A Mobile Steganography Method Based on Deep Learning

被引:0
|
作者
Liao X. [1 ]
Li Y. [1 ,2 ]
Ouyang J. [2 ]
Zhou J. [3 ]
Dai X. [4 ]
Qin Z. [1 ]
机构
[1] College of Computer Science and Electronic Engineering, Hunan University, Changsha
[2] School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan
[3] School of Physics and Electronics, Central South University, Changsha
[4] Great Wall Information Co., Ltd, Changsha
来源
Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences | 2022年 / 49卷 / 04期
基金
中国国家自然科学基金;
关键词
Deep learning; GAN; Lightweight; Mobile phone; Steganography;
D O I
10.16339/j.cnki.hdxbzkb.2022278
中图分类号
学科分类号
摘要
Steganography is one of the main methods for covert communication, while mobile phones are the most commonly used communication devices. The combination of the two has high practical significance. In recent years, steganography has developed rapidly with deep learning technologies. To improve the performance, networks evolve towards a more complex and large style, which gradually deviates from the real world scenarios with covert communication as the core, resulting in low practicability. For convenience and efficiency, a lightweight image steganography method is proposed for mobile phone. The network structure is designed in a light style, with depthwise separable convolutions utilized to reduce useless parameters and keeping a balance between accuracy and speed. Based on generative adversarial networks, the proposed method consists of a generator, a decoder, and a discriminator, which are trained together defiantly and finally advance in a spiral upward trend. To deal with various challenges in the real world, the model is deployed on mobile phones for tests. The networks used on smartphones are pruned, which indicates performance degradation. To ameliorate this problem and enhance decoding accuracy, BCH correcting codes are used in the method. The results show that the method can generate high-quality images with high speed, which meets the convenience requirements in today's world. Besides, it's worth noting that the method works without online requests. All the embedding and extracting tasks can be done by phone itself, which means this scheme is immune to eavesdropping attacks. © 2022, Editorial Department of Journal of Hunan University. All right reserved.
引用
收藏
页码:18 / 25
页数:7
相关论文
共 27 条
  • [11] GOODFELLOW I, POUGET-ABADIE J, MIRZA M, Et al., Generative adversarial networks, Communications of the ACM, 63, 11, pp. 139-144, (2020)
  • [12] FRIDRICH J, GOLJAN M, LISONEK P, Et al., Writing on wet paper, IEEE Transactions on Signal Processing, 53, 10, pp. 3923-3935, (2005)
  • [13] PEVNY T, FILLER T, BAS P., Using high-dimensional image models to perform highly undetectable steganography, Information Hiding, pp. 161-177, (2010)
  • [14] HOLUB V, FRIDRICH J., Digital image steganography using universal distortion, Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 59-68, (2013)
  • [15] FILLER T, JUDAS J, FRIDRICH J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, 6, 3, pp. 920-935, (2011)
  • [16] ZHANG Z K, PANG W G, XIE W J, Et al., Deep learning for real-time applications: a survey, Journal of Software, 31, 9, pp. 2654-2677, (2020)
  • [17] LIU Y, LI J, ZHANG J L, Et al., Research progress of two-dimensional human pose estimation based on deep learning, Computer Engineering, 47, 3, pp. 1-16, (2021)
  • [18] XIE X J, GU B., Research on antimicrobial resistance analysis based on deep learning, Journal of Hunan University (Natural Sciences), 48, 10, pp. 113-120, (2021)
  • [19] HAYES J, DANEZIS G., Generating steganographic images via adversarial training, Proceedings of the 31st International Conference on Neural Information Processing Systems, pp. 1951-1960, (2017)
  • [20] ZHU J R, KAPLAN R, JOHNSON J, Et al., HiDDeN: hiding data with deep networks, Computer Vision-ECCV 2018, pp. 682-697, (2018)