High-security image steganography integrating multi-scale feature fusion with residual attention mechanism

被引:1
作者
Liang, Jiaqi [1 ]
Xie, Wei [1 ]
Wu, Haotian [1 ]
Zhao, Junfeng [2 ]
Song, Xianhua [1 ]
机构
[1] Harbin Univ Sci & Technol, Dept Appl Math, Harbin 150080, Peoples R China
[2] Harbin Inst Technol, Dept Comp Sci & Technol, Harbin 150080, Peoples R China
基金
中国国家自然科学基金;
关键词
Image steganography; GAN; Multi-scale feature fusion; Residual attention mechanism; Dual steganalyzers; STEGANALYSIS; FRAMEWORK;
D O I
10.1016/j.neucom.2025.129838
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Constructing a good cost function is crucial for minimizing embedding distortion in image steganography. Recently, deep learning-based adaptive cost learning in image steganography has achieved significant advancements. For GAN-based image steganography, an encoder-decoder structure is typically employed by the generator. However, the continual encoding process often results in a lack of detailed information. Even if the image resolution is restored through skip connections, the generator will still be limited. To address the issue, this paper proposes a novel GAN structure named UMSA-GAN. Firstly, we design a residual attention mechanism, Res-CBAM, integrated into the generator network, which enables focusing on high-frequency regions in the cover image. Secondly, multi-scale feature information is also fused using skip connections, which enables the generator to learn more shallow features. Finally, unlike most of the previous works that only utilized Xu-Net as the discriminator, dual steganalyzers are also introduced as the discriminator to further enhance performance. Extensive comparative experiments demonstrate that UMSA-GAN effectively learns features from the cover images and generates better embedding probability maps. Compared to traditional and state-of-the-art GANbased steganographic methods, UMSA-GAN exhibits superior security performance. In addition, the rationality and superiority of UMSA-GAN are further verified by a large number of ablation studies.
引用
收藏
页数:13
相关论文
共 53 条
[21]  
Holub V, 2012, IEEE INT WORKS INFOR, P234, DOI 10.1109/WIFS.2012.6412655
[22]  
Hu J, 2018, PROC CVPR IEEE, P7132, DOI [10.1109/TPAMI.2019.2913372, 10.1109/CVPR.2018.00745]
[23]   Establishing Robust Generative Image Steganography via Popular Stable Diffusion [J].
Hu, Xiaoxiao ;
Li, Sheng ;
Ying, Qichao ;
Peng, Wanli ;
Zhang, Xinpeng ;
Qian, Zhenxing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :8094-8108
[24]  
Huang Dongxia, 2023, IEEE Trans. Inf. Forensics Secur.
[25]   Globally and Locally Consistent Image Completion [J].
Iizuka, Satoshi ;
Simo-Serra, Edgar ;
Ishikawa, Hiroshi .
ACM TRANSACTIONS ON GRAPHICS, 2017, 36 (04)
[26]  
Ioffe S, 2015, Arxiv, DOI [arXiv:1502.03167, DOI 10.48550/ARXIV.1502.03167, 10.48550/arXiv.1502.03167]
[27]   Scaling up GANs for Text-to-Image Synthesis [J].
Kang, Minguk ;
Zhu, Jun-Yan ;
Zhang, Richard ;
Park, Jaesik ;
Shechtman, Eli ;
Paris, Sylvain ;
Park, Taesung .
2023 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2023, :10124-10134
[28]   Ensemble Classifiers for Steganalysis of Digital Media [J].
Kodovsky, Jan ;
Fridrich, Jessica ;
Holub, Vojtech .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) :432-444
[29]  
Lee CY, 2015, JMLR WORKSH CONF PRO, V38, P562
[30]  
Li B, 2014, IEEE IMAGE PROC, P4206, DOI 10.1109/ICIP.2014.7025854