检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Xiong Zhang Minqing Zhang Xu’an Wang Siyuan Huang Fuqiang Di
机构地区:[1]College of Cryptography Engineering,Engineering University of People’s Armed Police,Xi’an,710086,China [2]Key Laboratory of People’s Armed Police for Cryptology and Information Security,Engineering University of People’s Armed Police,Xi’an,710086,China [3]Key Laboratory of CTC&Information Engineering,Ministry of Education,Engineering University of People’s Armed Police,Xi’an,710086,China
出 处:《Computers, Materials & Continua》2024年第10期1433-1448,共16页计算机、材料和连续体(英文)
基 金:the National Natural Science Foundation of China(Nos.62272478,61872384,62172436,62102451);Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584);Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
摘 要:Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission.To overcome these challenges,we propose a constructive robust image steganography technique based on style transformation.Unlike traditional steganography,our algorithm does not involve any direct modifications to the carrier data.In this study,we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and then used the mapping dictionary to map secret information to secret images.Through image semantic segmentation and style transfer techniques,we combined the style of secret images with the content of public images to generate stego images.This type of stego image can resist interference during public channel transmission,ensuring the secure transmission of information.At the receiving end,we input the stego image into a trained secret image reconstruction network,which can effectively reconstruct the original secret image and further recover the secret information through a mapping dictionary to ensure the security,accuracy,and efficient decoding of the information.The experimental results show that this constructive information hiding method based on style transfer improves the security of information hiding,enhances the robustness of the algorithm to various attacks,and ensures information security.
关 键 词:Information hiding neural style transfer ROBUSTNESS map dictionary
分 类 号:TP39[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222