Competitive Coevolution for Color Image Steganography

被引:0
作者
Ahuja, Sarthak [1 ]
Kumar, C. Udaya [1 ]
Hemalatha, S. [1 ]
机构
[1] Manipal Acad Higher Educ, Manipal Inst Technol, Dept Comp Sci & Engn, Manipal 576104, Karnataka, India
来源
PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS) | 2019年
关键词
steganography; generative adversarial networks; squeeze and excitation inception modules;
D O I
10.1109/iccs45141.2019.9065844
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need for more secure and advanced dissemination is ever increasing since advancement in digital transmission has also posed equally challenging threats. Steganography has been around for a while now, with frequent updates in the traditional methods. In the past one year, with the rise in research in deep learning, Steganography and Steganalysis have emerged as a prime application. The paper has further worked on it, with introducing a competitive coevolution learning approach wherein Generative Adversarial Networks(GANs) are used for performing steganography along with steganalysis to improve the overall results. RGB color images are used as cover and secret images. A mixed loss function was used which is a weighted sum of Mean Squared Error(MSE), Structural Similarity Index(SSIM) and Mean Structural Similarity Index(MSSIM) for generating the stego image and extracting the secret image. The major improvements proposed in this paper are the introduction of attention based Squeeze and Excitation -Inception modules in the hiding and the reveal networks, which enhance spatial encoding and increase the representational power of the network, thereby giving better overall results.
引用
收藏
页码:719 / 723
页数:5
相关论文
共 16 条
[1]  
Baluja S, 2017, ADV NEUR IN, V30
[2]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[3]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[4]  
Goodfellow IJ, 2014, ADV NEUR IN, V27, P2672, DOI DOI 10.1145/3422622
[5]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[6]  
He KM, 2014, LECT NOTES COMPUT SC, V8691, P346, DOI [arXiv:1406.4729, 10.1007/978-3-319-10578-9_23]
[7]   Wavelet transform based steganography technique to hide audio signals in image [J].
Hemalatha, S. ;
Acharya, U. Dinesh ;
Renuka, A. .
GRAPH ALGORITHMS, HIGH PERFORMANCE IMPLEMENTATIONS AND ITS APPLICATIONS (ICGHIA 2014), 2015, 47 :272-281
[8]  
Hemalatha S., 2013, INT J INFORM COMPUTA, V3, P13
[9]  
Li W, 2013, GECCO'13: PROCEEDINGS OF THE 2013 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, P223
[10]  
Masud Karim S. M., 2011, 2011 14th International Conference on Computer and Information Technology (ICCIT), P286, DOI 10.1109/ICCITechn.2011.6164800