High-security image steganography integrating multi-scale feature fusion with residual attention mechanism

被引:1
作者
Liang, Jiaqi [1 ]
Xie, Wei [1 ]
Wu, Haotian [1 ]
Zhao, Junfeng [2 ]
Song, Xianhua [1 ]
机构
[1] Harbin Univ Sci & Technol, Dept Appl Math, Harbin 150080, Peoples R China
[2] Harbin Inst Technol, Dept Comp Sci & Technol, Harbin 150080, Peoples R China
基金
中国国家自然科学基金;
关键词
Image steganography; GAN; Multi-scale feature fusion; Residual attention mechanism; Dual steganalyzers; STEGANALYSIS; FRAMEWORK;
D O I
10.1016/j.neucom.2025.129838
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Constructing a good cost function is crucial for minimizing embedding distortion in image steganography. Recently, deep learning-based adaptive cost learning in image steganography has achieved significant advancements. For GAN-based image steganography, an encoder-decoder structure is typically employed by the generator. However, the continual encoding process often results in a lack of detailed information. Even if the image resolution is restored through skip connections, the generator will still be limited. To address the issue, this paper proposes a novel GAN structure named UMSA-GAN. Firstly, we design a residual attention mechanism, Res-CBAM, integrated into the generator network, which enables focusing on high-frequency regions in the cover image. Secondly, multi-scale feature information is also fused using skip connections, which enables the generator to learn more shallow features. Finally, unlike most of the previous works that only utilized Xu-Net as the discriminator, dual steganalyzers are also introduced as the discriminator to further enhance performance. Extensive comparative experiments demonstrate that UMSA-GAN effectively learns features from the cover images and generates better embedding probability maps. Compared to traditional and state-of-the-art GANbased steganographic methods, UMSA-GAN exhibits superior security performance. In addition, the rationality and superiority of UMSA-GAN are further verified by a large number of ablation studies.
引用
收藏
页数:13
相关论文
共 53 条
[1]   A steganography embedding method based on edge identification and XOR coding [J].
Al-Dmour, Hayat ;
Al-Ani, Ahmed .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 46 :293-306
[2]  
Zhang KA, 2019, Arxiv, DOI arXiv:1901.03892
[3]   Deep Reinforcement Learning A brief survey [J].
Arulkumaran, Kai ;
Deisenroth, Marc Peter ;
Brundage, Miles ;
Bharath, Anil Anthony .
IEEE SIGNAL PROCESSING MAGAZINE, 2017, 34 (06) :26-38
[4]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[5]  
Bas P., 2017, Image database of bows-2, P2016
[6]   Deep Residual Network for Steganalysis of Digital Images [J].
Boroumand, Mehdi ;
Chen, Mo ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) :1181-1193
[7]  
Bui Tu, 2023, 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), P933, DOI 10.1109/CVPRW59228.2023.00100
[8]   DeepLab: Semantic Image Segmentation with Deep Convolutional Nets, Atrous Convolution, and Fully Connected CRFs [J].
Chen, Liang-Chieh ;
Papandreou, George ;
Kokkinos, Iasonas ;
Murphy, Kevin ;
Yuille, Alan L. .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2018, 40 (04) :834-848
[9]  
Chongsheng Zhang, 2022, IEEE Transactions on Artificial Intelligence, V3, P297, DOI [10.1109/tai.2021.3116216, 10.1109/TAI.2021.3116216]
[10]   VecGAN: Image-to-Image Translation with Interpretable Latent Directions [J].
Dalva, Yusuf ;
Altindis, Said Fahri ;
Dundar, Aysegul .
COMPUTER VISION - ECCV 2022, PT XVI, 2022, 13676 :153-169