Image Steganography based on Style Transfer

被引:0
作者
Zheng, Shuli [1 ]
Tang, Yunjin [1 ]
Zhang, Yu [1 ]
Hu, Donghui [1 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat Sci, Hefei, Peoples R China
来源
2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024 | 2024年
基金
中国国家自然科学基金;
关键词
image steganography; style transfer; steganographic capacity; NETWORK;
D O I
10.1109/ICIPMC62364.2024.10586707
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Traditional embedding-based image steganography embeds information by modifying the pixels of a natural image, which inevitably results in modification traces. We propose an image steganography method based on style migration. The method performs secret information hiding during the process of style transfer of an image, and uses the feature transformations brought about by the style migration to mask the steganography behavior. Meanwhile, the style-specific content-aware loss function is used to preserve the style-related content features to provide space for the embedding of secret information. Compared to other steganographic approaches utilizing style transfer, the method proposed in this paper significantly enhances the steganographic capacity for embedding secret information in stylized images. Furthermore, the special design of the network structure ensures the accuracy during extraction. Finally, the effectiveness of the method proposed in this paper is verified through a large number of experiments.
引用
收藏
页码:211 / 217
页数:7
相关论文
共 28 条
  • [1] Zhang KA, 2019, Arxiv, DOI arXiv:1901.03892
  • [2] High-Capacity Image Steganography Algorithm Based on Image Style Transfer
    Bi, Xinliang
    Yang, Xiaoyuan
    Wang, Chao
    Liu, Jia
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [3] Deep Residual Network for Steganalysis of Digital Images
    Boroumand, Mehdi
    Chen, Mo
    Fridrich, Jessica
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1181 - 1193
  • [4] Chen Xianyi, 2020, IEEE T NETWORK SCI E, V2
  • [5] Cost Reassignment for Improving Security of Adaptive Steganography Using an Artificial Immune System
    Chen, Yijing
    Wang, Hongxia
    Li, Wanjie
    Luo, Jie
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2022, 29 : 1564 - 1568
  • [6] Steganalysis of LSB embedding in multimedia signals
    Dumitrescu, S
    Wu, XL
    [J]. IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : 581 - 584
  • [7] Fridrich J., 2009, STEGANOGRAPHY DIGITA
  • [8] Gatys L., 2015, Texture Synthesis Using Convolutional Neural NetworksOpen Source Implementation on GitHub, P262
  • [9] Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application
    Ghamizi, Salah
    Cordy, Maxime
    Papadakis, Mike
    Le Traon, Yves
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW 2021), 2021, : 31 - 40
  • [10] Generative Adversarial Networks
    Goodfellow, Ian
    Pouget-Abadie, Jean
    Mirza, Mehdi
    Xu, Bing
    Warde-Farley, David
    Ozair, Sherjil
    Courville, Aaron
    Bengio, Yoshua
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (11) : 139 - 144