期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Steganography Model Data Protection Method Based on Scrambling Encryption 被引量:1
1
作者 Xintao Duan Zhiqiang Shao +4 位作者 Wenxin Wang En Zhang Dongli Yue Chuan Qin haewoon nam 《Computers, Materials & Continua》 SCIE EI 2022年第9期5363-5375,共13页
At present,the image steganography method based on CNN has achieved good results.The trained model and its parameters are of great value.Once leaked,the secret image will be exposed.To protect the security of steganog... At present,the image steganography method based on CNN has achieved good results.The trained model and its parameters are of great value.Once leaked,the secret image will be exposed.To protect the security of steganographic network model parameters in the transmission process,an idea based on network model parameter scrambling is proposed in this paper.Firstly,the sender trains the steganography network and extraction network,encrypts the extraction network parameters with the key shared by the sender and the receiver,then sends the extraction network and parameters to the receiver through the public channel,and the receiver recovers them with the key after receiving,to achieve more secure secret communication.In this way,even if the network parameters are intercepted by a third party in the transmission process,the interceptor cannot extract the real secret information.In this paper,the classical Joseph algorithm is used as the scrambling algorithm to scramble the extracted network model parameters of the StegoPNet steganography network.The experimental results show that when the scrambled parameters are used for secret image extraction,a meaningless image independent of the secret image is extracted,it shows that this method can well protect the security of steganography network model.At the same time,this method also has good scalability,and can use a variety of different scrambling algorithms to scramble the parameters. 展开更多
关键词 Information hiding STEGANOGRAPHY DCNN joseph scrambling
在线阅读 下载PDF
SCFformer:a binary data hiding method against JPEG compression based on spatial channel fusion Transformer
2
作者 Xintao DUAN Chun LI +3 位作者 Bingxin WEI Guoming WU Chuan QIN haewoon nam 《Frontiers of Information Technology & Electronic Engineering》 2025年第5期728-741,共14页
To enhance information security during transmission over public channels,images are frequently employed for binary data hiding.Nonetheless,data are vulnerable to distortion due to Joint Photographic Experts Group(JPEG... To enhance information security during transmission over public channels,images are frequently employed for binary data hiding.Nonetheless,data are vulnerable to distortion due to Joint Photographic Experts Group(JPEG)compression,leading to challenges in recovering the original binary data.Addressing this issue,this paper introduces a pioneering method for binary data hiding that leverages a combined spatial and channel attention Transformer,termed SCFformer,to withstand JPEG compression.This method employs a novel discrete cosine transform(DCT)quantization truncation mechanism during the hiding phase to bolster the stego image’s resistance to JPEG compression,using spatial and channel attention to conceal information in less perceptible areas,thereby enhancing the model’s resistance to steganalysis.In the extraction phase,the DCT quantization minimizes secret image loss during compression,facilitating easier information retrieval.The incorporation of scalable modules adds flexibility,allowing for variable-capacity data hiding.Experimental findings validate the high security,large capacity,and high flexibility of our scheme,alongside a marked improvement in binary data recovery post-JPEG compression,underscoring our method’s leading-edge performance. 展开更多
关键词 Binary data hiding Against JPEG compression Discrete cosine transform quantization SCFformer
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部