Individualized image steganography method with Dynamic Separable Key and Adaptive Redundancy Anchor

IF 7.2 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Knowledge-Based Systems Pub Date : 2024-11-20 DOI:10.1016/j.knosys.2024.112729
Junchao Zhou, Yao Lu, Guangming Lu
{"title":"Individualized image steganography method with Dynamic Separable Key and Adaptive Redundancy Anchor","authors":"Junchao Zhou,&nbsp;Yao Lu,&nbsp;Guangming Lu","doi":"10.1016/j.knosys.2024.112729","DOIUrl":null,"url":null,"abstract":"<div><div>Image steganography hides several secret images into a single cover image to produce a stego image. For transmission security, the stego image is visually indistinguishable from the cover image. Furthermore, for effective transmission of secret information, the receivers should recover the secret images with high quality. With the increasing steganography capacity, a stego image containing many secret images is transmitted through public channels. However, in the existing image steganography methods, all the secret images are usually revealed without quarantine among various recipients. This problem casts a threat to security in the recovery process. In order to overcome this issue, we propose the Individualized Image Steganography (<strong>IIS</strong>) Method with Dynamic Separable Key (DSK) and Adaptive Redundancy Anchor (ARA). Specifically, in the process of hiding secret images, the proposed DSK dynamically generates a global key and a local key and appropriately fuses them together. In the same batch of transmission, all recipients share the same global key, but each has a different local key. Only by matching both the global key and the local key simultaneously, can the secret image be restored by the specific receiver, which makes the secret image individualized for the target recipient. Additionally, in the process of revealing secret images, the proposed ARA learns the adaptive redundancy anchor for the inverse training to drive the input redundancy of revealing (backward) process and output redundancy of hiding (forward) process to be close. This achieves a better trade-off between the performances of hiding and revealing processes, and further enhances both the quality of restored secret images and stego images. Jointly using the DSK and ARA, a series of experiments have verified that our <strong>IIS</strong> method has achieved satisfactory performance improvements in extensive aspects. Code is available in <span><span>https://github.com/Revive624/Individualized-Invertible-Steganography</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49939,"journal":{"name":"Knowledge-Based Systems","volume":"309 ","pages":"Article 112729"},"PeriodicalIF":7.2000,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Knowledge-Based Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0950705124013637","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

Image steganography hides several secret images into a single cover image to produce a stego image. For transmission security, the stego image is visually indistinguishable from the cover image. Furthermore, for effective transmission of secret information, the receivers should recover the secret images with high quality. With the increasing steganography capacity, a stego image containing many secret images is transmitted through public channels. However, in the existing image steganography methods, all the secret images are usually revealed without quarantine among various recipients. This problem casts a threat to security in the recovery process. In order to overcome this issue, we propose the Individualized Image Steganography (IIS) Method with Dynamic Separable Key (DSK) and Adaptive Redundancy Anchor (ARA). Specifically, in the process of hiding secret images, the proposed DSK dynamically generates a global key and a local key and appropriately fuses them together. In the same batch of transmission, all recipients share the same global key, but each has a different local key. Only by matching both the global key and the local key simultaneously, can the secret image be restored by the specific receiver, which makes the secret image individualized for the target recipient. Additionally, in the process of revealing secret images, the proposed ARA learns the adaptive redundancy anchor for the inverse training to drive the input redundancy of revealing (backward) process and output redundancy of hiding (forward) process to be close. This achieves a better trade-off between the performances of hiding and revealing processes, and further enhances both the quality of restored secret images and stego images. Jointly using the DSK and ARA, a series of experiments have verified that our IIS method has achieved satisfactory performance improvements in extensive aspects. Code is available in https://github.com/Revive624/Individualized-Invertible-Steganography.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
求助全文
约1分钟内获得全文 去求助
来源期刊
Knowledge-Based Systems
Knowledge-Based Systems 工程技术-计算机:人工智能
CiteScore
14.80
自引率
12.50%
发文量
1245
审稿时长
7.8 months
期刊介绍: Knowledge-Based Systems, an international and interdisciplinary journal in artificial intelligence, publishes original, innovative, and creative research results in the field. It focuses on knowledge-based and other artificial intelligence techniques-based systems. The journal aims to support human prediction and decision-making through data science and computation techniques, provide a balanced coverage of theory and practical study, and encourage the development and implementation of knowledge-based intelligence models, methods, systems, and software tools. Applications in business, government, education, engineering, and healthcare are emphasized.
期刊最新文献
Progressive de-preference task-specific processing for generalizable person re-identification GKA-GPT: Graphical knowledge aggregation for multiturn dialog generation A novel spatio-temporal feature interleaved contrast learning neural network from a robustness perspective PSNet: A non-uniform illumination correction method for underwater images based pseudo-siamese network A novel domain-private-suppress meta-recognition network based universal domain generalization for machinery fault diagnosis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1