Abstract
Aiming at the problem that the traditional steganography based on carrier modification has the low steganographic capacity, a steganographic scheme based on Fully Convolutional Dense Connection Network (FC-DenseNet) is proposed. Since FC-DenseNet can effectively overcome the problems of gradient dissipation and gradient explosion, and a large number of features are multiplexed, the cascaded secret image and carrier image can reconstruct good image quality after entering the network. Effectively improve steganographic capacity. First, we reset the number of input channels of the first convolution block of FC-DenseNet and the number of output channels of the last convolution block and deleted the LogSoftmax() function. On the sender side, after the concatenated secret image and carrier image pass through the hidden network FC-DenseNet, the secret image is embedded in the carrier image to obtain a stego-image. At the receiving side, the extraction network reconstructs the secret image from the stego-image. Experimental results show that our proposed steganography scheme not only has a high Peak Signal-to-Noise Ratio(PSNR) and Structural Similarity(SSIM) but also can realize large-capacity image steganography, with an average image payload capacity of 23.96 bit per pixel.
Highlights
Cyberspace security has always attracted people’s attention
Our goal is to minimize the loss between stego-image and carrier image: τ = c−c
Software environment required for the experiment: deep learning framework Pytorch1.1.0, programming experiment with python3.6
Summary
Cyberspace security has always attracted people’s attention. While the number of global netizens continues to grow, network security is in a cycle of decreasing and increasing. How to effectively ensure that information is not intercepted by attackers in the process of Internet communication is crucial [1]. Personal privacy leakage is an important issue today. The photographed electronic ID cards and bank cards were stolen by criminals and used for illegal purposes. It endangers people’s property safety, and violates personal privacy
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.