| 349 | 1 | 123 |
| Downloads | Citas | Reads |
To address the poor imperceptibility, insufficient security, and low steganographic capacity in image steganography, a novel dual-domain fusion image steganography scheme based on improved ConvNeXt Block was proposed. Firstly, the improved depth separable convolution module could learn more detailed image feature information. Secondly, a novel spatial and frequency domain information fusion way was designed to improve image imperceptibility and security. Finally, multiple loss functions were employed to constrain the network in a cascaded manner. Experimental results showed that the proposed scheme achieved an average increase of 3-4 dB in peak signal-to-noise ratio compared to other steganography schemes, and the average structural similarity and learned perceptual image patch similarity were 0.99 and 0.001, respectively. The resistance to steganalysis was closer to 50%, indicating higher security. Even with high-capacity hiding, good results were still maintained.
[1] BALUJA S.Hiding images in plain sight:deep steganography [C]//Proceedings of the 31st International Conference on Neural Information Processing Systems.Cambridge:MIT Press,2017:2066-2076.
[2] ZHU X S,LAI Z L,LIANG Y R,et al.Generative high-capacity image hiding based on residual CNN in wavelet domain[J].Applied soft computing,2022,115:108170.
[3] JING J P,DENG X,XU M,et al.HiNet:deep image hiding by invertible network[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.Piscataway:IEEE Press,2021:4713-4722.
[4] GUAN Z Y,JING J P,DENG X,et al.DeepMIH:deep invertible network for multiple image hiding[J].IEEE transactions on pattern analysis and machine intelligence,2023,45(1):372-390.
[5] LIU Z,MAO H Z,WU C Y,et al.A ConvNet for the 2020s[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE Press,2022:11966-11976.
[6] DUAN X T,NAO L,GOU M X,et al.High-capacity image steganography based on improved FC-DenseNet[J].IEEE access,2020,8:170174-170182.
[7] ZHANG C N,BENZ P,KARJAUV A,et al.UDH:universal deep hiding for steganography,watermarking,and light field messaging[C]//Proceedings of the 34th International Conference on Neural Information Processing Systems.Cambridge:MIT Press,2020:10223-10234.
[8] TAN J X,LIAO X,LIU J T,et al.Channel attention image steganography with generative adversarial networks[J].IEEE transactions on network science and engineering,2022,9(2):888-903.
[9] LI Q,WANG X Y,WANG X Y,et al.A novel grayscale image steganography scheme based on chaos encryption and generative adversarial networks[J].IEEE access,2020,8:168166-168176.
[10] SHANG Y Y,JIANG S Z,YE D P,et al.Enhancing the security of deep learning steganography via adversarial examples[J].Mathematics,2020,8(9):1446.
[11] WANG Z Y,ZHOU M C,LIU B J,et al.Deep image steganography using transformer and recursive permutation[J].Entropy,2022,24(7):878.
[12] LI G F,FENG B W,HE M J,et al.High-capacity coverless image steganographic scheme based on image synthesis[J].Signal processing:image communication,2023,111:116894.
[13] SHANG F,LAN Y H,YANG J H,et al.Robust data hiding for JPEG images with invertible neural network[J].Neural networks,2023,163:219-232.
[14] LIU L S,MENG L Z,PENG Y J,et al.A data hiding scheme based on U-Net and wavelet transform[J].Knowledge-based systems,2021,223:107022.
[15] MALLAT S G.A theory for multiresolution signal decomposition:the wavelet representation[J].IEEE transactions on pattern analysis and machine intelligence,1989,11(7):674-693.
[16] VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[C]//Proceedings of the 31st International Conference on Neural Information Processing Systems.Cambridge:MIT Press,2017:6000-6010.
[17] LIU Z,LIN Y T,CAO Y,et al.Swin Transformer:hierarchical vision Transformer using shifted windows[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.Piscataway:IEEE Press,2021:9992-10002.
[18] WANG Z,BOVIK A C,SHEIKH H R,et al.Image quality assessment:from error visibility to structural similarity[J].IEEE transactions on image processing,2004,13(4):600-612.
[19] ZHANG R,ISOLA P,EFROS A A,et al.The unreasonable effectiveness of deep features as a perceptual metric[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE Press,2018:586-595.
[20] REHMAN A,RAHIM R,NADEEM M,et al.End-to-end trained CNN encoder-decoder networks for image steganography[C]//Proceedings of the European Conference on Computer Vision.Cham:Springer International Publishing,2018:723-729.
[21] DUAN X T,WANG W X,LIU N,et al.StegoPNet:image steganography with generalization ability based on pyramid pooling module[J].IEEE access,2020,8:195253-195262.
[22] BALUJA S.Hiding images within images[J].IEEE transactions on pattern analysis and machine intelligence,2020,42(7):1685-1697.
[23] LU S P,WANG R,ZHONG T,et al.Large-capacity image steganography based on invertible neural networks[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.Piscataway:IEEE Press,2021:10811-10820.
[24] BOEHM B.StegExpose:a tool for detecting LSB steganography[EB/OL].(2014-10-24) [2024-05-15].https://doi.org/10.48550/arXiv.1410.6656.
[25] XU G S,WU H Z,SHI Y Q.Structural design of convolutional neural networks for steganalysis[J].IEEE signal processing letters,2016,23(5):708-712.
[26] YE J,NI J Q,YI Y.Deep learning hierarchical representations for image steganalysis[J].IEEE transactions on information forensics and security,2017,12(11):2545-2557.
Basic Information:
DOI:10.13705/j.issn.1671-6841.2024123
China Classification Code:TP309.7;TP18
Citation Information:
[1]DUAN Xintao,XU Kaiou,BAI Luwei ,et al.A Novel Dual-domain Fusion Image Steganography Based on Improved ConvNeXt Block[J].Journal of Zhengzhou University(Natural Science Edition),2026,58(01):1-9.DOI:10.13705/j.issn.1671-6841.2024123.
Fund Information:
河南省高等学校重点科研项目(23A520006); 河南省科技攻关计划项目(222102210199)