2021
DOI: 10.1155/2021/4179340
|View full text |Cite
|
Sign up to set email alerts
|

High-Capacity Image Steganography Algorithm Based on Image Style Transfer

Abstract: Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a stega… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…The output of the first level is sent to the second level, where it is concealed under the cover image. The suggested system [11] creates a conversion link between the sensitive information and the stego image by using an ISTNet steganography algorithm to create a stego image that is relatively similar to the original cover image.…”
Section: Related Workmentioning
confidence: 99%
“…The output of the first level is sent to the second level, where it is concealed under the cover image. The suggested system [11] creates a conversion link between the sensitive information and the stego image by using an ISTNet steganography algorithm to create a stego image that is relatively similar to the original cover image.…”
Section: Related Workmentioning
confidence: 99%
“…In 2021, Li et al [23] proposed an image steganography scheme based on style migration and quaternion exponential moments, combining the geometric invariance of quaternion exponential moments to achieve the embedding of 32 × 32 binary images, then perform style migration for transmission, and finally go through a de-styled network and then extract the secret image with high robustness and security, as shown in figure 6. Subsequently, Bi et al [24] proposed an ISTNet scheme to hide a grayscale image into a stylized image during style migration, and the generated secret-containing image is indistinguishable from the artistic image on the Internet, as shown in figure 7. An improved image steganography framework based on Y-channel neural style migration was proposed by Lin et al [25], integrating Y-channel embedding initially and style change of the image after that.…”
Section: Information Hiding Model Based On Neural Style Transfermentioning
confidence: 99%
“…Attention mechanism [20][21][22], as an efficient low-cost way to enhance features, has been widely used in various visual tasks [23][24][25][26]. (e early attention mechanism in the visual field is the squeeze-andexcitation module (SE) proposed by SENet [20].…”
Section: Attention Mechanismmentioning
confidence: 99%