and the third feature map I(3) through skip connections and the fourth feature map I(4) respectively, and input them into the hidden network Convolution is performed in the fourth convolutional layer and activation is performed using the ReLU function to obtain the fifth feature map I(5);
将第一特征图I(1)、第二特征图I(2)、第三特征图I(3)和第四特征图I(4)分别通过跳过连接和第五特征图I(5)进行合并,并输入到隐藏网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第六特征图I(6);The first feature map I(1), the second feature map I(2), the third feature map I(3) and the fourth feature map I(4) are respectively passed through the skip connection and the fifth feature map I(5) Merge and input to the fifth convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the sixth feature map I(6);
将第一特征图I(1)、第二特征图I(2)、第三特征图I(3)、第四特征图I(4)和第五特征图I(5)分别通过跳过连接和第六特征图I(6)进行合并,并输入到隐藏网络的第六个卷积层中进行卷积和使用Tanh函数进行激活,得到第七特征图I(7);The first feature map I(1), the second feature map I(2), the third feature map I(3), the fourth feature map I(4) and the fifth feature map I(5) are respectively connected by skipping Merge with the sixth feature map I(6), and input it to the sixth convolutional layer of the hidden network for convolution and activation using the Tanh function to obtain the seventh feature map I(7);
将载体图像C(0)通过跳过连接和第七特征图I(7)相加,得到隐写图像C'(0)。Add the cover image C(0) to the seventh feature map I(7) through skip connection to obtain the steganographic image C'(0).
进一步地,在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,隐藏网络的卷积核均为3x3,步长均为1;如图3所示,隐藏网络的第一个卷积层中卷积核个数为32、第二个卷积层中卷积核个数为64、第三个卷积层中卷积核个数为128、第四个卷积层中卷积核个数为64、第五个卷积层中卷积核个数为32、第六个卷积层中卷积核个数为3。Further, in specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, the convolution kernels of the hidden network are all 3x3, and the step size is 1; as shown in Figure 3, The number of convolution kernels in the first convolution layer of the hidden network is 32, the number of convolution kernels in the second convolution layer is 64, the number of convolution kernels in the third convolution layer is 128, and the number of convolution kernels in the fourth convolution layer is The number of convolution kernels in the first convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 3.
在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,如图3所示,步骤三中将隐写图像C'(0)输入到提取网络,得到提取图像S'(0),具体可以包括以下步骤:In specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, as shown in Figure 3, in step 3, the steganographic image C'(0) is input to the extraction network to obtain the extraction The image S'(0) may specifically include the following steps:
将隐写图像C'(0)输入到提取网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第一隐写特征图D(1);Input the steganographic image C'(0) into the first convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the first steganographic feature map D(1);
将第一隐写特征图D(1)输入到提取网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第二隐写特征图D(2);Input the first steganographic feature map D(1) into the second convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the second steganographic feature map D(2);
将第二隐写特征图D(2)输入到提取网络的第三个卷积层中进行卷积和 使用ReLU函数进行激活,得到第三隐写特征图D(3);Input the second steganographic feature map D(2) into the third convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the third steganographic feature map D(3);
将第三隐写特征图D(3)输入到提取网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第四隐写特征图D(4);Input the third steganographic feature map D(3) into the fourth convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the fourth steganographic feature map D(4);
将第四隐写特征图D(4)输入到提取网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第五隐写特征图D(5);Input the fourth steganographic feature map D(4) into the fifth convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the fifth steganographic feature map D(5);
将第五隐写特征图D(5)输入到提取网络的第六个卷积层中进行卷积和使用Tanh函数进行激活,得到提取图像S'(0)。Input the fifth steganographic feature map D(5) into the sixth convolutional layer of the extraction network for convolution and activation using the Tanh function to obtain the extracted image S'(0).
进一步地,在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,提取网络的卷积核均为3x3,步长均为1;如图3所示,提取网络的第一个卷积层中卷积核个数为32、第二个卷积层中卷积核个数为64、第三个卷积层中卷积核个数为128、第四个卷积层中卷积核个数为64、第五个卷积层中卷积核个数为32、第六个卷积层中卷积核个数为3。Further, in specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, the convolution kernels of the extraction network are all 3x3, and the step size is 1; as shown in Figure 3, The number of convolution kernels in the first convolution layer of the extraction network is 32, the number of convolution kernels in the second convolution layer is 64, the number of convolution kernels in the third convolution layer is 128, and the number of convolution kernels in the fourth convolution layer is The number of convolution kernels in the first convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 3.
在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,如图3所示,步骤四中将载体图像C(0)和隐写图像C'(0)作为输入图像R(0)输入到隐写分析网络,得到输入图像R(0)的分析结果,具体可以包括以下步骤:In specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, as shown in Figure 3, in step 4, the carrier image C(0) and the steganographic image C'(0) As the input image R(0) is input to the steganalysis network to obtain the analysis result of the input image R(0), which may specifically include the following steps:
将输入图像R(0)输入到隐写分析网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第一输入特征图R(1);Input the input image R(0) into the first convolutional layer of the steganalysis network for convolution and activation using the ReLU function to obtain the first input feature map R(1);
将第一输入特征图R(1)输入到隐写分析网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第二输入特征图R(2);Input the first input feature map R(1) into the second convolutional layer of the steganalysis network for convolution and activation using the ReLU function to obtain the second input feature map R(2);
将第二输入特征图R(2)输入到隐写分析网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第三输入特征图R(3);Input the second input feature map R(2) into the third convolutional layer of the steganalysis network for convolution and activation using the ReLU function to obtain the third input feature map R(3);
将第三输入特征图R(3)输入到隐写分析网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第四输入特征图R(4);Input the third input feature map R(3) into the fourth convolutional layer of the steganalysis network for convolution and activation using the ReLU function to obtain the fourth input feature map R(4);
将第四输入特征图R(4)输入到隐写分析网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第五输入特征图R(5);Input the fourth input feature map R(4) into the fifth convolutional layer of the steganalysis network for convolution and activation using the ReLU function to obtain the fifth input feature map R(5);
将第五输入特征图R(5)输入到隐写分析网络的第六个卷积层中进行卷积和使用ReLU函数进行激活,得到第六输入特征图R(6);Input the fifth input feature map R(5) into the sixth convolutional layer of the steganalysis network for convolution and activation using the ReLU function to obtain the sixth input feature map R(6);
将第六输入特征图R(6)输入到金字塔池化层,得到第一向量R(7);Input the sixth input feature map R(6) to the pyramid pooling layer to obtain the first vector R(7);
将第一向量R(7)输入到全连接层,使用Sigmoid函数激活,得到第二向量R(8)作为对输入图像R(0)的分析结果,即对输入图像R(0)的评价分数。Input the first vector R(7) into the fully connected layer, use the Sigmoid function to activate, and obtain the second vector R(8) as the analysis result of the input image R(0), that is, the evaluation score of the input image R(0) .
进一步地,在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,隐写分析网络的卷积核均为1x1,步长均为2;如图3所示,隐写分析网络的第一个卷积层中卷积核个数为24、第二个卷积层中卷积核个数为48、第三个卷积层中卷积核个数为96、第四个卷积层中卷积核个数为128、第五个卷积层中卷积核个数为128、第六个卷积层中卷积核个数为128。Further, in specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, the convolution kernel of the steganalysis network is 1x1, and the step size is 2; as shown in Figure 3 It shows that the number of convolution kernels in the first convolution layer of the steganalysis network is 24, the number of convolution kernels in the second convolution layer is 48, and the number of convolution kernels in the third convolution layer is 96. The number of convolution kernels in the fourth convolution layer is 128, the number of convolution kernels in the fifth convolution layer is 128, and the number of convolution kernels in the sixth convolution layer is 128.
在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,在构建图像隐写模型的过程中,需要设置模型训练相关参数,即设置网络模型的学习率,设置网络模型中一批次处理图像的张数batch_size,设置迭代周期epoch,设置网络模型的优化器optimizer,以及设置网络的训练步骤,具体可以分两步训练:第一步训练隐写分析网络,第二步训练预处理网络、隐藏网络和提取网络。接下来,在对构建的图像隐写模型进行参数调优的过程中,可以包括:对构建的图像隐写网络模型的学习率、批次处理图像的张数batch_size、迭代周期epoch和优化器optimizer这些参数进行调优。In specific implementation, in the above-mentioned color image steganography method based on generative confrontation network provided by the embodiment of the present invention, in the process of constructing the image steganography model, it is necessary to set the relevant parameters of model training, that is, to set the learning rate of the network model, Set the batch_size of images processed in a batch in the network model, set the iteration cycle epoch, set the optimizer of the network model optimizer, and set the training steps of the network, which can be trained in two steps: the first step is to train the steganalysis network, The second step trains the preprocessing network, hidden network and extraction network. Next, in the process of tuning the parameters of the constructed image steganography model, it may include: the learning rate of the constructed image steganography network model, the number of batches of images batch_size, the iteration cycle epoch and the optimizer optimizer These parameters are tuned.
在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,步骤S104对参数调优后的图像隐写模型进行性能测试,具体可以包括:首先,将测试集中的载体图像和秘密图像分别输入到参数调优后的图像隐写网络模型中,输出测试集对应的隐写图像和提取图像;然后,对输出的测试集对应的隐写图像和提取图像进行质量测试;对输出的测试集对应的隐写图像进行安全性测试;对参数调优后的图像隐写模型进行泛化能力测试。这样所产生的隐写图像具有较高的质量和安全性,且模型具有较好的泛化能力。During specific implementation, in the above-mentioned color image steganography method based on generative adversarial network provided by the embodiment of the present invention, step S104 performs a performance test on the image steganography model after parameter tuning, which may specifically include: first, centralize the test The cover image and the secret image of the parameter are respectively input into the image steganographic network model after parameter tuning, and the steganographic image and the extracted image corresponding to the test set are output; then, the quality of the steganographic image and the extracted image corresponding to the output test set are Test; conduct a security test on the steganographic image corresponding to the output test set; conduct a generalization ability test on the image steganography model after parameter tuning. The resulting steganographic image has high quality and security, and the model has good generalization ability.
进一步地,在具体实施时,在本发明实施例提供的上述基于生成对抗网络的彩色图像隐写方法中,上述步骤中对输出的测试集对应的隐写图像和提取图像进行质量测试,可以包括:计算出输出的测试集对应的隐写图 像和测试集中的载体图像之间的PSNR(峰值信噪比)值和SSIM(结构相似性)值,以及计算输出的测试集对应的提取图像和测试集中的秘密图像之间的PSNR值和SSIM值;根据计算出PSNR值和SSIM值的大小,得到质量测试结果。Further, in specific implementation, in the above-mentioned GAN-based color image steganography method provided by the embodiment of the present invention, in the above steps, the quality test of the steganographic image and the extracted image corresponding to the output test set may include : Calculate the PSNR (peak signal-to-noise ratio) value and SSIM (structural similarity) value between the steganographic image corresponding to the output test set and the cover image in the test set, and calculate the extracted image and test corresponding to the output test set The PSNR value and SSIM value between the concentrated secret images; according to the calculated PSNR value and SSIM value, the quality test result is obtained.
具体地,对ImageNet数据集的测试集进行测试,假设测试集共有2000张图像,其中可选取1000张图像作为载体图像,另外1000张图像为秘密图像。经测试后,质量测试结果为:载体图像与隐写图像的PSNR和SSIM分别为44.15和0.99,秘密图像和提取图像的PSNR和SSIM分别为40.03和0.98,说明参数调优后的图像隐写模型可以得到高质量的隐写图像和提取图像。Specifically, the test set of the ImageNet dataset is tested, assuming that the test set has a total of 2000 images, of which 1000 images can be selected as carrier images, and the other 1000 images are secret images. After testing, the quality test results are: the PSNR and SSIM of the carrier image and the steganographic image are 44.15 and 0.99, respectively, and the PSNR and SSIM of the secret image and the extracted image are 40.03 and 0.98, respectively, indicating that the image steganography model after parameter tuning High-quality steganographic images and extracted images can be obtained.
在执行上述步骤中对输出的测试集对应的隐写图像进行安全性测试的过程中,可以使用隐写分析工具StegExpose对图像就行隐写分析,结果如图4所示,图4中的一条直线表示随机预测,直线左上方的曲线表示对图像的隐写分析,可以发现曲线接近直线,说明StegExpose对隐写图像的隐写分析接近随机预测,说明隐写图像具有一定的抗隐写分析能力。In the process of performing the security test on the steganographic image corresponding to the output test set in the above steps, the steganalysis tool StegExpose can be used to perform steganographic analysis on the image, and the result is shown in Figure 4, a straight line in Figure 4 Indicates random prediction, and the curve on the upper left of the straight line represents the steganalysis of the image. It can be found that the curve is close to the straight line, indicating that StegExpose's steganalysis of the steganographic image is close to random prediction, indicating that the steganographic image has a certain anti-steganographic analysis ability.
在执行上述步骤中对参数调优后的图像隐写模型进行泛化能力测试的过程中,可以从LFW,VOC2007和CoCo这三个数据集各选取2000张图像来验证图像隐写模型的泛化能力,如表一所示:In the process of testing the generalization ability of the image steganography model after parameter tuning in the above steps, 2000 images can be selected from each of the three data sets of LFW, VOC2007 and CoCo to verify the generalization of the image steganography model capabilities, as shown in Table 1:
表一Table I
Figure PCTCN2021125637-appb-000001
Figure PCTCN2021125637-appb-000001
由表一可知图像隐写模型具有较好的泛化能力。It can be seen from Table 1 that the image steganography model has good generalization ability.
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其它实施例的不同之处,各个实施例之间相同或相似部分互相参见即可。Each embodiment in this specification is described in a progressive manner, each embodiment focuses on the difference from other embodiments, and the same or similar parts of each embodiment can be referred to each other.
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Professionals can further realize that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed herein can be implemented by electronic hardware, computer software or a combination of the two. In order to clearly illustrate the possible For interchangeability, in the above description, the composition and steps of each example have been generally described according to their functions. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
结合本文中所公开的实施例描述的方法或算法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。The steps of the methods or algorithms described in connection with the embodiments disclosed herein may be directly implemented by hardware, software modules executed by a processor, or a combination of both. Software modules can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, removable disk, CD-ROM, or any other Any other known storage medium.
本发明实施例提供的一种基于生成对抗网络的彩色图像隐写方法,包括:制作载体图像数据集和秘密图像数据集,将载体图像数据集和秘密图像数据集分别分为训练集、验证集和测试集;载体图像数据集中的载体图像和秘密图像数据集中的秘密图像大小相同;构建由预处理网络、隐藏网络、提取网络和隐写分析网络组成的图像隐写模型;预处理网络用于对载体图像和秘密图像进行预处理;隐藏网络用于将秘密图像隐藏到载体图像中,得到隐写图像;提取网络用于从隐写图像中得到提取图像;隐写分析网络用于对载体图像和隐写图像进行隐写分析;通过训练集和验证集对构建的图像隐写模型进行训练和参数调优;隐藏网络和隐写分析网络形成对抗训练;利用测试集对参数调优后的图像隐写模型进行性能测试。通过本发明提供的上述彩色图像隐写方法最终得到的图像隐写模型能够将彩色图像嵌入到相同尺寸的彩色图像中,通过对抗训练可以得到高质量的隐写图像和提取图像,同时隐写图像具有一定的抗隐写分析能力。A color image steganography method based on generative adversarial networks provided by an embodiment of the present invention includes: making a carrier image data set and a secret image data set, and dividing the carrier image data set and the secret image data set into a training set and a verification set respectively and the test set; the size of the cover image in the cover image dataset and the secret image in the secret image dataset are the same; construct an image steganographic model consisting of a preprocessing network, a hidden network, an extraction network and a steganalysis network; the preprocessing network is used for Preprocess the cover image and the secret image; the hidden network is used to hide the secret image into the cover image to obtain the steganographic image; the extraction network is used to extract the image from the steganographic image; the steganalysis network is used to analyze the cover image Steganalysis with steganographic images; training and parameter tuning of the constructed image steganographic model through the training set and verification set; hidden network and steganalysis network form confrontation training; use the test set to optimize the parameters of the image Steganography model for performance testing. The image steganography model finally obtained through the above-mentioned color image steganography method provided by the present invention can embed color images into color images of the same size, and can obtain high-quality steganographic images and extracted images through confrontational training, and simultaneously steganographic images It has a certain ability to resist steganalysis.
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含, 从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。Finally, it should also be noted that in this text, relational terms such as first and second etc. are only used to distinguish one entity or operation from another, and do not necessarily require or imply that these entities or operations, any such actual relationship or order exists. Furthermore, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes elements not expressly listed. other elements of or also include elements inherent in such a process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.
以上所述实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围,均应包含在本发明的保护范围之内。The above-described embodiments are only used to illustrate the technical solutions of the present invention, rather than to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art should understand that: it can still carry out the foregoing embodiments Modifications to the technical solutions recorded in the examples, or equivalent replacement of some of the technical features; and these modifications or replacements do not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the various embodiments of the present invention, and should be included in within the protection scope of the present invention.

Claims (10)

  1. 一种基于生成对抗网络的彩色图像隐写方法,其特征在于,包括:A color image steganography method based on generative confrontation network, characterized in that it includes:
    制作载体图像数据集和秘密图像数据集,将所述载体图像数据集和秘密图像数据集分别分为训练集、验证集和测试集;所述载体图像数据集中的载体图像和所述秘密图像数据集中的秘密图像大小相同;Making a carrier image data set and a secret image data set, dividing the carrier image data set and the secret image data set into a training set, a verification set and a test set respectively; the carrier image in the carrier image data set and the secret image data The secret images in the set are of the same size;
    构建由预处理网络、隐藏网络、提取网络和隐写分析网络组成的图像隐写模型;所述预处理网络用于对所述载体图像和所述秘密图像进行预处理;所述隐藏网络用于将所述秘密图像隐藏到所述载体图像中,得到隐写图像;所述提取网络用于从所述隐写图像中得到提取图像;所述隐写分析网络用于对所述载体图像和所述隐写图像进行隐写分析;Construct an image steganographic model consisting of a preprocessing network, a hidden network, an extraction network and a steganalysis network; the preprocessing network is used to preprocess the carrier image and the secret image; the hidden network is used to hiding the secret image in the carrier image to obtain a steganographic image; the extraction network is used to obtain an extracted image from the steganographic image; the steganalysis network is used to analyze the carrier image and the steganographic image Steganalysis of steganographic images;
    通过所述训练集和所述验证集对构建的所述图像隐写模型进行训练和参数调优;所述隐藏网络和所述隐写分析网络形成对抗训练;The image steganography model constructed is trained and parameter-tuned through the training set and the verification set; the hidden network and the steganalysis network form an adversarial training;
    利用所述测试集对参数调优后的所述图像隐写模型进行性能测试。Using the test set to test the performance of the image steganography model after parameter tuning.
  2. 根据权利要求1所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述对构建的所述图像隐写模型进行训练,包括:The color image steganography method based on generation confrontation network according to claim 1, wherein said training the image steganography model constructed comprises:
    将所述载体图像和所述秘密图像分别输入到所述预处理网络,得到第一特征图;Inputting the carrier image and the secret image into the preprocessing network respectively to obtain a first feature map;
    将所述第一特征图输入到所述隐藏网络,得到所述隐写图像;inputting the first feature map into the hidden network to obtain the steganographic image;
    将所述隐写图像输入到所述提取网络,得到所述提取图像;inputting the steganographic image into the extraction network to obtain the extracted image;
    将所述载体图像和所述隐写图像作为输入图像输入到所述隐写分析网络,得到所述输入图像的分析结果。Inputting the carrier image and the steganographic image as input images into the steganalysis network to obtain an analysis result of the input image.
  3. 根据权利要求2所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述将所述载体图像和所述秘密图像分别输入到所述预处理网络,得到第一特征图,包括:The color image steganography method based on generating an adversarial network according to claim 2, wherein said inputting said carrier image and said secret image into said preprocessing network respectively to obtain a first feature map, comprising :
    将所述载体图像和所述秘密图像分别输入到所述预处理网络的两个分支中,所述载体图像和所述秘密图像分别通过各分支的第一个卷积层,用ReLU激活函数激活,分别得到第一载体特征图和第一秘密特征图;The cover image and the secret image are respectively input into the two branches of the preprocessing network, and the cover image and the secret image pass through the first convolutional layer of each branch respectively, and are activated with a ReLU activation function , get the first carrier feature map and the first secret feature map respectively;
    将所述第一载体特征图和所述第一秘密特征图分别通过各分支的第二个卷积层,用ReLU激活函数激活,分别得到第二载体特征图和第二秘密 特征图;The first carrier feature map and the first secret feature map are respectively passed through the second convolution layer of each branch, activated with a ReLU activation function, and the second carrier feature map and the second secret feature map are respectively obtained;
    将所述第二载体特征图和所述第二秘密特征图分别通过各分支的第三个卷积层,用ReLU激活函数激活,分别得到第三载体特征图和第三秘密特征图;passing the second carrier feature map and the second secret feature map through the third convolutional layer of each branch, and activating with a ReLU activation function to obtain a third carrier feature map and a third secret feature map;
    将所述第三载体特征图和所述第三秘密特征图进行合并,得到第一特征图。Combining the third carrier feature map and the third secret feature map to obtain a first feature map.
  4. 根据权利要求3所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述将所述第一特征图输入到所述隐藏网络,得到所述隐写图像,包括:The color image steganography method based on generating an adversarial network according to claim 3, wherein said inputting said first feature map into said hidden network to obtain said steganographic image comprises:
    将所述第一特征图输入到所述隐藏网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第二特征图;The first feature map is input to the first convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain a second feature map;
    将所述第一特征图通过跳过连接和所述第二特征图进行合并,并输入到所述隐藏网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第三特征图;The first feature map is merged with the second feature map by skip connection, and input to the second convolutional layer of the hidden network for convolution and activation using the ReLU function to obtain the third feature picture;
    将所述第一特征图和所述第二特征图分别通过跳过连接和所述第三特征图进行合并,并输入到所述隐藏网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第四特征图;The first feature map and the second feature map are merged by skip connection and the third feature map respectively, and input to the third convolutional layer of the hidden network for convolution and using ReLU The function is activated to obtain the fourth feature map;
    将所述第一特征图、所述第二特征图和所述第三特征图分别通过跳过连接和所述第四特征图进行合并,并输入到所述隐藏网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第五特征图;Combining the first feature map, the second feature map and the third feature map through skip connections and the fourth feature map respectively, and inputting them into the fourth convolutional layer of the hidden network Perform convolution and use the ReLU function for activation to obtain the fifth feature map;
    将所述第一特征图、所述第二特征图、所述第三特征图和所述第四特征图分别通过跳过连接和所述第五特征图进行合并,并输入到所述隐藏网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第六特征图;Merging the first feature map, the second feature map, the third feature map and the fourth feature map through skip connections and the fifth feature map respectively, and inputting them into the hidden network In the fifth convolutional layer of the convolution and activation using the ReLU function, the sixth feature map is obtained;
    将所述第一特征图、所述第二特征图、所述第三特征图、所述第四特征图和所述第五特征图分别通过跳过连接和所述第六特征图进行合并,并输入到所述隐藏网络的第六个卷积层中进行卷积和使用Tanh函数进行激活,得到第七特征图;merging the first feature map, the second feature map, the third feature map, the fourth feature map, and the fifth feature map via skip connections and the sixth feature map, respectively, And input to the sixth convolutional layer of the hidden network for convolution and activation using the Tanh function to obtain the seventh feature map;
    将所述载体图像通过跳过连接和所述第七特征图相加,得到所述隐写 图像。Adding the carrier image to the seventh feature map through skip connections to obtain the steganographic image.
  5. 根据权利要求4所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述将所述隐写图像输入到所述提取网络,得到所述提取图像,包括:The color image steganography method based on generating an adversarial network according to claim 4, wherein said inputting said steganographic image into said extraction network to obtain said extraction image comprises:
    将所述隐写图像输入到所述提取网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第一隐写特征图;The steganographic image is input into the first convolutional layer of the extraction network for convolution and activation using the ReLU function to obtain the first steganographic feature map;
    将所述第一隐写特征图输入到所述提取网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第二隐写特征图;Inputting the first steganographic feature map into the second convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a second steganographic feature map;
    将所述第二隐写特征图输入到所述提取网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第三隐写特征图;Inputting the second steganographic feature map into the third convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a third steganographic feature map;
    将所述第三隐写特征图输入到所述提取网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第四隐写特征图;Inputting the third steganographic feature map into the fourth convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a fourth steganographic feature map;
    将所述第四隐写特征图输入到所述提取网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第五隐写特征图;Inputting the fourth steganographic feature map into the fifth convolutional layer of the extraction network for convolution and activation using a ReLU function to obtain a fifth steganographic feature map;
    将所述第五隐写特征图输入到所述提取网络的第六个卷积层中进行卷积和使用Tanh函数进行激活,得到所述提取图像。The fifth steganographic feature map is input to the sixth convolutional layer of the extraction network for convolution and activation using a Tanh function to obtain the extracted image.
  6. 根据权利要求5所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述将所述载体图像和所述隐写图像作为输入图像输入到所述隐写分析网络,得到所述输入图像的分析结果,包括:The color image steganography method based on generative adversarial networks according to claim 5, wherein the steganalysis network is input with the carrier image and the steganographic image as input images to obtain the The analysis results of the input image, including:
    将所述输入图像输入到所述隐写分析网络的第一个卷积层中进行卷积和使用ReLU函数进行激活,得到第一输入特征图;Inputting the input image into the first convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a first input feature map;
    将所述第一输入特征图输入到所述隐写分析网络的第二个卷积层中进行卷积和使用ReLU函数进行激活,得到第二输入特征图;Inputting the first input feature map into the second convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a second input feature map;
    将所述第二输入特征图输入到所述隐写分析网络的第三个卷积层中进行卷积和使用ReLU函数进行激活,得到第三输入特征图;Inputting the second input feature map into the third convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a third input feature map;
    将所述第三输入特征图输入到所述隐写分析网络的第四个卷积层中进行卷积和使用ReLU函数进行激活,得到第四输入特征图;Inputting the third input feature map into the fourth convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a fourth input feature map;
    将所述第四输入特征图输入到所述隐写分析网络的第五个卷积层中进行卷积和使用ReLU函数进行激活,得到第五输入特征图;Inputting the fourth input feature map into the fifth convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a fifth input feature map;
    将所述第五输入特征图输入到所述隐写分析网络的第六个卷积层中进行卷积和使用ReLU函数进行激活,得到第六输入特征图;Inputting the fifth input feature map into the sixth convolutional layer of the steganalysis network for convolution and activation using a ReLU function to obtain a sixth input feature map;
    将所述第六输入特征图输入到金字塔池化层,得到第一向量;The sixth input feature map is input to the pyramid pooling layer to obtain the first vector;
    将所述第一向量输入到全连接层,使用Sigmoid函数激活,得到第二向量作为对所述输入图像的分析结果。The first vector is input to the fully connected layer, activated by a Sigmoid function, and the second vector is obtained as an analysis result of the input image.
  7. 根据权利要求6所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述预处理网络的卷积核均为3x3,步长均为1;所述预处理网络的各分支的第一个卷积层中卷积核个数为128、第二个卷积层中卷积核个数为64,第三个卷积层中卷积核个数为32;The color image steganography method based on generating an adversarial network according to claim 6, wherein the convolution kernels of the preprocessing network are all 3x3, and the step size is 1; each branch of the preprocessing network The number of convolution kernels in the first convolution layer is 128, the number of convolution kernels in the second convolution layer is 64, and the number of convolution kernels in the third convolution layer is 32;
    所述隐藏网络的卷积核均为3x3,步长均为1;所述隐藏网络的第一个卷积层中卷积核个数为32、第二个卷积层中卷积核个数为64、第三个卷积层中卷积核个数为128、第四个卷积层中卷积核个数为64、第五个卷积层中卷积核个数为32、第六个卷积层中卷积核个数为3;The convolution kernels of the hidden network are all 3x3, and the step size is 1; the number of convolution kernels in the first convolution layer of the hidden network is 32, and the number of convolution kernels in the second convolution layer The number of convolution kernels in the third convolution layer is 128, the number of convolution kernels in the fourth convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 64. The number of convolution kernels in each convolutional layer is 3;
    所述提取网络的卷积核均为3x3,步长均为1;所述提取网络的第一个卷积层中卷积核个数为32、第二个卷积层中卷积核个数为64、第三个卷积层中卷积核个数为128、第四个卷积层中卷积核个数为64、第五个卷积层中卷积核个数为32、第六个卷积层中卷积核个数为3;The convolution kernels of the extraction network are all 3x3, and the step size is 1; the number of convolution kernels in the first convolution layer of the extraction network is 32, and the number of convolution kernels in the second convolution layer The number of convolution kernels in the third convolution layer is 128, the number of convolution kernels in the fourth convolution layer is 64, the number of convolution kernels in the fifth convolution layer is 32, and the number of convolution kernels in the sixth convolution layer is 64. The number of convolution kernels in each convolutional layer is 3;
    所述隐写分析网络的卷积核均为1x1,步长均为2;所述隐写分析网络的第一个卷积层中卷积核个数为24、第二个卷积层中卷积核个数为48、第三个卷积层中卷积核个数为96、第四个卷积层中卷积核个数为128、第五个卷积层中卷积核个数为128、第六个卷积层中卷积核个数为128。The convolution kernels of the steganalysis network are all 1x1, and the step size is 2; the number of convolution kernels in the first convolution layer of the steganalysis network is 24, and the number of convolution kernels in the second convolution layer is 24. The number of convolution kernels is 48, the number of convolution kernels in the third convolution layer is 96, the number of convolution kernels in the fourth convolution layer is 128, and the number of convolution kernels in the fifth convolution layer is 128. The number of convolution kernels in the sixth convolution layer is 128.
  8. 根据权利要求1所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述对构建的所述图像隐写模型进行参数调优,包括:The method for color image steganography based on generative confrontation network according to claim 1, wherein said parameter tuning of the constructed image steganography model includes:
    对构建的所述图像隐写网络模型的学习率、批次处理图像的张数、迭代周期和优化器进行调优。Tuning the learning rate of the constructed image steganography network model, the number of images to be processed in batches, the iteration cycle and the optimizer.
  9. 根据权利要求1所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,所述对参数调优后的所述图像隐写模型进行性能测试,包括:The method for color image steganography based on generative adversarial networks according to claim 1, wherein the performance test of the image steganography model after parameter tuning includes:
    将所述测试集中的载体图像和秘密图像分别输入到参数调优后的所述图像隐写网络模型中,输出所述测试集对应的隐写图像和提取图像;Input the carrier image and the secret image in the test set into the image steganography network model after parameter tuning respectively, and output the steganographic image and the extracted image corresponding to the test set;
    对输出的所述测试集对应的隐写图像和提取图像进行质量测试;Carrying out a quality test on the steganographic image and the extracted image corresponding to the output test set;
    对输出的所述测试集对应的隐写图像进行安全性测试;Performing a security test on the steganographic image corresponding to the output test set;
    对参数调优后的所述图像隐写模型进行泛化能力测试。The generalization ability test is carried out on the image steganography model after parameter tuning.
  10. 根据权利要求9所述的基于生成对抗网络的彩色图像隐写方法,其特征在于,对输出的所述测试集对应的隐写图像和提取图像进行质量测试,包括:The color image steganography method based on generating an adversarial network according to claim 9, wherein the steganographic image and the extracted image corresponding to the output test set are subjected to quality testing, including:
    计算出输出的所述测试集对应的隐写图像和所述测试集中的载体图像之间的PSNR值和SSIM值,以及计算输出的所述测试集对应的提取图像和所述测试集中的秘密图像之间的PSNR值和SSIM值;Calculate the output PSNR value and SSIM value between the steganographic image corresponding to the test set and the cover image in the test set, and calculate and output the extracted image corresponding to the test set and the secret image in the test set PSNR value and SSIM value between;
    根据计算出PSNR值和SSIM值的大小,得到质量测试结果。According to the calculated PSNR value and SSIM value, the quality test result is obtained.
PCT/CN2021/125637 2021-05-13 2021-10-22 Color image steganography method based on generative adversarial network WO2022237078A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110523597.8A CN113077377B (en) 2021-05-13 2021-05-13 Color image steganography method based on generation countermeasure network
CN202110523597.8 2021-05-13

Publications (1)

Publication Number Publication Date
WO2022237078A1 true WO2022237078A1 (en) 2022-11-17

Family

ID=76616717

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/125637 WO2022237078A1 (en) 2021-05-13 2021-10-22 Color image steganography method based on generative adversarial network

Country Status (2)

Country Link
CN (1) CN113077377B (en)
WO (1) WO2022237078A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113077377B (en) * 2021-05-13 2022-06-10 海南大学 Color image steganography method based on generation countermeasure network
CN113538202A (en) * 2021-08-05 2021-10-22 齐鲁工业大学 Image steganography method and system based on generative steganography confrontation
CN113965659B (en) * 2021-10-18 2022-07-26 上海交通大学 HEVC (high efficiency video coding) video steganalysis training method and system based on network-to-network
CN113989092B (en) * 2021-10-21 2024-03-26 河北师范大学 Image steganography method based on layered antagonism learning
CN114338945A (en) * 2022-01-04 2022-04-12 华南师范大学 Color image steganography method and device based on frequency domain component selection
CN114827379A (en) * 2022-04-27 2022-07-29 四川大学 Carrier image enhancement method based on generative network
CN117292696B (en) * 2023-10-08 2024-03-12 合肥工业大学 End-to-end audio steganography method, system, storage medium and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165082A1 (en) * 2015-04-15 2016-10-20 中国科学院自动化研究所 Image stego-detection method based on deep learning
CN109934761A (en) * 2019-01-31 2019-06-25 中山大学 Jpeg image steganalysis method based on convolutional neural networks
CN111292221A (en) * 2020-02-25 2020-06-16 南京信息工程大学 Safe and robust high-capacity image steganography method
CN112115490A (en) * 2020-08-14 2020-12-22 宁波大学 Carrier image synthesis steganography method based on GAN
CN112529758A (en) * 2020-12-18 2021-03-19 海南大学 Color image steganography method based on convolutional neural network
CN113077377A (en) * 2021-05-13 2021-07-06 海南大学 Color image steganography method based on generation countermeasure network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108346125B (en) * 2018-03-15 2021-10-08 中山大学 Airspace image steganography method and system based on generation countermeasure network
CN109587372B (en) * 2018-12-11 2020-06-16 北京邮电大学 Invisible image steganography based on generation of countermeasure network
CN110084734B (en) * 2019-04-25 2023-02-14 南京信息工程大学 Big data ownership protection method based on object local generation countermeasure network
CN110334805B (en) * 2019-05-05 2022-10-25 中山大学 JPEG domain image steganography method and system based on generation countermeasure network
CN112487365B (en) * 2019-09-11 2024-01-30 阿里巴巴集团控股有限公司 Information steganography method and information detection method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165082A1 (en) * 2015-04-15 2016-10-20 中国科学院自动化研究所 Image stego-detection method based on deep learning
CN109934761A (en) * 2019-01-31 2019-06-25 中山大学 Jpeg image steganalysis method based on convolutional neural networks
CN111292221A (en) * 2020-02-25 2020-06-16 南京信息工程大学 Safe and robust high-capacity image steganography method
CN112115490A (en) * 2020-08-14 2020-12-22 宁波大学 Carrier image synthesis steganography method based on GAN
CN112529758A (en) * 2020-12-18 2021-03-19 海南大学 Color image steganography method based on convolutional neural network
CN113077377A (en) * 2021-05-13 2021-07-06 海南大学 Color image steganography method based on generation countermeasure network

Also Published As

Publication number Publication date
CN113077377B (en) 2022-06-10
CN113077377A (en) 2021-07-06

Similar Documents

Publication Publication Date Title
WO2022237078A1 (en) Color image steganography method based on generative adversarial network
Khalid et al. Oc-fakedect: Classifying deepfakes using one-class variational autoencoder
Wazirali et al. An optimized steganography hiding capacity and imperceptibly using genetic algorithms
Li et al. New steganalytic features for spatial image steganography based on derivative filters and threshold LBP operator
Zhang et al. Accurate and fast image denoising via attention guided scaling
CN108764270B (en) Information hiding detection method integrated by using convolutional neural network
Yedroudj et al. How to augment a small learning set for improving the performances of a CNN-based steganalyzer?
Li et al. Image steganography based on style transfer and quaternion exponent moments
CN108961137A (en) A kind of image latent writing analysis method and system based on convolutional neural networks
Zhang et al. Efficient feature learning and multi-size image steganalysis based on CNN
CN112150450B (en) Image tampering detection method and device based on dual-channel U-Net model
Liu et al. A robust coverless steganography scheme using camouflage image
Wang et al. STNet: A style transformation network for deep image steganography
Fu et al. CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image steganalysis
Yuan et al. GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion
CN113158583A (en) End-to-end text image watermark model establishing method based on deep learning
CN113298689B (en) Large-capacity image steganography method
Jamali et al. Robust watermarking using diffusion of logo into auto-encoder feature maps
CN106709915A (en) Image resampling operation detection method
Ma et al. Enhancing the security of image steganography via multiple adversarial networks and channel attention modules
Madhu et al. CNN approach for medical image authentication
CN112862655B (en) JPEG image steganalysis method based on channel space attention mechanism
Surabhi et al. Advancing Faux Image Detection: A Hybrid Approach Combining Deep Learning and Data Mining Techniques
Yao et al. High invisibility image steganography with wavelet transform and generative adversarial network
CN114648436A (en) Screen shot resistant text image watermark embedding and extracting method based on deep learning

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21941643

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21941643

Country of ref document: EP

Kind code of ref document: A1