Loading [a11y]/accessibility-menu.js
Steganography in Style Transfer | IEEE Journals & Magazine | IEEE Xplore
Impact Statement:Steganography has been widely applied in digital images, aiming to achieve covert communication by minimizing steganographic distortion functions to determine the modifie...Show More

Abstract:

Steganography entails concealing secret data within a given medium for covert communication. In recent years, style-transferred images have been widely disseminated on so...Show More
Impact Statement:
Steganography has been widely applied in digital images, aiming to achieve covert communication by minimizing steganographic distortion functions to determine the modified pixel locations. However, most steganographic algorithms are designed for unprocessed images, which are easily detectable when applied to processed images. In contrast to modifying pixel values to embed data, this article proposes a method for embedding data during the image style transfer process, utilizing artificial intelligence for embedding and extracting data. Experimental results demonstrate that our method is more effective and secure compared to existing steganographic algorithms that achieve data embedding by modifying image content. This article provides researchers with a new method for implementing steganography using artificial intelligence.

Abstract:

Steganography entails concealing secret data within a given medium for covert communication. In recent years, style-transferred images have been widely disseminated on social media, offering a novel multimedia carrier for steganography. However, there is currently a lack of steganographic techniques specifically designed for style-transferred images. In this article, we propose disguising the steganographic tool as a deep neural network (DNN) performing style transfer tasks. In our method, a neural network is manipulated to transfer the style of a given image to a target style, while also embedding secret data into the given image. Meanwhile, a trained receiving network is used to extract the embedded data. The same pretrained network used by the processing network and the receiving network matches the feature maps of secret data at the same layers. Under the guidance of secret data, a stego image is generated after being trained by the processing network and the receiving network an a...
Published in: IEEE Transactions on Artificial Intelligence ( Volume: 5, Issue: 12, December 2024)
Page(s): 6054 - 6065
Date of Publication: 21 March 2024
Electronic ISSN: 2691-4581

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.