针对基于载体选择的隐写算法存在的安全问题,提出了一种基于图像翻译的载体选择式图像隐写方案.发送方按载体选择的方法从图像库中选取秘密信息并得到含密图像,然后输入到跨域变换模型中进行跨域变换,生成跨域图像并传递给接收方;接收方将跨域图像输入到发送方,由线下传递的跨域变换模型中得到含密图像,然后依据映射关系库将含密图像逆向转化为秘密信息.实验结果表明,所提出的方案在容量、抗检测性和安全性方面均有明显提升.
To address the security risk in steganography algorithms using cover selection, an image-to-image translation steganography scheme based on cover selection is proposed. In the proposed scheme, the sender first selects the stego images from image libraries by the method of cover selection, then inputs the stego images into the cross-domain transformation model to get cross-domain images and transmits them to the receiver. Whereas the receiver receives the cross-domain images, and inputs them into the cross-domain transformation model to obtain stego images, then reversely converts them into secret information according to the mapping relation library. Experimental results show that the proposed method has significantly improvement in terms of capacity, anti-detection, and security.
[1] Fridrich J. Steganography in digital media:principles, algorithms, and applications[M]. New York:Cambridge University Press, 2009.
[2] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):201-214.
[3] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935.
[4] Qian Y, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks[J]. The International Society for Optical Engineering, 2015, 9409:94090J-94090J-10.
[5] 阮书涵,秦正才. 一种基于GIF图像的无载体隐蔽通信方法[J]. 通信技术, 2017, 50(7):1506-1510. Ran S H, Qin Z C. Coverless covert communication based on GIF Ⅱmage[J]. Communications Technology, 2017, 50(7):1506-1510. (in Chinese)
[6] 周志立,曹燚,孙星明. 基于图像Bag-of-Words模型的无载体信息隐藏[J]. 应用科学学报,2016, 34(5):527-536. Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on Bag-of-Words model of image[J]. Journal of Applied Sciences, 2016, 34(5):527-536.(in Chinese)
[7] Ke Y, Zhang M, Liu J, et al. Generative steganography with Kerckhoffs' principle based on generative adversarial networks[DB/OL]. 2017[2017-11-25]. arXiv:1711.04916.
[8] Liu J, Zhou T, Zhang Z, et al. Digital gardan grille:a modern approach for information hiding[DB/OL]. 2018[2018-03-21]. arXiv:1803.09219.
[9] Liu J, Ke Y, Lei Y, et al. Generative steganography by sampling[J]. IEEE Access, 2019, 7:118586-118597.
[10] Liu M M, Zhang M Q, Liu J, et al. Coverless information hiding based on generative adversarial networks[DB/OL]. 2017[2017-12-29]. arXiv:1712.06951.
[11] Hu D H, Wang L, Jing W J, et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018:1-12.
[12] Yi Z, Zhang H, Tan P, et al. DualGAN:unsupervised dual learning for image-to-image translation[DB/OL]. 2017[2017-05-25]. arXiv:1704.02510.
[13] Zhu J Y, Park T, Isola P, et al. Unpaired image-to-image translation using cycle-consistent adversarial networks[C]//IEEE International Conference on Computer Vision, 2017:2242-2251.
[14] Kim T, Cha M, Kim H, et al. Learning to discover cross-domain relations with generative adversarial networks[J]. 한국지능정보시스템학회 학술대회논문집, 2017, 50(7):1506-1510
[15] Johnson J, Alahi A, Li F F. Perceptual losses for real-time style transfer and super-resolution[DB/OL]. 2016[2016-10-16]. arXiv:1603.08155.
[16] Luan F J, Paris S, Shechtman E, et al. Deep photo style transfer[C]//IEEE Conference on Computer Vision and Pattern Recognition, 2017:6997-7005.
[17] Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets[C]//International Conference on Neural Information Processing Systems, 2014, 2:2672-2680.
[18] Zhou Z, Sun H, Harit R, et al. Coverless image steganography without embedding[C]//International Conference on Cloud Computing and Security. Springer, 2015, 9483:123-132.
[19] Zheng S L, Wang L, Ling B H, et al. Coverless information hiding based on robust image hashing[C]//Intelligent Computing Methodologies:13th International Conference, 2017:536-547.
[20] Otori H, Kuriyama S. Texture synthesis for mobile data communications[J]. IEEE Computer Graphics and Applications, 2009, 29(6):74-81.
[21] Xu J, Mao X, Jin X, et al. Hidden message in a deformation-based texture[J]. The Visual Computer, 2015, 31(12):1653-1669.
[22] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions on Image Processing, 2014, 24(1):130-139.
[23] Ke Y, Liu J, Zhang M Q, et al. Steganography security:principle and practice[J]. IEEE Access, 2018(6):73009-73022.