收稿日期: 2018-01-28
网络出版日期: 2018-03-31
基金资助
国家自然科学基金(No.61379152,No.61403417)资助
Coverless Information Hiding Based on Generative Adversarial Networks
Received date: 2018-01-28
Online published: 2018-03-31
传统信息隐藏算法通过修改载体来嵌入秘密信息,难以从根本上抵抗基于统计的信息隐藏分析方法的检测,为此提出一种基于生成对抗网络的无载体信息隐藏方法.该方法将生成对抗网络中的类别标签替换为秘密信息作为驱动,直接生成含密图像进行传递,再通过判别器将含密图像中的秘密信息提取出来,并借助生成对抗网络实现无载体信息隐藏.实验结果和分析表明,该隐藏方法在隐写容量、抗隐写分析、安全性方面均有良好表现.
刘明明, 张敏情, 刘佳, 高培贤, 张英男 . 基于生成对抗网络的无载体信息隐藏[J]. 应用科学学报, 2018 , 36(2) : 371 -382 . DOI: 10.3969/j.issn.0255-8297.2018.02.015
Traditional image steganography algorithms, which embed the secret information by modifying the content of the image more or less, are hard to resist the detection of image steganalysis tools. To address this problem, a novel coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is replaced with the secret information as a driver to generate hidden image directly. And the secret information is extracted from the hidden image through a discriminator. Experimental results show that this hidden algorithm ensures good performs in terms of steganography capacity, anti-steganalysis and safety.
[1] 沈昌祥,张焕国,冯登国. 信息安全综述[J]. 中国科学,2007, 37(2):129-150. Shen C X, Zhang H G, Feng D G. A survey of information security[J]. Science China, 2007, 37(2):129-150. (in Chinese)
[2] Tirkel A Z, Rankin G A, Schyndel R V. Electronic watermark[C]//Digital Image Computing, Technology and Applications, 1993.
[3] Yang C H, Weng C Y, Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems[J]. IEEE Transactions on Information Forensics & Security, 2008, 3(3):488-497.
[4] Holub V, Fridrich J, Denemark T. Universal distortion function for steganography in an arbitrary domain[J]. Eurasip Journal on Information Security, 2014, 2014(1):1.
[5] Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography[J]. Lecture Notes in Computer Science, 2010, 6387:161-177.
[6] Holub V, Fridrich J. Designing steganographic distortion using directional flters[C]//IEEE International Workshop on Information Forensics and Security. IEEE, 2013:234-239.
[7] Ruanaidh J K, Dowling W J, Boland F M. Phase watermarking of digital images[C]//International Conference on Image Processing, 1996:239-242.
[8] Cox I J, Kilian J, Leighton F T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673-1687.
[9] Lin W H, Horng S J, Kao T W. An efcient watermarking method based on signifcant difference of wavelet coefcient quantiZation[J]. IEEE Transactions on Multimedia, 2008, 10(5):746-757.
[10] 周志立,曹燚,孙星明. 基于图像bag-of-words模型的无载体信息隐藏[J]. 应用科学学报,2016, 34(5):527-536. Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences, 2016, 34(5):527-536. (in Chinese)
[11] 张新鹏,钱振兴,李晟. 信息隐藏研究展望[J]. 应用科学学报,2016, 34(5):475-489. Zhang X P, Qian Z X, Li S. Prospect of digital steganography research[J]. Journal of Applied Sciences, 2016, 34(5):475-489. (in Chinese)
[12] Otori H, Kuriyama S. Texture synthesis for mobile data communications[J]. IEEE Computer Graphics and Applications, 2009, 29(6):74-81.
[13] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions Image Processing, 2015, 24(1):130-139.
[14] Goodfellow I, Pouget A J, Mirz M, Xu B, Wardef D, Ozair S, Courville A, Bengio Y. Generative adversarial nets[C]//International Conference on Neural Information Processing Systems, 2014:2672-2680.
[15] Odena A, Olah C, Shlens J. Conditional image synthesis with auxiliary classifer GANs[J]. Computer Science, 2016.
[16] 王坤峰,苟超,段艳杰,林懿伦,郑心湖,王飞跃. 生成式对抗网络GAN的研究进展与展望[J]. 自动化学报,2017, 43(3):321-332. Wang K F, Gou C, Duan Y J, Lin Y L, Zheng X H, Wang F Y. Generative adversarial networks:the state of the art and beyond[J]. Acta Automatica Sinica, 2017, 43(3):321-332. (in Chinese)
[17] Radford A, Metz L, Chintala S. Unsupervised representation learning with deep convolutional generative adversarial networks[J]. Computer Science, 2015.
[18] Mirz M, Osindero S. Conditional generative adversarial nets[J]. Computer Science, 2014:2672-2680.
[19] Chen X, Duan Y, Houthooft R, Schulmanj, Sutskeveri, Abbeel P. InfoGAN:interpretable representation learning by information maximizing generative adversarial nets[J]. Computer Science, 2016.
[20] Pibre L, Pasquet J, Ienco D, Chaumont M. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch[J]. Electronic Imaging, 2016, 4(8):1-11.
/
| 〈 |
|
〉 |