计算机应用专辑

基于卷积神经网络的轻量高效图像隐写

展开
  • 1. 河南师范大学 计算机与信息工程学院, 河南 新乡 453007;
    2. 教育人工智能与个性化学习河南省重点实验室, 河南 新乡 453007;
    3. 上海理工大学 光电与计算机工程学院, 上海 200093

收稿日期: 2024-07-07

  网络出版日期: 2025-01-24

基金资助

河南省高等学校重点科研项目(No.23A520006);河南省科技攻关计划项目(No.222102210199)资助

Lightweight and Efficient Image Steganography Based on Convolutional Neural Network

Expand
  • 1. College of Computer and Information Engineering, Henan Normal University, Xinxiang 453007, Henan, China;
    2. Key Laboratory of Artificial Intelligence and Personalized Learning in Education of Henan Province, Xinxiang 453007, Henan, China;
    3. School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China

Received date: 2024-07-07

  Online published: 2025-01-24

摘要

基于深度学习的图像隐写方法,因存在模型参数量和计算量大等问题,而面临高参数和计算负载的挑战,为此提出了一种轻量高效的图像隐写方法。首先在编码器和解码器中引入Ghost模块,降低了编码器和解码器的参数量和计算量。其次提出了一个多尺度特征融合模块,用以捕捉多维数据中的复杂关系。最后提出了一个新颖的混合损失函数,可在保持模型不变的情况下提升图像隐写质量。实验结果表明,所提方法在256×256像素的图像上峰值信噪比达到47.59 dB。与目前最优的图像隐写方法相比,所提方法的隐写质量提升1.7 dB,参数量减少77%,计算量减少91%,在隐写质量上有较优的表现,同时模型的参数量和计算量大大降低,实现了模型的轻量高效化。

本文引用格式

段新涛, 白鹿伟, 徐凯欧, 张萌, 保梦茹, 武银行, 秦川 . 基于卷积神经网络的轻量高效图像隐写[J]. 应用科学学报, 2025 , 43(1) : 80 -93 . DOI: 10.3969/j.issn.0255-8297.2025.01.006

Abstract

Deep learning-based image steganography often faces challenges due to the large number of model parameters and high computational demands. In response, a lightweight and efficient image steganography method is proposed. Firstly Ghost module is introduced into the encoder and decoder, which reduces the number of parameters and computational complexity. Furthermore, a multi-scale feature fusion module is designed to capture complex relationships within multidimensional data. In addition, a novel hybrid loss function is proposed, which can improve image steganography quality without modifying the model. Experimental results show that the proposed method achieves a peak signal-to-noise ratio (PSNR) of 47.59 dB on a 256×256 pixel image. Compared with the current best image steganography method, the steganography quality is improved by 1.7 dB, the number of parameters is reduced by 77%, and number of computations by 91%. These results confirm that the proposed method effectively enhances steganography quality with reduced number of parameters and computational complexity of the model, achieving a lightweight and efficient model.

参考文献

[1] Fridrich J, Goljan M, Du R. Detecting LSB steganography in color, and gray-scale images [J]. IEEE MultiMedia, 2001, 8(4): 22-28.
[2] Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography [C]//12th Information Hiding Conference, 2010: 161-177.
[3] Baluja S. Hiding images in plain sight: deep steganography [C]//31st Annual Conference on Neural Information Processing Systems, 2017: 2070-2080.
[4] Zhang C, Benz P, Karjauv A, et al. UDH: universal deep hiding for steganography, watermarking, and light field messaging [C]//34th Conference on Neural Information Processing Systems, 2020: 10223-10234.
[5] Lu S P, Wang R, Zhong T, et al. Large-capacity image steganography based on invertible neural networks [C]//2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2021: 10811-10820.
[6] Jing J P, Deng X, Xu M, et al. HiNet: deep image hiding by invertible network [C]//IEEE/ CVF International Conference on Computer Vision, 2021: 4713-4722.
[7] Han K, Wang Y H, Tian Q, et al. GhostNet: more features from cheap operations [C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020: 1577-1586.
[8] Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain [J]. EURASIP Journal on Information Security, 2014(1): 1-13.
[9] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920-935.
[10] Tang W X, Tan S Q, Li B, et al. Automatic steganographic distortion learning using a generative adversarial network [J]. IEEE Signal Processing Letters, 2017, 24(10): 1547-1551.
[11] Goodfellow I, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets [C]//28th Conference on Neural Information Processing Systems, 2014: 2672-2680.
[12] Zhu J R, Kaplan R, Johnson J, et al. HiDDeN: hiding data with deep networks [C]//15th European Conference on Computer Vision, 2018: 682-697.
[13] Guan Z, Jing J, Deng X, et al. DeepMIH: deep invertible network for multiple image hiding [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023, 45(1): 372-390.
[14] Xu Y M, Mou C, Hu Y J, et al. Robust invertible image steganography [C]//2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022: 7875-7884.
[15] Huo L, Huang L, Gan Z, et al. A fitting model with optimal multiple image hiding effect [J]. Neurocomputing, 2024, 571: 127146.
[16] Shi W Z, Caballero J, Huszár F, et al. Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network [C]//2016 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2016: 1874-1883.
[17] Zhao H S, Shi J P, Qi X J, et al. Pyramid scene parsing network [C]//2017 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2017: 6230-6239.
[18] Hou Q B, Zhang L, Cheng M M, et al. Strip pooling: rethinking spatial pooling for scene parsing [C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020: 4002-4011.
[19] Almohammad A, Ghinea G. Stego image quality and the reliability of PSNR [C]//2010 2nd International Conference on Image Processing Theory, Tools and Applications, 2010: 215-220.
[20] Wang Z, Bovik A C, Sheikh H R, et al. Image quality assessment: from error visibility to structural similarity [J]. IEEE Transactions on Image Processing, 2004, 13(4): 600-612.
[21] Zhang R, Isola P, Efros A A, et al. The unreasonable effectiveness of deep features as a perceptual metric [C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2018: 586-595.
[22] Deng J, Dong W, Socher R, et al. ImageNet: a large-scale hierarchical image database [C]//2009 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2009: 248-255.
[23] Lin T Y, Maire M, Belongie S, et al. Microsoft COCO: common objects in context [C]//13th European Conference on Computer Vision, 2014: 740-755.
[24] Heusel M, Ramsauer H, Unterthiner T, et al. GANs trained by a two time-scale update rule converge to a local Nash equilibrium [C]//31st Annual Conference on Neural Information Processing Systems, 2017: 6627-6638.
[25] Xu G S, Wu H Z, Shi Y Q. Structural design of convolutional neural networks for steganalysis [J]. IEEE Signal Processing Letters, 2016, 23(5): 708-712.
[26] Ye J, Ni J Q, Yi Y. Deep learning hierarchical representations for image steganalysis [J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11): 2545-2557.
[27] Zhang R, Zhu F, Liu J Y, et al. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis [J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 1138-1150.
文章导航

/