Depth self-adaptive image hiding method based on confrontation sample generation

文档序号:1429577 发布日期:2020-03-17 浏览:6次 中文

阅读说明:本技术 基于对抗样本生成的深度自适应图像隐藏方法 (Depth self-adaptive image hiding method based on confrontation sample generation ) 是由 宋明黎 潘文雯 静永程 于 2019-10-15 设计创作,主要内容包括:基于对抗样本生成的深度自适应图像隐藏方法,包含如下几个步骤:首先,设计实验样本,确定需要隐藏的图(secret图)和将接受隐藏信息的图(cover图);然后建立局部隐藏patch选择的SSD网络,找出cover图中最合适隐藏secret图的区域;之后,建立encode网络,secret图用对抗样本的方法,通过encode网络产生扰动,直接添加到cover图的选定区域产生藏有隐藏信息的container图;接着,建立decode网络,解出与secret图高度相似的revealed图;最后,训练和测试encode网络和decode网络,对每一组输入进行编码网络的更新,实现对于每组图像的个性化隐藏。通过以上三个主要步骤,本发明可以在保持编码得到很好的隐藏还原效果的同时,实现图像的自适应局部隐藏,提高图像隐藏的重建质量,拓展其实际应用范围。(The depth self-adaptive image hiding method based on the antagonistic sample generation comprises the following steps: firstly, designing an experimental sample, and determining a graph (secret graph) needing to be hidden and a graph (cover graph) to receive hidden information; then establishing an SSD network selected by the local hidden patch, and finding out the most suitable area for hiding the secret graph in the cover graph; then, establishing an encode network, generating disturbance by the encoder graph through the encode network by using a method of confrontation samples, and directly adding the disturbance to a selected area of the cover graph to generate a container graph with hidden information; then, establishing a decode network, and solving a reconstructed graph which is highly similar to the secret graph; and finally, training and testing an encode network and a decode network, updating the encoding network for each group of input, and realizing personalized hiding for each group of images. Through the three main steps, the invention can realize the self-adaptive local hiding of the image while keeping the good hiding and restoring effect of the coding, improve the reconstruction quality of the image hiding and expand the actual application range of the image hiding.)

1. The depth self-adaptive image hiding method based on the countercheck sample generation comprises the following main steps:

1) designing an experimental sample;

forming an experiment sample data set by using data in three data sets of VOC2007, ImageNet and Open Image; defining a graph needing to be hidden as a secret graph, taking a graph receiving hidden information as a cover graph, adding a result graph of the hidden information through an encode network as a container graph, and taking a graph analyzed by the container graph as a recovered graph; using ImageNet as a secret atlas, and taking a non-crossed part in the three data sets as a cover atlas; performing SSD classification test on the combination of the secret graph and the cover graph, and obtaining a region in the cover graph, which has similar semantics with the secret graph, as a next partially hidden patch; finally, combining the secret graph, the cover graph and the selected patch thereof to obtain a sample set of the experiment;

2) establishing an SSD network selected by a local hidden patch;

firstly, finding a patch suitable for hiding the secret graph in the cover graph to realize the local hiding characteristic of image hiding; because the two parts with similar semantics can achieve a better hiding effect, the SSD network is established to select the patch to be hidden in the cover graph; forming a SSD network of 19 convolutional layers, and detecting the type of a secret graph; then, inputting the cover graph in the SSD network, searching the bounding boxes of all the types A in the cover graph, and adopting the bounding boxes with 0.5 confidence coefficient as a final result, so that the blocking boxes are not easily identified by an attacker under the condition of keeping a certain semantic meaning, thereby completing the selection of a hidden area of local hiding;

3) establishing an encode network;

the idea of resisting samples is utilized to realize an image hiding method, and the favorable meaning is given to the resisting samples which are only considered to have adverse aspects at present; the encoder network firstly inputs a secret graph, generates disturbance according to a method for generating a countermeasure sample, and the method for generating the countermeasure sample is shown as a formula (1);

minρ‖ρ‖2s.t.C(Ic+ρ)=l;Ic+ρ∈[0,1]m(1)

where ρ is the disturbance to be added, IcThe method comprises the steps of 1, referring to an original image, C referring to a network classifier, and l referring to a classification result needing network misclassification; since the required disturbance is invisible to the human eye, the condition | ρ | is set2

Directly adding disturbance generated by an encode network to the selected patch position in the cover graph to obtain a container graph containing hidden information; forming an encode network of 12 convolutional layers to obtain a container image similar to a cover image, wherein the container image obtained by training is required to achieve the standard of safety hiding not only on the numerical value of quantitative test but also on the visual effect of qualitative observation, namely the cover image is similar to the container image, and no processing trace which can be identified by naked eyes is left after disturbance is added;

4) establishing a decode network;

the overall structure is similar to the encode network, and a decode network with 12 layers of convolution layers is formed; in the decode network, inputting a container graph which has partially hidden secret graph information and partially hidden coordinate information, and outputting a reconstructed graph after completely reverse operation with the encode network, wherein the reconstructed graph is similar to the secret graph in the target to complete reconstruction operation; the requirement of the encode network is the same, and the standard is achieved on quantitative numerical test and qualitative visual effect;

5) training and testing the encode and decode networks;

in order to complete higher accuracy, personalized parameter configuration is carried out on each group of input pictures, and two stages are adopted for the joint training of an encode network and a decode network;

① initial training:

after the encode network and the decode network of the structure are constructed, simultaneously training the two networks and adjusting the parameters of the two networks; setting the data volume of the training set as 2000 cover graphs and 2000 secret graphs, wherein the batch size is 1, and the learning rate is 10-4(ii) a Defining a loss value of initial stage training, wherein a formula (2) shows that two parts are provided, namely a difference value between a secret graph and a reconstructed graph, and ensuring that the reconstructed graph restored by decode meets the requirement; secondly, the disturbance value is as small as possible, and the reference confrontation sample is generatedManipulation is performed to ensure that the obtained container graph is similar to the original cover graph;

Lsteg=‖ρ‖1+α‖g(Ic+ρ)-Is1(2)

α is used to adjust the specific gravity of two parameters, g is the decode network receiving the container graph, ρ is the disturbance generated by the challenge sample, Ic+ ρ represents the container diagram, and the loss value is L1A norm form;

② Secondary training and testing:

after training a preliminary network by using the cover graph and the secret graph of 2000 pairs, inputting a tested picture pair; at this stage, considering that the receiver of the container graph can not obtain the specific numerical value of the secret graph, all parameters of the decode network are fixed, and the encode network is iteratively updated; setting the number of iterative updating to be 100000, wherein the loss consists of two parts, is the same as the loss of the first stage, and is divided into a difference value and a disturbance value of a secret graph and a regenerated graph; carrying out personalized iteration on each group of images to obtain high-quality hiding and reconstructing results of each group;

one of the main differences between local concealment and overall concealment to the naked eye is that overall concealment can tolerate slightly higher differences between the container image and the cover image, and can achieve the standard as long as the differences cannot be recognized by the naked eye as a whole, and can cause color differences; otherwise, the selected patch part has a large difference with the surrounding part on naked eyes, and an obvious edge line exists, so that the difference between the cover image and the container image is extremely small for local hiding, namely the disturbance value is small enough.

Technical Field

The invention provides a depth self-adaptive image hiding method based on confrontation sample generation, which realizes more flexible, larger-capacity and safer information transmission through image hiding, and aims at the problems of chromatic aberration existing in image hiding, the effect that the image hiding can only achieve global hiding and the like.

Background

The most popular image hiding algorithm is based on the Least Significant Bit (LSB) method, the graph to be hidden is defined as secret graph, the graph to receive hidden information is cover graph, the result graph to add hidden information through the encode network is container graph, and the graph analyzed by the container graph is reconstructed graph. The main idea of these LSB based algorithms is to change at least 4 significant bits of the cover image to place the hidden information. In this way, color variations in the cover image during concealment can be minimized and the resulting distortion is generally not observable. While LSB-based methods have significant performance, they are generally vulnerable to statistical analysis methods that detect image hiding. To address this limitation, hidden images propose a more secure algorithm to ensure that secret images are hidden while preserving image statistics, such as highly undetectable image hiding (Hugo) and wavelet derived weights (Wow). However, the payload capacity (information that the overlay image may contain) of these algorithms is relatively small.

Recently, inspired by Convolutional Neural Network (CNN), an image hiding algorithm based on deep learning is proposed. The depth image hiding methods utilize the distribution of images involved in the hidden simulation hiding process of the CNN to establish a completely CNN-based hiding system. The Hiding system comprises a preparation network, a hooking network and a Revealing network, wherein the preparation network receives the secret image as input and applies preprocessing operation, and then the processed secret image and the cover image are input into the hooking network to obtain a container image containing hidden information. The purpose of the reforming network is to decode the container image into the target secret image, all networks being trained in a fully supervised manner. This work shows that it is feasible to hide a large amount of information in the entire secret image into a single cover image with little visual distortion using CNN. Meng et al further propose to use a target detection algorithm to select complex texture regions for information hiding, and recent work has also expanded CNN-based image hiding to video aspects.

The countermeasure samples are modified versions of the original images that are intentionally disturbed to attack and confuse the deep neural network. The antagonistic sample exists not only in the deep classification network but also in the generation network, the recurrent neural network, and the reinforcement learning. For example, for generating a network, the countermeasure sample may alter the output of the network to another image by adding some interference that still makes the interfered image visually similar to the original image, which matches the target of the depth image concealment.

Depth image concealment is also an image reconstruction problem in nature. The purpose of image reconstruction is to invert the feature representation, i.e. to reconstruct the entire image from the features of interest. Image reconstruction algorithms fall into two categories: slow image reconstruction based on online image optimization and fast image reconstruction based on offline model optimization. The first type iteratively optimizes the image in pixel space, typically starting with random noise, until a desired distribution of features is satisfied. The second category, fast image reconstruction, accelerates the reconstruction process by pre-training a feed-forward network, placing the computational burden on the training phase.

Disclosure of Invention

The invention provides a depth self-adaptive image hiding method based on confrontation sample generation, which aims to overcome the defects in the prior art and enable image hiding to be more flexible and safer. The invention adopts an adaptive strategy to hide a secret image into the patch of a specific cover image. Specifically, the method first runs an object detector on the secret map, and assigns a label to the secret map as the class of the detected object with the highest confidence level. Then we use the same detector on the cover map to obtain the same patch as the secret map but with the lowest confidence to hide the secret map. If no object of the same type as the secret map can be found, a patch can be randomly selected and then the hidden coordinates are encrypted using an additional standard image hiding method. After the initial training is finished, the decoder network is fixed, and when each group of test pictures enters, the network of the iteration sender part is updated, so that each group of test pictures not only has a unique disturbance, but also has a personalized network parameter.

The invention allows adaptive local image concealment by a seemingly contradictory process that transforms the secret map into a robust against sample perturbation to achieve concealment. Experimental results on multiple data sets show that the proposed local concealment algorithm is superior to the prior art in both quantity and quality. Furthermore, even if the method of countering samples is directly applied to the global without using a local concealment means, the effect is still superior to the prior art.

The depth self-adaptive image hiding method based on the antagonistic sample generation comprises the following steps:

1) designing an experimental sample;

the experimental sample data set was composed using data from the three data sets VOC2007, ImageNet and Open Image. Defining a graph needing to be hidden as a secret graph, taking a graph receiving hidden information as a cover graph, adding the hidden information through an encode network to obtain a graph, and taking the graph analyzed by the graph as a reconstructed graph. Because the secret graph needs to be partially hidden in the cover graph, and the secret graph needs to have the characteristics of small size and single content, the ImageNet is used as the secret atlas, and the non-crossed part of the three data sets is the cover atlas. And (4) carrying out the class test of the SSD on the combination of the secret graph and the cover graph, and obtaining a region with similar semantics with the secret graph class in the cover graph as a patch which is locally hidden later. Finally, combining the secret graph, the cover graph and the selected patch thereof to obtain a sample set of the experiment;

2) establishing an SSD network selected by a local hidden patch;

first, find the patch in the cover graph suitable for hiding the secret graph to realize the local hiding property of image hiding. Because the two parts with similar semantics can achieve a better hiding effect, the SSD network is established to select the patch to be hidden in the cover graph. The SSD network constituting the 19-layer convolutional layer detects the type (for example, type a) of the secret map. Then, inputting the cover graph in the SSD network, searching the bounding boxes of all the types A in the cover graph, and adopting the bounding boxes with 0.5 confidence coefficient as a final result, so that the blocking boxes are not easily identified by an attacker under the condition of keeping a certain semantic meaning, thereby completing the selection of a hidden area of local hiding;

3) establishing an encode network;

the idea of countersample is utilized to realize the image hiding method, and the countersample which is only considered to have adverse aspects currently is endowed with favorable meaning. The encoder network firstly inputs a secret map, generates disturbance according to a method for generating a countermeasure sample, and the method for generating the countermeasure sample is shown as (1).

minρ||ρ||2s.t.C(Ic+ρ)=l;Ic+ρ∈[0,1]m(1)

Where ρ is the disturbance to be added, IcThe method refers to an original image, C refers to a network classifier, and l refers to a classification result requiring network misclassification. Because the needed disturbance is invisible to human eyes, the condition | ρ | calculation is set2

And directly adding disturbance generated by the encode network to the selected patch position in the cover graph to obtain a container graph containing hidden information. Forming an encode network of 12 convolutional layers to obtain a container image similar to a cover image, wherein the container image obtained by training is required to achieve the standard of safety hiding not only on the numerical value of quantitative test but also on the visual effect of qualitative observation, namely the cover image is similar to the container image, and no processing trace which can be identified by naked eyes exists after disturbance is added, such as the problems of local chromatic aberration, inconsistent brightness, frame highlighting and the like;

4) establishing a decode network;

the overall structure is similar to the encode network, and the decode network with 12 layers of convolution layers is formed. In the decode network, a container graph which has partially hidden secret graph information and partially hidden coordinate information are input, and after the complete reverse operation of the encode network, a reconstructed graph is output, wherein the reconstructed graph is similar to the secret graph in the target, so that the reconstruction operation is completed. The requirement of the encode network is the same, and the standard is achieved on quantitative numerical test and qualitative visual effect;

5) training and testing the encode and decode networks;

in order to achieve higher accuracy, personalized parameter configuration is carried out on each group of input pictures, and two stages are adopted for the joint training of the encode network and the decode network.

① initial training:

after the encode network and the decode network with the structures are constructed, the two networks are trained simultaneously, and the parameters of the two networks are adjusted. Setting the data volume of the training set as 2000 cover graphs and 2000 secret graphs, wherein the batch size is 1, and the learning rate is 10-4. Defining a loss value of initial stage training, wherein the loss value is represented by a formula (2) and has two parts, namely a difference value between a secret graph and a reconstructed graph, and ensuring that the reconstructed graph restored by decode meets the requirement; secondly, the disturbance value is as small as possible, and the generation method of the confrontation sample is referred to ensure that the obtained container image is similar to the original cover image.

Lsteg=||ρ||1+α||g(Ic+ρ)-Is||1(2)

α is used to adjust the specific gravity of two parameters, g is the decode network receiving the container graph, ρ is the disturbance generated by the challenge sample, Ic+ ρ represents the container diagram, and the loss value is L1Norm form.

② Secondary training and testing:

after training the preliminary network using the cover and secret maps of 2000 pairs, the tested pairs of pictures were input. At this stage, considering that the receiver of the container graph cannot obtain the specific value of the secret graph, all parameters of the decode network are fixed, and the encode network is iteratively updated. The number of iterative updates is set to be 100000, and the loss is composed of two parts, which are the same as the loss of the first stage, and is divided into the difference value and the disturbance value of the secret graph and the regenerated graph. And carrying out personalized iteration on each group of graphs to obtain high-quality hiding and reconstruction results of each group.

One of the main differences between local concealment and overall concealment to the naked eye is that overall concealment can tolerate slightly higher differences between the container image and the cover image, and can achieve the standard as long as the differences cannot be recognized by the naked eye as a whole, and can cause color differences; otherwise, the selected patch part has a large difference with the surrounding part on naked eyes, and an obvious edge line exists, so that the difference between the cover image and the container image is extremely small for local hiding, namely the disturbance value is small enough.

The invention has the advantages that: on the basis of ensuring that a decoder network reconstructed real image is similar to an original secret image, image hiding is carried out in a mode of resisting samples, and the purpose of local hiding is achieved. The method has the advantages that while the favorable significance is given to the countersample, the high-quality self-adaptive image hiding effect is realized, and the aim of safely hiding the information is fulfilled.

Drawings

FIG. 1 is a flow chart of the method of the present invention.

Detailed Description

The technical scheme of the invention is further explained by combining the attached drawings.

The depth self-adaptive image hiding method based on the antagonistic sample generation comprises the following steps:

1) designing an experimental sample;

the experimental sample data set was composed using data from the three data sets VOC2007, ImageNet and Open Image. Defining a graph needing to be hidden as a secret graph, taking a graph receiving hidden information as a cover graph, adding the hidden information through an encode network to obtain a graph, and taking the graph analyzed by the graph as a reconstructed graph. Because the secret graph needs to be partially hidden in the cover graph, and the secret graph needs to have the characteristics of small size and single content, the ImageNet is used as the secret atlas, and the non-crossed part of the three data sets is the cover atlas. And (4) carrying out the class test of the SSD on the combination of the secret graph and the cover graph, and obtaining a region with similar semantics with the secret graph class in the cover graph as a patch which is locally hidden later. Finally, combining the secret graph, the cover graph and the selected patch thereof to obtain a sample set of the experiment;

2) establishing an SSD network selected by a local hidden patch;

the specific implementation flow is shown in the attached figure 1. First, find the patch in the cover graph suitable for hiding the secret graph to realize the local hiding property of image hiding. Because the two parts with similar semantics can achieve a better hiding effect, the SSD network is established to select the patch to be hidden in the cover graph. The SSD network constituting the 19-layer convolutional layer detects the type (for example, type a) of the secret map. Then, inputting the cover graph in the SSD network, searching the bounding boxes of all the types A in the cover graph, and adopting the bounding boxes with 0.5 confidence coefficient as a final result, so that the blocking boxes are not easily identified by an attacker under the condition of keeping a certain semantic meaning, thereby completing the selection of a hidden area of local hiding;

3) establishing an encode network;

the idea of countersample is utilized to realize the image hiding method, and the countersample which is only considered to have adverse aspects currently is endowed with favorable meaning. The encoder network firstly inputs a secret map, generates disturbance according to a method for generating a countermeasure sample, and the method for generating the countermeasure sample is shown as (1).

minρ||ρ||2s.t.C(Ic+ρ)=l;Ic+ρ∈[0,1]m(1)

Where ρ is the disturbance to be added, IcThe method refers to an original image, C refers to a network classifier, and l refers to a classification result requiring network misclassification. Because the needed disturbance is invisible to human eyes, the condition | ρ | calculation is set2

And directly adding the disturbance generated in the encode network to the selected patch position in the cover graph to obtain a container graph containing hidden information. Forming an encode network of 12 convolutional layers to obtain a container image similar to a cover image, wherein the container image obtained by training is required to achieve the standard of safety hiding not only on the numerical value of quantitative test but also on the visual effect of qualitative observation, namely the cover image is similar to the container image, and no processing trace which can be identified by naked eyes exists after disturbance is added, such as the problems of local chromatic aberration, inconsistent brightness, frame highlighting and the like;

4) establishing a decode network;

the overall structure is similar to the encode network, and the decode network with 12 layers of convolution layers is formed. In the decode network, a container graph which has partially hidden secret graph information and partially hidden coordinate information are input, and after the complete reverse operation of the encode network, a reconstructed graph is output, wherein the reconstructed graph is similar to the secret graph in the target, so that the reconstruction operation is completed. The requirement of the encode network is the same, and the standard is achieved on quantitative numerical test and qualitative visual effect;

5) training and testing the encode and decode networks;

in order to achieve higher accuracy, personalized parameter configuration is carried out on each group of input pictures, and two stages are adopted for the joint training of the encode network and the decode network.

① initial training:

after the encode network and the decode network with the structures are constructed, the two networks are trained simultaneously, and the parameters of the two networks are adjusted. Setting the data volume of the training set as 2000 cover graphs and 2000 secret graphs, wherein the batch size is 1, and the learning rate is 10-4. Defining a loss value of initial stage training, wherein the loss value is represented by a formula (2) and has two parts, namely a difference value between a secret graph and a reconstructed graph, and ensuring that the reconstructed graph restored by decode meets the requirement; secondly, the disturbance value is as small as possible, and the generation method of the confrontation sample is referred to ensure that the obtained container image is similar to the original cover image.

Lsteg=||ρ||1+α||g(Ic+ρ)-Is||1(2)

α is used to adjust the specific gravity of two parameters, g is the decode network receiving the container graph, ρ is the disturbance generated by the challenge sample, Ic+ ρ represents the container diagram, and the loss value is L1Norm form.

② Secondary training and testing:

after training the preliminary network using the cover and secret maps of 2000 pairs, the tested pairs of pictures were input. At this stage, considering that the receiver of the container graph cannot obtain the specific value of the secret graph, all parameters of the decode network are fixed, and the encode network is iteratively updated. The number of iterative updates is set to be 100000, and the loss is composed of two parts, which are the same as the loss of the first stage, and is divided into the difference value and the disturbance value of the secret graph and the regenerated graph. And carrying out personalized iteration on each group of graphs to obtain high-quality hiding and reconstruction results of each group.

One of the main differences between local concealment and overall concealment to the naked eye is that overall concealment can tolerate slightly higher differences between the container image and the cover image, and can achieve the standard as long as the differences cannot be recognized by the naked eye as a whole, and can cause color differences; otherwise, the selected patch part has a large difference with the surrounding part on naked eyes, and an obvious edge line exists, so that the difference between the cover image and the container image is extremely small for local hiding, namely the disturbance value is small enough.

Through the five steps, a related encode network and a decode network can be established, the training process of two different stages is used for updating and iterating, personalized hidden positions and disturbance generation are carried out on each group of input image pairs, introduction of a countersample and local hiding of the images are achieved, and high-quality reconstruction results of the cover image and the secret image are obtained to the maximum extent.

The embodiments described in this specification are merely illustrative of implementations of the inventive concept and the scope of the present invention should not be considered limited to the specific forms set forth in the embodiments but rather by the equivalents thereof as may occur to those skilled in the art upon consideration of the present inventive concept.

9页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:面向三维视频中二维视频帧和深度图版权保护的鲁棒性零水印方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!