期刊文献+

基于HUGO-WGAN图像信息隐写方案 被引量:2

Image Information Steganography Scheme Based on HUGO-WGAN
下载PDF
导出
摘要 信息隐藏是将信息以不可见的方式隐藏在一个宿主信号中,以实现机密通信和版权保护等目标。它主要用于两个特定的秘密渠道,尤其是在快速发展的社交网络中,以海量的图像和视频为媒介。这为隐藏信息提供了更多的机会和挑战,对国家安全和信息安全都十分重要。基于传统图像信息隐藏方法存在的难以抵抗基于特征学习的深度神经网络隐写分析技术的问题,本项目将生成式对抗网络引入到原始图像隐写方法中[1],利用GAN(Generative Adversarial Networks)模型中的博弈对抗策略,为图像信息隐藏生成更安全的载体信息,更高视觉质量的图像,增强其抵抗隐写分析的性能。提出了一种新的隐写方案,调用WGAN(Wasserstein GAN)模型框架,采用HUGO(Highly Undetectable ste GO)隐写算法实现更加安全的图像隐写操作[2]。 Information hiding is to hide information in a host signal in an invisible way to achieve the purpose of covert communication and copyright protection.It is mainly used for secret channels between specific parties,especially in the fast-growing social network,with rich images and videos as carriers,which provides more opportunities and challenges for information hiding,and is important for national security and information security.Meaning.Based on the traditional image information hiding method that is difficult to resist the problem of feature learning-based deep neural network steganalysis technology,this project introduces the generative confrontation network into the original image steganography method,using the GAN(Generative Adversarial Networks)model The game confrontation strategy generates safer carrier information for image information hiding,higher visual quality images,and enhances its resistance to steganalysis.A new steganography scheme is proposed,which calls the WGAN(Wasserstein GAN)model framework and uses the HUGO(Highly Undetectable steGO)steganography algorithm to achieve more secure image steganographyoperations.
作者 张菊 阚凌宇 王思纯 杨起豪 ZHANG Ju;KAN Lingyu;WANG Sichun;YANG Qihao(Huaqiao University,Xiamen Fujian 361021)
机构地区 华侨大学
出处 《软件》 2021年第4期81-83,95,共4页 Software
基金 华侨大学2020年度大学生创新训练计划项目(S202010385025)。
关键词 图像隐写 生成对抗网络(GAN) WGAN HUGO 安全性 imagesteganography Generative Adversarial Networks(GAN) WGAN HUGO security
  • 相关文献

参考文献11

二级参考文献43

  • 1王向阳,杨红颖.基于视觉掩蔽特性的小波域彩色数字水印技术[J].计算机辅助设计与图形学学报,2004,16(9):1240-1243. 被引量:5
  • 2ZHANGWei-ming,LIShi-qu,CAOJia,LIUJiu-fen.Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information[J].Wuhan University Journal of Natural Sciences,2005,10(1):315-318. 被引量:5
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4王朔中,张新鹏,张开文.数字密写与密写分析[M].北京:清华大学出版社,2005.
  • 5张卫明,李世取,刘九芬.对空域图像LSB隐写术的提取攻击[J].计算机学报,2007,30(9):1625-1631. 被引量:18
  • 6Stefan K,Fabien APP.信息隐藏技术——隐写术与数字水印[M].吴秋新,钮心忻,等译.北京:人民邮电出版社,2001.
  • 7Provos N, Honeyman P. Hide and seek: an introduction to steganography[J]. IEEE Security & Privacy Magazine,2003, 1(3): 32-44.
  • 8Ahmed F, Moskowitz I S. Correlation-based watermarking method for image authentication applications [J]. Optical Engineering, 2004, 43(8): 1 833-1 838.
  • 9Sang J, Alam M S. Fragility and robustness of binary phase-only filter based fragile/semi-fragile digital image watermarking[J]. IEEE Transactions on Instrumentation and Measurement, 2008, 57(3) : 595-606.
  • 10Fridrich J, Goljan M. Practical steganalysis of digital images-state of the art[C]//Security and Watermarking of Multimedia Contents Ⅳ. San Jose: SPIE, 2002 : 1-13.

共引文献34

同被引文献21

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部