Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography

被引:26
作者
Wang, Zihan [1 ,2 ]
Byrnes, Olivia [3 ]
Wang, Hu [3 ]
Sun, Ruoxi [1 ]
Ma, Congbo [3 ]
Chen, Huaming [4 ]
Wu, Qi [3 ]
Xue, Minhui [1 ]
机构
[1] CSIROs Data61, Marsfield, NSW 2122, Australia
[2] Univ Queensland, Sch Informat Technol & Elect Engn, Brisbane, Qld 4072, Australia
[3] Univ Adelaide, Sch Comp & Math Sci, Adelaide, SA 5005, Australia
[4] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
关键词
Media; Watermarking; Steganography; Deep learning; Data models; Surveys; Data mining; Artificial intelligence (AI); cybersecurity; software engineering; CONVOLUTIONAL NEURAL-NETWORKS; IMAGE STEGANOGRAPHY;
D O I
10.1109/TCSS.2023.3268950
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding. By embedding information into a noise-tolerant signal, such as audio, video, or images, digital watermarking and steganography techniques can be used to protect sensitive intellectual property (IP) and enable confidential communication, ensuring that the information embedded is only accessible to authorized parties. This survey provides an overview of recent developments in deep learning techniques deployed for data hiding, categorized systematically according to model architectures and noise injection methods. In addition, potential future research directions that unite digital watermarking and steganography on software engineering to enhance security and mitigate risks are suggested and deliberated. This contribution furthers the creation of a more trustworthy digital world and advances responsible artificial intelligence (AI).
引用
收藏
页码:2985 / 2999
页数:15
相关论文
共 61 条
[1]   Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding [J].
Abdelnabi, Sahar ;
Fritz, Mario .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2021, :121-140
[2]  
Adelani David Ifeoluwa, 2020, Advanced Information Networking and Applications. Proceedings of the 34th International Conference on Advanced Information Networking and Applications (AINA-2020). Advances in Intelligent Systems and Computing (AISC 1151), P1341, DOI 10.1007/978-3-030-44041-1_114
[3]   ReDMark: Framework for residual diffusion watermarking based on deep networks [J].
Ahmadi, Mahdi ;
Norouzi, Alireza ;
Karimi, Nader ;
Samavi, Shadrokh ;
Emami, Ali .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 146
[4]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[5]  
Baluja S, 2017, ADV NEUR IN, V30
[6]  
Boehm B., 2014, ARXIV
[7]  
Chang C.-C., 2021, SECUR COMMUN NETW, P1
[8]   Adversarial Learning for Invertible Steganography [J].
Chang, Ching-Chun .
IEEE ACCESS, 2020, 8 :198425-198435
[9]   High-Capacity Robust Image Steganography via Adversarial Network [J].
Chen, Beijing ;
Wang, Jiaxin ;
Chen, Yingyue ;
Jin, Zilong ;
Shim, Hiuk Jae ;
Shi, Yun-Qing .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01) :366-381
[10]  
Darvish Rouhani B., 2018, ARXIV