Abstract

Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model. The sender trains the WGAN-GP with a natural image and a secret image. The generated image and secret image are visually identical, and the parameters of generator are saved to form the codebook. The sender uploads the natural image (disguise image) to the cloud disk. The receiver downloads the camouflage image from the cloud disk and obtains the corresponding generator parameter in the codebook and inputs it to the generator. The generator outputs the same image for the secret image, which realized the same results as sending the secret image. The experimental results indicate that the scheme produces high image quality and good security.

Highlights

  • Network communication and information technology have developed rapidly in the era of increasing net-workization

  • This paper proposed the coverless information hiding based on the improved training of Wasserstein Generative Adversarial Network (GAN) (WGAN-GP) model

  • The sender trains the WGAN-GP with a natural image and a secret image

Read more

Summary

INTRODUCTION

Network communication and information technology have developed rapidly in the era of increasing net-workization. Encryption technology of image is to ensure the security of images, which uses digital image matrix features to change pixels according to the transformation rules of images in space or transform domain to achieve encrypted values (Liu et al, 2013; Wang et al, 2005; Samidha & Agrawal, 2013; Hemalatha et al, 2013) It will cause image distortion and make the image into a form of noise or texture, which may cause suspicion of the attacker and increase the possibility of information leakage, loss and tampering (Dang & Chau, 2000). The receiver downloads the disguise image, obtains the corresponding parameters of generator from the codebook, and sends them to the generator to generate an image The method doesn’t modify the secret image, which enhances the security of communication

RELATED WORKS
PROPOSED METHOD
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call