Journal of Xidian University ›› 2024, Vol. 51 ›› Issue (4): 226-238.doi: 10.19665/j.issn1001-2400.20240303
• Computer Science and Technology & Cyberspace Security • Previous Articles
ZHANG Xiaohong(), XIANG Shijun(), HUANG Hongbin()
Received:
2023-11-16
Online:
2024-08-20
Published:
2024-03-21
Contact:
XIANG Shijun
E-mail:2551748721@qq.com;txiangshijun@jnu.edu.cn;thhb@jnu.edu.cn
CLC Number:
ZHANG Xiaohong, XIANG Shijun, HUANG Hongbin. Hiding images in audio based on invertible neural networks[J].Journal of Xidian University, 2024, 51(4): 226-238.
"
网络结构 | 操作 | 输出尺寸 |
---|---|---|
输入特征 | c_in×32 768 | |
卷积单元1 | Conv1d+PReLU | 32×16 384 |
卷积单元2 | Conv1d+PReLU | 64×8 192 |
卷积单元3 | Conv1d+PReLU | 128×4 096 |
卷积单元4 | Conv1d+PReLU | 256×2 048 |
转置卷积单元1 | deConv1d+PReLU拼接卷积单元3的输出 | 128×4 096 |
转置卷积单元2 | deConv1d+PReLU拼接卷积单元2的输出 | 64×8 192 |
转置卷积单元3 | deConv1d+PReLU拼接卷积单元1的输出 | 32×16 384 |
转置卷积单元4 | deConv1d | c_out×32 768 |
[1] | 韩烨, 关晴骁, 刘年生, 等. 一种基于局部曲率的空域图像隐写失真代价[J]. 西安电子科技大学学报, 2023, 50(4):229-236. |
HAN Ye, GUAN Qingxiao, LIU Niansheng, et al. Distortion Scheme Based on the Local Curvature for Spatial Image Steganography[J]. Journal of Xidian University, 2023, 50(4):229-236. | |
[2] | 范文同, 李震宇, 张涛, 等. 基于隐写噪声深度提取的JPEG图像隐写分析[J]. 西安电子科技大学学报, 2023, 50(4):157-169. |
FAN Wentong, LI Zhenyu, ZHANG Tao, et al. JPEG Image Steganalysis Based on Deep Extraction of Stego Noise[J]. Journal of Xidian University, 2023, 50(4):157-169. | |
[3] | GERA A, VYAS V. Hiding Capacity and Audio Steganography Model Based on LSB in Temporal Domain[J]. Recent Patents on Engineering, 2022, 16(2):65-74. |
[4] | NEMATOLLAHI M A, AL-HADDAD S A R, ZARAFSHAN F. Blind Digital Speech Watermarking Based on Eigen-Value Quantization in DWT[J]. Journal of King Saud University-Computer and Information Sciences, 2015, 27(1):58-67. |
[5] | GEETHAVANI B, PRASAD E V, ROOPA R. A New Approach for Secure Data Transfer in Audio Signals Using DWT[C]//2013 15th International Conference on Advanced Computing Technologies(ICACT).Piscataway:IEEE, 2013: 1-6. |
[6] | BAZIYAD M, SHAHIN I, RABIE T, et al. 64-Bit Quantization:Taking Payload Capacity of Speech Steganography to the Limits[J]. Multimedia Tools and Applications, 2022, 81(28):40561-40579. |
[7] | VARGHESE F, SASIKALA P. Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding[J]. Wireless Personal Communications, 2023, 130(1):551-578. |
[8] | KREUK F, ADI Y, RAJ B, et al. Hide and Speak:Deep Neural Networks for Speech Steganography(2019)[J/OL].[2019-02-07].https://arxiv.org/abs/1902.03083v1. |
[9] | JIANG S, YE D, HUANG J, et al. SmartSteganogaphy:Light-Weight Generative Audio Steganography Model for Smart Embedding Application[J]. Journal of Network and Computer Applications, 2020,165:102689. |
[10] | 岳峰, 朱慧, 苏兆品, 等. 基于BN优化SNGAN的自适应音频隐写[J]. 计算机学报, 2022, 45(2):427-440. |
YUE Feng, ZHU Hui, SU Zhaopin, et al. An Adaptive Audio Steganography Using BN Optimizing SNGAN[J]. Journal of Computers, 2022, 45(2):427-440. | |
[11] | ZHANG R, DONG H, YANG Z, et al. A CNN Based Visual Audio Steganography Model[C]//International Conference on Adaptive and Intelligent Systems. Heidelberg:Springer, 2022:431-442. |
[12] | GELETA M, PUNTI C, MCGUINNESS K, et al. Pixinwav:Residual Steganography for Hiding Pixels in Audio[C]//ICASSP 2022-2022 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).Piscataway:IEEE, 2022: 2485-2489. |
[13] | ASAD M, GILANI J, KHALID A. An Enhanced Least Significant Bit Modification Technique for Audio Steganography[C]//International Conference on Computer Networks and Information Technology. Piscataway:IEEE, 2011:143-147. |
[14] | MISHRA A, JOHRI P, MISHRA A. Audio Steganography Using ASCII Code and GA[C]//2017 International Conference on Infocom Technologies and Unmanned Systems(Trends and Future Directions)(ICTUS).Piscataway:IEEE, 2017:646-651. |
[15] | GANWANI P, GUPTA L, JAIN C, et al. Lsb Based Audio Steganography Using Rsa and Chacha20 Encryption[C]//2021 12th International Conference on Computing Communication and Networking Technologies(ICCCNT).Piscataway:IEEE, 2021: 1-6. |
[16] | MALIK H M A, ANSARI R, KHOKHARA A. Robust Data Hiding in Audio Using Allpass Filters[J]. IEEE Transactions on Audio,Speech,and Language Processing, 2007, 15(4):1296-1304. |
[17] | ERFANI Y, SIAHPOUSH S. Robust Audio Watermarking Using Improved TS Echo Hiding[J]. Digital Signal Processing, 2009, 19(5):809-814. |
[18] | WANG S, YUAN W, UNOKI M. Multi-Subspace Echo Hiding Based on Time-Frequency Similarities of Audio Signals[J]. IEEE/ACM Transactions on Anizhenudio,Speech,and Language Processing, 2020,28:2349-2363. |
[19] | FALLAHPOUR M, MEGíAS D. High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform[C]//Advances in Information Security and Its Application:Third International Conference,ISA 2009.Heidelberg:Springer, 2009:91-97. |
[20] | TAKAHASHI N, SINGH M K, MITSUFUJI Y. Source Mixing and Separation Robust Audio Steganography(2021)[J/OL].[2021-10-11]. https://arxiv.org/abs/2110.05054v1. |
[21] | WU J, CHEN B, LUO W, et al. Audio Steganography Based on Iterative Adversarial Attacks Against Convolutional Neural Networks[J]. IEEE Transactions on Information Forensics and Security, 2020,15:2282-2294. |
[22] | CUI W, LIU S, JIANG F, et al. Multi-Stage Residual Hiding for Image-Into-Audio Steganography[C]//ICASSP 2020-2020 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).Piscataway:IEEE, 2020: 2832-2836. |
[23] | PAUL S, MISHRA D. Hiding Images within Audio Using Deep Generative Model[J]. Multimedia Tools and Applications, 2023, 82(4):5049-5072. |
[24] | XIAO M, ZHENG S, LIU C, et al. Invertible Image Rescaling[C]//Computer Vision-ECCV 2020:16th European Conference.Heidelberg:Springer, 2020:126-144. |
[25] | RONNEBERGER O, FISCHER P, BROX T. U-Net:Convolutional Networks for Biomedical Image Segmentation[C]//Medical Image Computing and Computer-Assisted Intervention-MICCAI 2015:18th International Conference.Heidelberg:Springer, 2015:234-241. |
[26] | 刘婷, 任延珍, 王丽娜. 基于条件可逆网络的生成式图像隐写算法[J]. 信息安全学报, 2023, 8(4):17-30. |
LIU Ting, REN Yanzhen, WANG Lina. Generative Image Steganography via Conditional Invertible Neural Network. Journal of Cyber Security, 2023, 8(4):17-30. | |
[27] | JING J, DENG X, XU M, et al. HiNet:Deep Image Hiding by Invertible Network[C]//Proceedings of the IEEE/CVF International Conference on Computer Vision. Piscataway:IEEE, 2021:4733-4742. |
[28] | LU S P, WANG R, ZHONG T, et al. Large-Capacity Image Steganography Based on Invertible Neural Networks[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE, 2021:10816-10825. |
[29] | LIU Y, QIN Z, ANWAR S, et al. Invertible Denoising Network:A Light Solution for Real Noise Removal[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE, 2021:13365-13374. |
[30] | FANG H, QIU Y, CHEN K, et al. Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions[C]//Proceedings of the AAAI Conference on Artificial Intelligence. Palo Alto: AAAI, 2023:5054-5061. |
[31] | LUO Y, ZHOU T, LIU F, et al. IRWArt:Levering Watermarking Performance for Protecting High-Quality Artwork Images[C]//Proceedings of the ACM Web Conference 2023. New York: ACM, 2023:2340-2348. |
[32] | FONSECA E, PLAKAL M, ELLIS D P W, et al. Learning Sound Event Classifiers from Web Audio with Noisy Labels[C]//ICASSP 2019-2019 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).Piscataway:IEEE, 2019: 21-25. |
[33] | LIN T Y, MAIRE M, BELONGIE S, et al. Microsoft Coco:Common Objects in Context[C]//Computer Vision-ECCV 2014: 13th European Conference.Heidelberg:Springer, 2014:740-755. |
[34] | KINGMA D P, BA J. Adam:A Method for Stochastic Optimization(2014)[J/OL].[2014-12-22]. https://arxiv.org/abs/1412.6980v6. |
[35] | YANG J, ZHENG H, KANG X, et al. Approaching Optimal Embedding in Audio Steganography with GAN[C]//ICASSP 2020-2020 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).Piscataway:IEEE, 2020: 2827-2831. |
[36] | 杨晓元, 唐洪琼, 钮可, 等. 一种基于宏块复杂度的视频隐写算法[J]. 西安电子科技大学学报, 2022, 49(2):164-172. |
YANG Xiaoyuan, TANG Hongqiong, NIU Ke, et al. Video Steganography Based on Macroblock Complexity[J]. Journal of Xidian University, 2022, 49(2):164-172. |
[1] | HAN Ye,GUAN Qingxiao,LIU Niansheng,CHEN Hefeng,ZHANG Weiming,GAO Yan. Distortion scheme based on the local curvature for spatial image steganography [J]. Journal of Xidian University, 2023, 50(4): 229-236. |
[2] | YANG Xiaoyuan,TANG Hongqiong,NIU Ke,ZHANG Yingnan. Video steganography based on macroblock complexity [J]. Journal of Xidian University, 2022, 49(2): 164-172. |
[3] | SI Chengxiang,GAO Feng,ZHU Liehuang,GONG Guopeng,ZHANG Can,CHEN Zhuo,LI Ruiguang. Covert data transmission mechanism based on dynamic label in blockchain [J]. Journal of Xidian University, 2020, 47(5): 94-102. |
[4] | LI Kunlun,ZHANG Lu,XU Hongke,SONG Huansheng. Waveletdomain dilated network for fast low-dose CT image reconstruction [J]. Journal of Xidian University, 2020, 47(4): 86-93. |
[5] | GAO Jiaming;LIANG Yu;ZHANG Wei;LIU Yanyan. Memory efficient architecture for 2-D DWT [J]. Journal of Xidian University, 2018, 45(2): 110-115. |
[6] | JIA Qi;LIANG Yu;ZHANG Wei. Hardware efficient 2-D DWT architecture without off-chip RAM [J]. Journal of Xidian University, 2017, 44(4): 138-143. |
[7] | NIU Ke;LI Jun;LIU Jia;YANG Xiaoyuan. Strategic adaptive steganography based on the game theory model [J]. J4, 2015, 42(4): 165-170. |
[8] | XIA Bingbing;ZHAO Xianfeng;ZHANG Hong. Assorted benchmarking for steganography based on blind steganalyzer accuracy fitting [J]. J4, 2015, 42(4): 153-158. |
[9] | CUI Lingling;LU Zhaoyang;LI Jing;LI Yihong. Novel algorithm for automated detection of fabric defect images [J]. J4, 2011, 38(5): 65-72. |
[10] | SONG Yi-mei;SONG Guo-xiang. Image denoising based on wave atoms and cycle spinning [J]. J4, 2010, 37(2): 300-304. |
[11] | LI Chuan-wei;LI An-zong. Algorithms and application of the wavelet-based signal processing [J]. J4, 2009, 36(4): 751-755. |
[12] | LU Man-jun;ZHAN Yi;SI Xi-cai;YANG Xiao-niu. Extraction of the transient characteristics of the communication radiating source and individual indentification [J]. J4, 2009, 36(4): 736-740. |
[13] | WEN Hao;LU Zhao-yang;GAO Quan-xue. Face recognition algorithm based on wavelet preprocessing and tensor PCA [J]. J4, 2009, 36(4): 602-607. |
[14] |
GUO Jie;WU Cheng-ke;WANG Ke-yan;MA Jing;ZHANG Lei.
Optimized-approximate integer-to-integer wavelet transform and its VLSI architecture of JPEG2000 codec [J]. J4, 2008, 35(2): 210-215. |
[15] |
ZHENG Wen-xiu;ZHAO Guo-qing;LUO Ming.
Symbol rate estimation of orthogonal frequency division multiplexing (OFDM) signals [J]. J4, 2007, 34(6): 859-863. |
|