• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

寻找与隐藏:通过深度强化学习实现对抗性隐写术

Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.

作者信息

Pan Wenwen, Yin Yanling, Wang Xinchao, Jing Yongcheng, Song Mingli

出版信息

IEEE Trans Pattern Anal Mach Intell. 2022 Nov;44(11):7871-7884. doi: 10.1109/TPAMI.2021.3114555. Epub 2022 Oct 4.

DOI:10.1109/TPAMI.2021.3114555
PMID:34550880
Abstract

The goal of image steganography is to hide a full-sized image, termed secret, into another, termed cover. Prior image steganography algorithms can conceal only one secret within one cover. In this paper, we propose an adaptive local image steganography (AdaSteg) system that allows for scale- and location-adaptive image steganography. By adaptively hiding the secret on a local scale, the proposed system makes the steganography more secured, and further enables multi-secret steganography within one single cover. Specifically, this is achieved via two stages, namely the adaptive patch selection stage and secret encryption stage. Given a pair of secret and cover, first, the optimal local patch for concealment is determined adaptively by exploiting deep reinforcement learning with the proposed steganography quality function and policy network. The secret image is then converted into a patch of encrypted noises, resembling the process of generating adversarial examples, which are further encoded to a local region of the cover to realize a more secured steganography. Furthermore, we propose a novel criterion for the assessment of local steganography, and also collect a challenging dataset that is specialized for the task of image steganography, thus contributing to a standardized benchmark for the area. Experimental results demonstrate that the proposed model yields results superior to the state of the art in both security and capacity.

摘要

图像隐写术的目标是将一幅全尺寸图像(称为秘密图像)隐藏到另一幅图像(称为载体图像)中。先前的图像隐写术算法只能在一个载体图像中隐藏一个秘密。在本文中,我们提出了一种自适应局部图像隐写术(AdaSteg)系统,该系统允许进行尺度和位置自适应的图像隐写。通过在局部尺度上自适应地隐藏秘密,所提出的系统使隐写更加安全,并进一步实现了在单个载体图像中的多秘密隐写。具体而言,这通过两个阶段实现,即自适应补丁选择阶段和秘密加密阶段。对于一对秘密图像和载体图像,首先,通过利用深度强化学习以及所提出的隐写质量函数和策略网络,自适应地确定用于隐藏的最佳局部补丁。然后,秘密图像被转换为加密噪声补丁,类似于生成对抗样本的过程,这些加密噪声补丁被进一步编码到载体图像的局部区域以实现更安全的隐写。此外,我们提出了一种用于评估局部隐写术的新准则,并收集了一个专门用于图像隐写任务的具有挑战性的数据集,从而为该领域建立了一个标准化的基准。实验结果表明,所提出的模型在安全性和容量方面均产生了优于现有技术的结果。

相似文献

1
Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning.寻找与隐藏:通过深度强化学习实现对抗性隐写术
IEEE Trans Pattern Anal Mach Intell. 2022 Nov;44(11):7871-7884. doi: 10.1109/TPAMI.2021.3114555. Epub 2022 Oct 4.
2
Deep Image Steganography Using Transformer and Recursive Permutation.基于Transformer和递归排列的深度图像隐写术
Entropy (Basel). 2022 Jun 26;24(7):878. doi: 10.3390/e24070878.
3
High-Capacity Image Steganography Based on Improved Xception.基于改进型 Xception 的大容量图像隐写术。
Sensors (Basel). 2020 Dec 17;20(24):7253. doi: 10.3390/s20247253.
4
SABMIS: sparse approximation based blind multi-image steganography scheme.SABMIS:基于稀疏逼近的盲多图像隐写术方案。
PeerJ Comput Sci. 2022 Nov 28;8:e1080. doi: 10.7717/peerj-cs.1080. eCollection 2022.
5
Comparative performance assessment of deep learning based image steganography techniques.深度学习的图像隐写术技术的比较性能评估。
Sci Rep. 2022 Oct 7;12(1):16895. doi: 10.1038/s41598-022-17362-1.
6
Steganography-based voice hiding in medical images of COVID-19 patients.基于隐写术的新冠患者医学图像语音隐藏
Nonlinear Dyn. 2021;105(3):2677-2692. doi: 10.1007/s11071-021-06700-z. Epub 2021 Jul 22.
7
New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity.一种使用多通道和多层次的新型深度数据隐藏与提取算法,以提高数据安全性和有效载荷容量。
PeerJ Comput Sci. 2022 Oct 19;8:e1115. doi: 10.7717/peerj-cs.1115. eCollection 2022.
8
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices.一种用于在安卓物联网设备的高效视频编码(HEVC)流中隐藏勒索软件的加密隐写术方法。
Sensors (Basel). 2022 Mar 16;22(6):2281. doi: 10.3390/s22062281.
9
Random Matrix Transformation and Its Application in Image Hiding.随机矩阵变换及其在图像隐藏中的应用。
Sensors (Basel). 2023 Jan 16;23(2):1017. doi: 10.3390/s23021017.
10
Adversarial feature hybrid framework for steganography with shifted window local loss.基于偏移窗口局部损失的对抗特征混合框架的隐写术。
Neural Netw. 2023 Aug;165:358-369. doi: 10.1016/j.neunet.2023.05.053. Epub 2023 Jun 3.

引用本文的文献

1
AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography.AGASI:一种基于生成对抗网络的增强对抗性图像隐写术的方法。
Entropy (Basel). 2025 Mar 9;27(3):282. doi: 10.3390/e27030282.