Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence

被引:1
作者
Zhang, Xiong [1 ,2 ]
Zhang, Minqing [1 ,2 ,3 ]
Wang, Xu An [1 ,2 ,3 ]
Jiang, Wen [1 ,2 ]
Jiang, Chao [1 ,2 ]
Yang, Pan [1 ,2 ,4 ]
机构
[1] Engn Univ Peoples Armed Police, Coll Cryptog Engn, Xian 710086, Peoples R China
[2] Key Lab Peoples Armed Police Cryptol & Informat Se, Xian 710086, Peoples R China
[3] Engn Univ Peoples Armed Police, Key Lab CTC & Informat Engn, Minist Educ, Xian 710086, Peoples R China
[4] Staff Dept Peoples Armed Police Ningxia Corps, Yinchuan 750000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 02期
基金
中国国家自然科学基金;
关键词
Information hiding; neural style transfer; robustness;
D O I
10.32604/cmc.2024.050899
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission. The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission. The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data. This process effectively enhances the concealment and imperceptibility of confidential information, thereby improving the security of such information during transmission and reducing security risks. Furthermore, we have designed a specialized attack layer to simulate real-world attacks and common noise scenarios encountered in practical environments. Through adversarial training, the algorithm is strengthened to enhance its resilience against attacks and overall robustness, ensuring better protection against potential threats. Experimental results demonstrate that our proposed algorithm successfully enhances the concealment and unknowability of secret information while maintaining embedding capacity. Additionally, it ensures the quality and fidelity of the stego image. The method we propose not only improves the security and robustness of information hiding technology but also holds practical application value in protecting sensitive data and ensuring the invisibility of confidential information.
引用
收藏
页码:1925 / 1938
页数:14
相关论文
共 24 条
  • [1] Bhuiyan Touhid, 2019, 2019 International Conference on Information and Communications Technology (ICOIACT), P44
  • [2] High-Capacity Image Steganography Algorithm Based on Image Style Transfer
    Bi, Xinliang
    Yang, Xiaoyuan
    Wang, Chao
    Liu, Jia
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] Detecting LSB steganography in color and gray-scale images
    Fridrich, J.
    Goljan, M.
    Du, R.
    [J]. IEEE Multimedia, 2001, 8 (04) : 22 - 28
  • [4] Image Style Transfer Using Convolutional Neural Networks
    Gatys, Leon A.
    Ecker, Alexander S.
    Bethge, Matthias
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 2414 - 2423
  • [5] Reversible data hiding based on multiple histograms modification and deep neural networks
    Hou, Jiacheng
    Ou, Bo
    Tian, Huawei
    Qin, Zheng
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 92
  • [6] Hu D., 2022, arXiv
  • [7] Huang Ji-Wu, 2000, Acta Electronica Sinica, V28, P57
  • [8] Arbitrary Style Transfer in Real-time with Adaptive Instance Normalization
    Huang, Xun
    Belongie, Serge
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2017, : 1510 - 1519
  • [9] Neural Style Transfer: A Review
    Jing, Yongcheng
    Yang, Yezhou
    Feng, Zunlei
    Ye, Jingwen
    Yu, Yizhou
    Song, Mingli
    [J]. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2020, 26 (11) : 3365 - 3385
  • [10] Reversible data hiding scheme using deep learning and visual cryptography for medical image communication
    Kumar, Namachivayam Rajesh
    Krishnan, Raghupathy Bala
    Manikandan, Ganesan
    Subramaniyaswamy, Vairavasundaram
    Kotecha, Ketan
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)