Netinfo Security ›› 2023, Vol. 23 ›› Issue (1): 93-102.doi: 10.3969/j.issn.1671-1122.2023.01.011

Previous Articles    

An Image Information Hiding Algorithm Based on Cross-Domain Adversarial Adaptation

LI Jiyu1, FU Zhangjie1,2(), ZHANG Yubin3   

  1. 1. Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing 210044, China
    2. State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710126, China
    3. College of Mathematical Sciences, Bohai University, Jinzhou 121013, China
  • Received:2022-10-21 Online:2023-01-10 Published:2023-01-19
  • Contact: FU Zhangjie E-mail:fzj@nuist.edu.cn

Abstract:

Image information hiding is one of the important methods to ensure information security. With the growth of deep learning, numerous deep learning-based image to image steganography models have been presented. Most of them are deficient in terms of image quality, hiding security, or embedding capability balance. So, this paper proposed an image information hiding algorithm based on cross-domain adversarial adaptation to address the above problems. First, a super-resolution network was built to embed the secret information into the image content unaffected by zooming in and out, to increase the secret information’s embedding capability. Then, an attention mechanism was introduced to the encoding network to enable the network to focus on the primary features and suppress superfluous features, so enhancing the image’s resolution. Finally, a domain adaption loss was introduced to the generator network to guide the production of the stego image, and the model was trained in a generative adversarial way to reduce the cross-domain difference between the carrier image and the stego image. The experimental results demonstrate that, compared to other steganography techniques, the proposed algorithm improves the security and embedding capability of information hiding while maintaining image quality.

Key words: information hiding, generating adversarial network, domain adaptation, self-attention mechanism

CLC Number: