检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李林[1,2] 范明钰 郝江涛[1,2] LI Lin;FAN Mingyu;HAO Jiangtao(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731;Science and Technology on Reactor System Design Technology Laboratory,Nuclear Power Institute of China,Chengdu 610213)
机构地区:[1]电子科技大学计算机科学与工程学院,成都611731 [2]中国核动力研究设计院核反应堆系统设计技术重点实验室,成都610213
出 处:《电子科技大学学报》2022年第2期259-263,共5页Journal of University of Electronic Science and Technology of China
基 金:国家自然科学基金(60373109);。
摘 要:传统的隐写方法依赖于难以构建的复杂的人工规则。基于富特征模型和深度学习的隐写分析方法击败了现有最优的隐写方法,这使得隐写的安全性面临挑战。为此提出了一种基于对抗攻击的图像隐写策略的搜索方法,以寻找合适的隐写策略。隐写模型首先根据已知隐写算法初始化失真代价,然后建立含参的代价调整策略。对手模型区分载体和载密图像的分布,以发现潜在的隐藏行为。针对对手模型,利用定向对抗攻击得到相应的基于梯度符号的评价向量。在隐写模型与对手模型之间建立对抗博弈过程,据此搜索目标隐写策略。隐写模型和对手模型均用深度神经网络模型实现。构建了4种隐写配置并同3种隐写方法进行了实验比较。结果表明,该方法能有效搜索到图像隐写策略,与人工设计的经典方法和最新的隐写方法相比具有竞争力。Steganography is to conceal the presence of secret communication.Traditional steganographic schemes rely on complex artificial rules that are difficult to construct.Steganalysers based on the rich models and deep learning achieve state-of-the-art performance.The security performance of existing steganographic methods is being challenged.In this paper,a search method based on image steganography model against attack is proposed to find a suitable steganography policy.The steganographic model constructs the parametric policy.The adversary model distinguishes the distribution of stego from cover to find the potential hiding artefacts.To obtain the corresponding evaluations,the adversarial attack is performed on adversary model.The security game between steganographic part and adversary is established via corresponding information,thus finding the target steganographic policy.The steganographic model and adversary model are implemented as deep neural networks.On the data set Bossbase,the payload is 0.2 and 0.4 bpp,the steganalysers are SRM and maxSRMd2.Four configurations with three steganographic schemes are compared.The experimental results show that the scheme proposed in this paper can obtain effective policy for image steganography,and the security performance is competitive compared with these schemes.
分 类 号:TP37[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.119.99.38