Skip to main content

2024 | OriginalPaper | Buchkapitel

Neural Network Steganography Using Extractor Matching

verfasst von : Yunfei Xie, Zichi Wang

Erschienen in: Digital Forensics and Watermarking

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Neural networks have been applied in various fields, including steganography (called neural network steganography). The network used for secret data extraction is called the extractor. This paper proposes a neural network steganography scheme using extractor matching. In our scheme, the extractor is a publicly available normal network possessed by the receiver, which is used for conventional intelligent tasks. Sender connects extractor to another neural network (called cover network), and then trains the connected network to guarantee correctly data extraction without decreasing the performance of the original task of cover network. During the process of training, the parameters of extractor remain unchanged. Specifically, these network parameters are obtained using an extraction key. The receiver can correctly extract secret data with the help of correct extraction key, while an incorrect key will fail to extract secret data. The feasibility of our scheme is demonstrated in experiments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Elhaki, O., Shojaei, K.: Neural network-based target tracking control of underactuated autonomous underwater vehicles with a prescribed performance. Ocean Eng. 167(NOV.1), 239–256 (2018)CrossRef Elhaki, O., Shojaei, K.: Neural network-based target tracking control of underactuated autonomous underwater vehicles with a prescribed performance. Ocean Eng. 167(NOV.1), 239–256 (2018)CrossRef
2.
Zurück zum Zitat He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016) He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)
4.
Zurück zum Zitat Devi A.G., Thota A., Nithya G., Majji S., Gopatoti A., Dhavamani L.: Advancement of digital image steganography using deep convolutional neural networks. In: 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, pp. 250–254 (2022) Devi A.G., Thota A., Nithya G., Majji S., Gopatoti A., Dhavamani L.: Advancement of digital image steganography using deep convolutional neural networks. In: 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, pp. 250–254 (2022)
5.
Zurück zum Zitat Wu, H., Liu, G., Yao, Y., Zhang, X.: Watermarking neural networks with watermarked images. IEEE Trans. 31(7), 2591–2601 (2021) Wu, H., Liu, G., Yao, Y., Zhang, X.: Watermarking neural networks with watermarked images. IEEE Trans. 31(7), 2591–2601 (2021)
6.
Zurück zum Zitat Adi Y., Baum C., Cisse M., Pinkas B., Keshet J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium. pp. 1615–1631. {USENIX} Association, Baltimore (2018) Adi Y., Baum C., Cisse M., Pinkas B., Keshet J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium. pp. 1615–1631. {USENIX} Association, Baltimore (2018)
7.
Zurück zum Zitat Wang, Z., Feng, G., Wu, H., Zhang, X.: Data hiding in neural networks for multiple receivers. IEEE Comput. Intell. Mag. 16(4), 70–84 (2021)CrossRef Wang, Z., Feng, G., Wu, H., Zhang, X.: Data hiding in neural networks for multiple receivers. IEEE Comput. Intell. Mag. 16(4), 70–84 (2021)CrossRef
8.
Zurück zum Zitat Yang, Z., Wang, Z., Zhang, X.: A general steganographic framework for neural network models. Inf. Sci. 643, 119250 (2023)CrossRef Yang, Z., Wang, Z., Zhang, X.: A general steganographic framework for neural network models. Inf. Sci. 643, 119250 (2023)CrossRef
9.
Zurück zum Zitat Yang Z., Wang Z., Zhang X., Tang Z.: Multi-source data hiding in neural networks. In: 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), Shanghai, China, pp. 1–6 (2022) Yang Z., Wang Z., Zhang X., Tang Z.: Multi-source data hiding in neural networks. In: 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), Shanghai, China, pp. 1–6 (2022)
10.
Zurück zum Zitat He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp. 770–778 (2016) He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp. 770–778 (2016)
11.
Zurück zum Zitat Krizhevsky A., Sutskever I., Hinton G.: ImageNet classification with deep convolutional neural networks. Neural Information Processing Systems (NeurIPS), vol. 25, no. 2, pp. 84–90 (2012) Krizhevsky A., Sutskever I., Hinton G.: ImageNet classification with deep convolutional neural networks. Neural Information Processing Systems (NeurIPS), vol. 25, no. 2, pp. 84–90 (2012)
12.
Zurück zum Zitat Uchida Y., Nagai Y., Sakazawa S., Satoh S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM International Conference on Multimedia Retrieval, pp. 269–277 (2017) Uchida Y., Nagai Y., Sakazawa S., Satoh S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM International Conference on Multimedia Retrieval, pp. 269–277 (2017)
13.
Zurück zum Zitat Kingma D.P., Ba, L.J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR), Ithaca, NY. ArXiv, San Diego (2015) Kingma D.P., Ba, L.J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR), Ithaca, NY. ArXiv, San Diego (2015)
Metadaten
Titel
Neural Network Steganography Using Extractor Matching
verfasst von
Yunfei Xie
Zichi Wang
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-2585-4_12

Premium Partner