Coverless image steganography using morphed face recognition based on convolutional neural network

被引:0
作者
Yung-Hui Li
Ching-Chun Chang
Guo-Dong Su
Kai-Lin Yang
Muhammad Saqlain Aslam
Yanjun Liu
机构
[1] Hon Hai Research Institute,AI Research Center
[2] University of Warwick,Department of Computer Science
[3] Feng Chia University,Department of Information Engineering and Computer Science
来源
EURASIP Journal on Wireless Communications and Networking | / 2022卷
关键词
Data hiding; Steganography; Deep learning; Morphed face recognition; Information security;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed face recognition is proposed. In our proposed data hiding approach, a group of morphed face images is produced from an arranged small-scale face image dataset. Then, a morphed face image which is encoded with a secret message is sent to the receiver. The receiver uses powerful and robust deep learning models to recover the secret message by recognizing the parents of the morphed face images. Furthermore, we design two novel Convolutional Neural Network (CNN) architectures (e.g. MFR-Net V1 and MFR-Net V2) to perform morphed face recognition and achieved the highest accuracy compared with existing networks. Additionally, the experimental results show that the proposed schema has higher retrieval capacity and accuracy and it provides better robustness.
引用
收藏
相关论文
共 50 条
  • [21] A Genetic Algorithm Based Optimized Convolutional Neural Network for Face Recognition
    Karlupia, Namrata
    Mahajan, Palak
    Abrol, Pawanesh
    Lehana, Parveen K.
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND COMPUTER SCIENCE, 2023, 33 (01) : 21 - 31
  • [22] Design of a Face Recognition System based on Convolutional Neural Network (CNN)
    Said, Yahia
    Barr, Mohammad
    Ahmed, Hossam Eddine
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2020, 10 (03) : 5608 - 5612
  • [23] Coverless image steganography based on DenseNet feature mapping
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Qiu, Yao
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [24] Image Steganography Scheme Using Dilated Convolutional Network
    Kich, Ismail
    Ameur, El Bachir
    Taouil, Youssef
    Benhfid, Amine
    2021 12TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2021, : 305 - 309
  • [25] Video-based face recognition based on deep convolutional neural network
    Zhai, Yilong
    He, Dongzhi
    PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON IMAGE, VIDEO AND SIGNAL PROCESSING (IVSP 2019), 2019, : 23 - 27
  • [26] Coverless real-time image information hiding based on image block matching and dense convolutional network
    Yuanjing Luo
    Jiaohua Qin
    Xuyu Xiang
    Yun Tan
    Qiang Liu
    Lingyun Xiang
    Journal of Real-Time Image Processing, 2020, 17 : 125 - 135
  • [27] Coverless real-time image information hiding based on image block matching and dense convolutional network
    Luo, Yuanjing
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    Liu, Qiang
    Xiang, Lingyun
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (01) : 125 - 135
  • [28] Biased face patching approach for age invariant face recognition using convolutional neural network
    Nimbarte M.
    Bhoyar K.K.
    Nimbarte, Mrudula (mrudula_inimbarte@rediffmail.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (19): : 103 - 124
  • [29] Illumination invariant face recognition using contourlet transform and convolutional neural network
    Hussain, Muhammad
    Alotaibi, Fouziah
    Qazi, Emad-ul-Haq
    AboAlSamh, Hatim A.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (01) : 383 - 396
  • [30] Weak Constraint Leaf Image Recognition based on Convolutional Neural Network
    Kang, Euncheol
    Oh, Il-Seok
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 435 - 438