Information Hiding Mechanism Based on Generative Adversarial Networks

被引:0
作者
Cheng, Xiaohui [1 ,2 ]
Zhao, Jun [1 ]
Kang, Yanping [1 ,2 ]
机构
[1] Guilin Univ Technol, Coll Informat Sci & Engn, Guilin, Peoples R China
[2] Guangxi Key Lab Embedded Technol & Intelligent Sy, Guilin, Peoples R China
来源
PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT) | 2020年
关键词
information hiding; generate adversarial networks; generative steganography; information security;
D O I
10.1109/ICCASIT50869.2020.9368650
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
With the rapid development of artificial intelligence and the Internet of Things technology, the demand for concealment of data and information is increasingly strong, and information hiding technology plays a key role in information security. At present, there are some problems in the generative steganography mechanism based on deep learning, such as low quality of generative steganography and weak anti-steganographic analysis ability. In view of the above problem, this paper proposes a Realness-DCGAN based information hiding mechanism, this mechanism will secret information mapping division and the noise vector generator, according to the noise generated vector containing the secret image by using fidelity distribution as a standard of judging output, constraint generator to generate a higher quality of the secret image, finally using an extractor to extract the secret information. Experiments show that compared with the traditional steganography mechanism based on deep learning, the information hiding mechanism proposed in this paper by embedding RealnessGAN into the traditional DCGAN can significantly improve the quality of generated images containing secrets, and improve the accuracy and security of information extraction.
引用
收藏
页码:625 / 629
页数:5
相关论文
共 15 条
  • [1] Alec R., 2016, 4 INT C LEARN REPR I, P1
  • [2] [Anonymous], 2019, INFORM NETWORK SECUR
  • [3] Bistouni Fathollah, 2020, J I ELECT COMPUTER, V2, P93
  • [4] Median Filtering Forensics Based on Convolutional Neural Networks
    Chen, Jiansheng
    Kang, Xiangui
    Liu, Ye
    Wang, Z. Jane
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (11) : 1849 - 1853
  • [5] Goljan M, 2014, IEEE INT WORKS INFOR, P185, DOI 10.1109/WIFS.2014.7084325
  • [6] Goodfellow I., 2014, ADV NEUR IN, P2672
  • [7] Ioffe S, 2015, PR MACH LEARN RES, V37, P448
  • [8] Kartik Sharma, 2019, J ARTIFICIAL INTELLI, V1, P143
  • [9] An adaptive virtual machine placement Gaussian model and method
    Li, Zhihua
    Li, Shuangli
    Lin, Kaiqing
    [J]. 2019 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2019, : 19 - 24
  • [10] Miyato T., 2018, P 6 INT C LEARNING R