2020
DOI: 10.1186/s13640-020-00518-2
|View full text |Cite
|
Sign up to set email alerts
|

Defeating data hiding in social networks using generative adversarial network

Abstract: As a large number of images are transmitted through social networks every moment, terrorists may hide data into images to convey secret data. Various types of images are mixed up in the social networks, and it is difficult for the servers of social networks to detect whether the images are clean. To prevent the illegal communication, this paper proposes a method of defeating data hiding by removing the secret data without impacting the original media content. The method separates the clean images from illegal … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 20 publications
(15 reference statements)
0
3
0
Order By: Relevance
“…In this section, we will show the results of attack on watermarking of different strengths through our method and the comparison experiments with Wang, Qian, Feng, and Zhang [26] and StirMark. We choose the "F16" in Set9 as the test image and embed the watermark with the strength a with 1, 2, 3, and 4, and then, we will get the four images to be attacked.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we will show the results of attack on watermarking of different strengths through our method and the comparison experiments with Wang, Qian, Feng, and Zhang [26] and StirMark. We choose the "F16" in Set9 as the test image and embed the watermark with the strength a with 1, 2, 3, and 4, and then, we will get the four images to be attacked.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…We choose the "F16" in Set9 as the test image and embed the watermark with the strength a with 1, 2, 3, and 4, and then, we will get the four images to be attacked. Table 1 shows the results after processing with the method proposed, and the comparison with Wang et al [26] and several common geometric attacks in StirMark. Let the parameter of the cropping attack be c, and the value is 0.75, 0.5, 0.25 { }; the rotation attack parameter be r, and the value is 180 °, 150 °, 90 °{ }; and the scaling attack parameter be sc, and the value is 0.5, 1.5, 2 { }.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation