2020
DOI: 10.3390/s20247253
|View full text |Cite
|
Sign up to set email alerts
|

High-Capacity Image Steganography Based on Improved Xception

Abstract: The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this problem. The Xception architecture is used for image steganography for the first time, which not only increases the width of the network, but also improves the adaptability of network expansion, and adds different receiving fields to carry out multi-scale infor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…The peak signal-to-noise ratio (PSNR) could evaluate the quality of the processed images, which is commonly used in the fields of super-resolution, compression, and restoration of images. PSNR was expressed as the logarithm of the ratio of the mean square error (MSE) between the reconstructed image and the true image to the maximum possible pixel value of the image [ 17 ].…”
Section: Methodsmentioning
confidence: 99%
“…The peak signal-to-noise ratio (PSNR) could evaluate the quality of the processed images, which is commonly used in the fields of super-resolution, compression, and restoration of images. PSNR was expressed as the logarithm of the ratio of the mean square error (MSE) between the reconstructed image and the true image to the maximum possible pixel value of the image [ 17 ].…”
Section: Methodsmentioning
confidence: 99%
“…Duan et al [9] modified the network structure of the encoder network, with the help of the advantages of the U-Net [6] network itself, the network structure of upsampling and downsampling has a connection operation, and the features of the shallow and deep layers of the image are preserved, so the reconstructed decrypted image has a high similarity with the original secret image, which effectively improves the quality of the image. Subsequently, Duan et al tried to modify different networks and introduced network structures such as FC-DenseNet [10], Xception [11], VQ-VAE [12], and continuously improved the similarity between the secret image and the secret image and the image of the decrypted image. quality.…”
Section: Information Hiding Model Based On Encoder-decoder Networkmentioning
confidence: 99%
“…The network model in this paper consists of Xception [30], LSTM and CNN-Fusion. The innovation is the introduction of a recurrent network, which can extract the features of EEG signals, and build a feature Fusion network (CNN-Fusion).…”
Section: Rcnn-based Feature Extractionmentioning
confidence: 99%