Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction.Deep learning has extremely powerful in extracting features,and watermarking algorithms based on deep learnin...Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction.Deep learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attracted widespread attention.Most existing methods use 3×3 small kernel convolution to extract image features and embed the watermarking.However,the effective perception fields for small kernel convolution are extremely confined,so the pixels that each watermarking can affect are restricted,thus limiting the performance of the watermarking.To address these problems,we propose a watermarking network based on large kernel convolution and adaptive weight assignment for loss functions.It uses large-kernel depth-wise convolution to extract features for learning large-scale image information and subsequently projects the watermarking into a highdimensional space by 1×1 convolution to achieve adaptability in the channel dimension.Subsequently,the modification of the embedded watermarking on the cover image is extended to more pixels.Because the magnitude and convergence rates of each loss function are different,an adaptive loss weight assignment strategy is proposed to make theweights participate in the network training together and adjust theweight dynamically.Further,a high-frequency wavelet loss is proposed,by which the watermarking is restricted to only the low-frequency wavelet sub-bands,thereby enhancing the robustness of watermarking against image compression.The experimental results show that the peak signal-to-noise ratio(PSNR)of the encoded image reaches 40.12,the structural similarity(SSIM)reaches 0.9721,and the watermarking has good robustness against various types of noise.展开更多
The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in bloc...The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency.展开更多
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret ...The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret message should not be damaged on the process of the cover media.In order to ensure the invisibility of secret message,complex texture objects should be chosen for embedding information.In this paper,an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message.Firstly,complex texture regions are selected based on a kind of objects detection algorithm.Secondly,three different steganographic methods were used to hide secret message into the selected block region.Experimental results show that the approach enhances the security and robustness.展开更多
At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity ...At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust.展开更多
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro...Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and arousing suspicion.We take advantage of the complexity of the object texture and consider that under certain circumstances,the object texture is more complex than the background of the image,so the foreground object is more suitable for steganography than the background.On the basis of instance segmentation,such as Mask R-CNN,the proposed method hides secret information into each object's region by using the masks of instance segmentation,thus realizing the information hiding of the foreground object without background.This method not only makes it more efficient for the receiver to extract information,but also proves to be more secure and robust by experiments.展开更多
With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hi...With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algorithms has been developed.Image information hiding is to make use of the redundancy of the cover image to hide secret information in it.Ensuring that the stego image cannot be distinguished from the cover image,and sending secret information to receiver through the transmission of the stego image.At present,the model based on deep learning is also widely applied to the field of information hiding.This paper makes an overall conclusion on image information hiding based on deep learning.It is divided into four parts of steganography algorithms,watermarking embedding algorithms,coverless information hiding algorithms and steganalysis algorithms based on deep learning.From these four aspects,the state-of-the-art information hiding technologies based on deep learning are illustrated and analyzed.展开更多
基金supported,in part,by the National Nature Science Foundation of China under grant numbers 62272236in part,by the Natural Science Foundation of Jiangsu Province under grant numbers BK20201136,BK20191401in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)fund.
文摘Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction.Deep learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attracted widespread attention.Most existing methods use 3×3 small kernel convolution to extract image features and embed the watermarking.However,the effective perception fields for small kernel convolution are extremely confined,so the pixels that each watermarking can affect are restricted,thus limiting the performance of the watermarking.To address these problems,we propose a watermarking network based on large kernel convolution and adaptive weight assignment for loss functions.It uses large-kernel depth-wise convolution to extract features for learning large-scale image information and subsequently projects the watermarking into a highdimensional space by 1×1 convolution to achieve adaptability in the channel dimension.Subsequently,the modification of the embedded watermarking on the cover image is extended to more pixels.Because the magnitude and convergence rates of each loss function are different,an adaptive loss weight assignment strategy is proposed to make theweights participate in the network training together and adjust theweight dynamically.Further,a high-frequency wavelet loss is proposed,by which the watermarking is restricted to only the low-frequency wavelet sub-bands,thereby enhancing the robustness of watermarking against image compression.The experimental results show that the peak signal-to-noise ratio(PSNR)of the encoded image reaches 40.12,the structural similarity(SSIM)reaches 0.9721,and the watermarking has good robustness against various types of noise.
基金This work was supported,in part,by the National Nature Science Foundation of China under grant numbers 62272236in part,by the Natural Science Foundation of Jiangsu Province under grant numbers BK20201136,BK20191401in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund。
文摘The data in the blockchain cannot be tampered with and the users are anonymous,which enables the blockchain to be a natural carrier for covert communication.However,the existing methods of covert communication in blockchain suffer from the predefined channel structure,the capacity of a single transaction is not high,and the fixed transaction behaviors will lower the concealment of the communication channel.Therefore,this paper proposes a derivation matrix-based covert communication method in blockchain.It uses dual-key to derive two types of blockchain addresses and then constructs an address matrix by dividing addresses into multiple layers to make full use of the redundancy of addresses.Subsequently,to solve the problem of the lack of concealment caused by the fixed transaction behaviors,divide the rectangular matrix into square blocks with overlapping regions and then encrypt different blocks sequentially to make the transaction behaviors of the channel addresses match better with those of the real addresses.Further,the linear congruence algorithm is used to generate random sequence,which provides a random order for blocks encryption,and thus enhances the security of the encryption algorithm.Experimental results show that this method can effectively reduce the abnormal transaction behaviors of addresses while ensuring the channel transmission efficiency.
基金This work is supported,in part,by the National Natural Science Foundation of China under grant numbers U1536206,U1405254,61772283,61602253,61672294,61502242in part,by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530+1 种基金in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundin part,by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.
文摘The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover media.The secret message should not be damaged on the process of the cover media.In order to ensure the invisibility of secret message,complex texture objects should be chosen for embedding information.In this paper,an approach which corresponds multiple steganographic algorithms to complex texture objects was presented for hiding secret message.Firstly,complex texture regions are selected based on a kind of objects detection algorithm.Secondly,three different steganographic methods were used to hide secret message into the selected block region.Experimental results show that the approach enhances the security and robustness.
基金the National Key R&D Program of China under grant 2018YFB1003205by the National Natural Science Foundation of China under grant U1836208,U1536206,U1836110,61602253,61672294+2 种基金by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20181407by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundby the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.
文摘At present,the coverless information hiding has been developed.However,due to the limited mapping relationship between secret information and feature selection,it is challenging to further enhance the hiding capacity of coverless information hiding.At the same time,the steganography algorithm based on object detection only hides secret information in foreground objects,which contribute to the steganography capacity is reduced.Since object recognition contains multiple objects and location,secret information can be mapped to object categories,the relationship of location and so on.Therefore,this paper proposes a new steganography algorithm based on object detection and relationship mapping,which integrates coverless information hiding and steganography.In this method,the coverless information hiding is realized by mapping the object type,color and secret information in object detection method.At the same time,the object detection method is used to find the safe area to hide secret messages.The proposed algorithm can not only improve the steganographic capacity of the two information hiding methods but also make the coverless information hiding more secure and robust.
基金This work is supported by the National Key R&D Program of China under grant 2018YFB1003205by the National Natural Science Foundation of China under grant U1836208,U1536206,U1836110,61602253,61672294+2 种基金by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20181407by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundby the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China.
文摘Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and arousing suspicion.We take advantage of the complexity of the object texture and consider that under certain circumstances,the object texture is more complex than the background of the image,so the foreground object is more suitable for steganography than the background.On the basis of instance segmentation,such as Mask R-CNN,the proposed method hides secret information into each object's region by using the masks of instance segmentation,thus realizing the information hiding of the foreground object without background.This method not only makes it more efficient for the receiver to extract information,but also proves to be more secure and robust by experiments.
基金This work is supported by the National Key R&D Program of China under grant 2018YFB1003205by the National Natural Science Foundation of China under grant U1836208,U1536206,U1836110,61602253,61672294+2 种基金by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20181407by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAP-D)fundby the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fund,China。
文摘With the development of data science and technology,information security has been further concerned.In order to solve privacy problems such as personal privacy being peeped and copyright being infringed,information hiding algorithms has been developed.Image information hiding is to make use of the redundancy of the cover image to hide secret information in it.Ensuring that the stego image cannot be distinguished from the cover image,and sending secret information to receiver through the transmission of the stego image.At present,the model based on deep learning is also widely applied to the field of information hiding.This paper makes an overall conclusion on image information hiding based on deep learning.It is divided into four parts of steganography algorithms,watermarking embedding algorithms,coverless information hiding algorithms and steganalysis algorithms based on deep learning.From these four aspects,the state-of-the-art information hiding technologies based on deep learning are illustrated and analyzed.