CLC number: TP309
On-line Access: 2025-07-02
Received: 2024-01-29
Revision Accepted: 2025-07-02
Crosschecked: 2024-06-24
Cited: 0
Clicked: 1491
Citations: Bibtex RefMan EndNote GB/T7714
Ai XIAO, Zhi LI, Guomei WANG, Long ZHENG, Haoyuan SUN. SRIS-Net: a robust image steganography algorithm based on feature score maps[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.2400069 @article{title="SRIS-Net: a robust image steganography algorithm based on feature score maps", %0 Journal Article TY - JOUR
SRIS-Net:基于特征评分图的鲁棒图像隐写算法贵州大学计算机科学与技术学院,中国贵阳市,550025 摘要:基于深度学习的图像隐写算法通常使用空间域或频域特征进行训练。但单一域的特征很难完全表达整个图像的内容,而隐写通常是多任务的,这通常导致隐写性能不佳。为此,本文提出一种基于特征评分图的鲁棒图像隐写算法,称为"安全和鲁棒图像隐写网络"(SRIS-Net)。首先,所提算法不是使用空间域隐写,而是利用卷积神经网络获得浅层空间域特征。这些特征通过拉普拉斯金字塔频域分解(LPFDD),以渐进辅助隐藏策略在不同频率子带中隐藏秘密信息,从而显著减少秘密信息对覆盖图像的影响,有效实现显著的不可见性和鲁棒性能。此外,提出一个全局-局部嵌入模块(GLEM),该模块通过考虑图像的整体结构和局部细节来实现嵌入,并提出一个双多尺度聚合子网络(DMSubNet)进行多尺度重构以提高载体图像的质量。为了确保安全性,提出一个双任务鉴别器结构,同时对图像进行真或假的判断,并生成载体图像感兴趣区域(ROI)的特征评分图,以指导嵌入模块生成具有更高隐蔽性和不可检测性的载密图像。在BOSSBase上的实验结果表明,所提出的SRIS-Net在不可检测性和鲁棒性方面优于其他主流方法,在视觉质量上分别提高超过9.2 dB和3.4 dB,容量可以增加到大约72-96 bpp。 关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Baluja S, 2017. Hiding images in plain sight: deep steganography. Proc 31st Int Conf on Neural Information Processing Systems, p.2066-2076. ![]() [2]Baluja S, 2020. Hiding images within images. IEEE Trans Patt Anal Mach Intell, 42(7):1685-1697. ![]() [3]Barni M, Bartolini F, Piva A, 2001. Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process, 10(5):783-791. ![]() [4]Bas P, Filler T, Pevný T, 2011. “Break our steganographic system”: the ins and outs of organizing boss. Proc 13th Int Conf on Information Hiding, p.59-70. ![]() [5]Cheddad A, Condell J, Curran K, et al., 2010. Digital image steganography: survey and analysis of current methods. Signal Process, 90(3):727-752. ![]() [6]Chen BJ, Wang JX, Chen YY, et al., 2020. High-capacity robust image steganography via adversarial network. KSII Trans Int Inform Syst, 14(1):366-381. ![]() [7]Denemark T, Fridrich J, Holub V, 2014. Further study on the security of S-UNIWARD. Proc IS&T/SPIE Electronic Imaging, Article 902805. ![]() [8]Duan XT, Jia K, Li BX, et al., 2019. Reversible image steganography scheme based on a U-Net structure. IEEE Access, 7:9314-9323. ![]() [9]Duan XT, Gou MX, Liu N, et al., 2020a. High-capacity image steganography based on improved Xception. Sensors, 20(24):7253. ![]() [10]Duan XT, Liu N, Gou MX, et al., 2020b. SteganoCNN: image steganography with generalization ability based on convolutional neural network. Entropy, 22(10):1140. ![]() [11]Fridrich J, Kodovsky J, 2012. Rich models for steganalysis of digital images. IEEE Trans Inform Forens Secur, 7(3):868-882. ![]() [12]Fu ZJ, Wang F, Cheng X, 2020. The secure steganography for hiding images via GAN. EURASIP J Image Video Process, 2020:46. ![]() [13]Holub V, Fridrich J, Denemark T, 2014. Universal distortion function for steganography in an arbitrary domain. EURASIP J Inform Secur, 2014:1. ![]() [14]Hu DH, Wang L, Jiang WJ, et al., 2018. A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access, 6:38303-38314. ![]() [15]Huang JJ, Cheng SY, Lou SH, et al., 2019. Image steganography using texture features and GANs. Proc Int Joint Conf on Neural Networks, p.1-8. ![]() [16]Isola P, Zhu JY, Zhou TH, et al., 2017. Image-to-image translation with conditional adversarial networks. Proc IEEE Conf on Computer Vision and Pattern Recognition, p.1125-1134. ![]() [17]Jing JP, Deng X, Xu M, et al., 2021. HiNet: deep image hiding by invertible network. Proc IEEE/CVF Int Conf on Computer Vision, p.4733-4742. ![]() [18]Johnson J, Alahi A, Li FF, 2016. Perceptual losses for real-time style transfer and super-resolution. Proc 14th European Conf on Computer Vision, p.694-711. ![]() [19]Kodovsky J, Fridrich J, Holub V, 2012. Ensemble classifiers for steganalysis of digital media. IEEE Trans Inform Forens Secur, 7(2):432-444. ![]() [20]Lai WS, Huang JB, Ahuja N, et al., 2019. Fast and accurate image super-resolution with deep Laplacian pyramid networks. IEEE Trans Patt Anal Mach Intell, 41(11):2599-2613. ![]() [21]Li XL, Yang B, Cheng DF, et al., 2009. A generalization of LSB matching. IEEE Signal Process Lett, 16(2):69-72. ![]() [22]Li ZZ, Yang XY, Shen KQ, et al., 2022. Dual branch parallel steganographic framework based on multi-scale distillation in framelet domain. Neurocomputing, 514:182-194. ![]() [23]Liu LS, Meng LZ, Wang XL, et al., 2022. An image steganography scheme based on ResNet. Multim Tools Appl, 81(27):39803-39820. ![]() [24]Lu SP, Wang R, Zhong T, et al., 2021. Large-capacity image steganography based on invertible neural networks. Proc IEEE/CVF Conf on Computer Vision and Pattern Recognition, p.10816-10825. ![]() [25]Mao XD, Li Q, Xie HR, et al., 2017. Least squares generative adversarial networks. Proc IEEE Int Conf on Computer Vision, p.2794-2802. ![]() [26]Otazu X, Gonzalez-Audicana M, Fors O, et al., 2005. Introduction of sensor spectral response into image fusion methods. IEEE Trans Geosci Remote Sens, 43(10):2376-2385. ![]() [27]Ren S, Gong H, Zheng SY, 2025. Algorithm for 3D point cloud steganalysis based on composite operator feature enhancement. Front Inform Technol Electron Eng, 26(1):62-78. ![]() [28]Ruanaidh JJKO, Dowling WJ, Boland FM, 1996. Phase watermarking of digital images. Proc 3rd IEEE Int Conf on Image Processing, p.239-242. ![]() [29]Shi HC, Dong J, Wang W, et al., 2018. SSGAN: secure steganography based on generative adversarial networks. Proc 18th Pacific Rim Conf on Multimedia, p.534-544. ![]() [30]Shi WZ, Caballero J, Huszár F, et al., 2016. Real-time single image and video super-resolution using an efficient sub-pixel convolutional neural network. Proc IEEE Conf on Computer Vision and Pattern Recognition, p.1874-1883. ![]() [31]Singh B, Sharma PK, Huddedar SA, et al., 2022. StegGAN: hiding image within image using conditional generative adversarial networks. Multim Tools Appl, 81(28):40511-40533. ![]() [32]Tamimi AA, Abdalla AM, Al-Allaf O, 2013. Hiding an image inside another image using variable-rate steganography. Int J Adv Comput Sci Appl, 4(10):18-21. ![]() [33]Tancik M, Mildenhall B, Ng R, 2020. StegaStamp: invisible hyperlinks in physical photographs. Proc IEEE/CVF Conf on Computer Vision and Pattern Recognition, p.2117-2126. ![]() [34]ur Rehman A, Rahim R, Nadeem S, et al., 2018. End-to-end trained CNN encoder-decoder networks for image steganography. Proc Computer Vision-ECCV Workshops, p.723-729. ![]() [35]Van TP, Dinh TH, Thanh TM, 2019. Simultaneous convolutional neural network for highly efficient image steganography. Proc 19th Int Symp on Communications and Information Technologies, p.410-415. ![]() [36]Wengrowski E, Dana K, 2019. Light field messaging with deep photographic steganography. Proc IEEE/CVF Conf on Computer Vision and Pattern Recognition, p.1515-1524. ![]() [37]Wu P, Yang Y, Li XQ, 2018. StegNet: mega image steganography capacity with deep convolutional network. Fut Int, 10(6):54. ![]() [38]Xu GS, Wu HZ, Shi YQ, 2016. Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett, 23(5):708-712. ![]() [39]Xu YM, Mou C, Hu YJ, et al., 2022. Robust invertible image steganography. Proc IEEE/CVF Conf on Computer Vision and Pattern Recognition, p.7875-7884. ![]() [40]Yang H, Xu YT, Liu XH, et al., 2024. PRIS: practical robust invertible network for image steganography. Eng Appl Artif Intell, 133: 108419. ![]() [41]Ye J, Ni JQ, Yi Y, 2017. Deep learning hierarchical representations for image steganalysis. IEEE Trans Inform Forens Secur, 12(11):2545-2557. ![]() [42]Ying QC, Zhou H, Zeng XH, et al., 2022. Hiding images into images with real-world robustness. Proc IEEE Int Conf on Image Processing, p.111-115. ![]() [43]Yu C, 2020. Attention based data hiding with generative adversarial networks. Proc AAAI Conf on Artificial Intelligence, p.1120-1128. ![]() [44]Zamir SW, Arora A, Khan S, et al., 2022. Restormer: efficient transformer for high-resolution image restoration. Proc IEEE/CVF Conf on Computer Vision and Pattern Recognition, p.5728-5739. ![]() [45]Zhang L, Lu Y, Li J, et al., 2023. Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction. Neur Comput Appl, 35(15):10909-10927. ![]() [46]Zhang R, Dong SQ, Liu JY, 2019. Invisible steganography via generative adversarial networks. Multim Tools Appl, 78(7):8559-8575. ![]() [47]Zhang R, Zhu F, Liu JY, et al., 2020. Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis. IEEE Trans Inform Forens Secur, 15:1138-1150. ![]() [48]Zhou DQ, Hou QB, Chen YP, et al., 2020. Rethinking bottleneck structure for efficient mobile network design. Proc 16th European Conf on Computer Vision, p.680-697. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE |
Open peer comments: Debate/Discuss/Question/Opinion
<1>