2020
DOI: 10.1109/access.2020.2969524
|View full text |Cite
|
Sign up to set email alerts
|

Technology of Hiding and Protecting the Secret Image Based on Two-Channel Deep Hiding Network

Abstract: The development of new media technology brings serious security problems to the transmission of secret remote sensing or military images. It is a new and challenging task to study the technology of protecting these secret images. In this paper, based on the powerful spatial feature extraction capability of the convolutional neural network, a novel two-channel deep hiding network (TDHN) is designed by introducing advanced ideas such as skip connection, feature fusion, etc., and the two channels are respectively… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 39 publications
0
16
0
Order By: Relevance
“…Due to the rapid development of deep learning, a large number of academic researchers use deep-learning feature extraction to perform steganalysis and steganalysis of images, audio, video, and text. Chen et al [ 18 ] proposed a two-channel image steganography (TDHN) scheme based on deep learning. First, the carrier image and the secret image are pooled and averaged separately, and then they are .…”
Section: Related Workmentioning
confidence: 99%
“…Due to the rapid development of deep learning, a large number of academic researchers use deep-learning feature extraction to perform steganalysis and steganalysis of images, audio, video, and text. Chen et al [ 18 ] proposed a two-channel image steganography (TDHN) scheme based on deep learning. First, the carrier image and the secret image are pooled and averaged separately, and then they are .…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, Baluja [ 22 ] displayed the residual map that was obtained by capturing the pixel-wise differences between the hidden image and the cover image and pointed out the research direction of improving steganography’s security; however, the hidden image’s quality has not been essentially improved. In order to further improve the hidden image’s quality and boost the steganographic performance from the source, Chen et al [ 23 ] attempted to deepen and widen the network using various advanced feature fusion strategies and, as a result, a remarkable advancement was achieved.…”
Section: Introductionmentioning
confidence: 99%
“…Although the abovementioned deep learning-based methods [ 20 , 21 , 22 , 23 ] have successfully achieved the goal of concealing image data, the security issues, especially the visual security, have not been well solved. In addition, the recent studies usually design complex models in order to obtain performance improvement, but they ignore the model’s computational complexity in practical application.…”
Section: Introductionmentioning
confidence: 99%
“…To increase security, in [11], the attention model and the generative adversarial network are combined to realize the embedding and extraction of secret images. Nowadays, there are relatively few attempts to hide images using the deep neural network itself [12]- [14]. In [13], the convolutional network has an encoder and a decoder.…”
Section: Introductionmentioning
confidence: 99%