期刊文献+

基于深度卷积生成对抗网络的半生成式视频隐写方案 被引量:1

Semi-generative video steganography scheme based on deep convolutional generative adversarial net
在线阅读 下载PDF
导出
摘要 生成式隐写通过生成足够自然或真实的含密样本来隐藏秘密消息,是信息隐藏方向的研究热点,但目前在视频隐写领域的研究还比较少。结合数字化卡登格的思想,提出一种基于深度卷积生成对抗网络(DCGAN)的半生成式视频隐写方案。该方案中,设计了基于DCGAN的双流视频生成网络,用来生成视频的动态前景、静态后景与时空掩模三个部分,并以随机噪声驱动生成不同的视频。方案中的发送方可设定隐写阈值,在掩模中自适应地生成数字化卡登格,并将其作为隐写与提取的密钥;同时以前景作为载体,实现信息的最优嵌入。实验结果表明,该方案生成的含密视频具有良好的视觉质量,Frechet Inception距离(FID)值为90,且嵌入容量优于现有的生成式隐写方案,最高可达0.11 bpp,能够更高效地传输秘密消息。 Generative steganography hides secret messages by generating sufficiently natural or true samples with secret,which is a hot research topic in information hiding, but there is little research in the field of video steganography. Combined with the idea of digital Cardan grille, a semi-generative video steganography scheme based on Deep Convolutional Generative Adversarial Net(DCGAN) was proposed. In this scheme, a dual-stream video generation network based on DCGAN was designed to generate three parts of videos: dynamic foreground, static background and spatio-temporal mask, and different videos were produced by the generation network driven by random noise. The sender in this scheme was able to set the steganography threshold and adaptively generate a digital Cardan grille in the mask, then the obtain digital cardan grille was used as the key for steganography and extraction;at same time, with the foreground as the carrier, the optimal embedding of information was realized. Experimental results show that the video-with-secret generated by the proposed scheme has good visual quality, with a Frechet Inception Distance score(FID) of 90, and the embedding capacity of the scheme is better than those of the existing generative steganography schemes, up to 0. 11 bpp. It can be seen that the proposed scheme can transmit secret messages more efficiently.
作者 林洋平 刘佳 陈培 张明书 杨晓元 LIN Yangping;LIU Jia;CHEN Pei;ZHANG Mingshu;YANG Xiaoyuan(College of Cryptography Engineering,Engineering University of PAP,Xi’an Shaanxi 710086,China;Key Laboratory of Network and Information Security of PAP(Engineering University of PAP),Xi’an Shaanxi 710086,China)
出处 《计算机应用》 CSCD 北大核心 2023年第1期169-175,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61872384) 武警工程大学科研创新基金资助项目(KYGG201904)。
关键词 视频隐写 半生成式 深度学习 深度卷积生成对抗网络 对抗性训练 数字化卡登格 video steganography semi-generative deep learning Deep Convolutional Generative Adversarial Net(DCGAN) adversarial training Digital Cardan Grille(DCG)
  • 相关文献

参考文献9

二级参考文献39

  • 1谢建全,谢勍,黄大足.抗隐写密钥分析的LSB隐写算法[J].微型电脑应用,2010(5):14-15. 被引量:2
  • 2Cole E,Krutz R D.Hiding in plain sight:Steganography and the art of covert communication[M].John Wiley&Sons,Inc.,2003.
  • 3Balaji R,Naveen G.Secure data transmission using video Steganography[C]//Electro/Information Technology(EIT),2011 IEEE International Conference on.IEEE,2011:1-5.
  • 4Djebbar F,Ayad B,Hamam H,et al.A view on latest audio steganography techniques[C]//Innovations in Information Technology(IIT),2011 International Conference on.IEEE,2011:409-414.
  • 5Adhiya K P,Patil S A.Hiding Text in Audio Using LSB Based Steganography[J].Information and Knowledge Management.2012,2(3):8-14.
  • 6Ashwini Mane,Gajanan Galshetwar,Amutha Jeyakumar.DATA HIDING TECHNIQUE:AUDIO STEGANOGRAPHYUSING LSB TECHNIQUE[J].International Journal of Engineering Research and Applications(IJERA),2012,2(3):1123-1125.
  • 7Jayaram P,Ranganatha H R,Anupama H S.Information Hiding Using Audio Steganography–A Survey[J].The International Journal of Multimedia&Its Applications(IJMA),2011,3:86-96.
  • 8Kekre H B,Athawale A,Halarnkar P N.Increased Capacity of Information Hiding in LSBs Method for Text and Image[J].International Journal of Electrical,Computer and Systems Engineering,2008,2(4):246-249.
  • 9Chaudhary A,Vasavada J,Raheja J L,et al.A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images[C]//The22nd International Conference on Computer Graphics and Vision,2012:80-83.
  • 10Lou D C,Hu C H.LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis[J].Information Sciences,2012,188:346-358.

共引文献204

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部