Inicio  /  Future Internet  /  Vol: 12 Par: 3 (2020)  /  Artículo
ARTÍCULO
TITULO

BASN?Learning Steganography with a Binary Attention Mechanism

Pin Wu    
Xuting Chang    
Yang Yang and Xiaoqiang Li    

Resumen

Secret information sharing through image carriers has aroused much research attention in recent years with images? growing domination on the Internet and mobile applications. The technique of embedding secret information in images without being detected is called image steganography. With the booming trend of convolutional neural networks (CNN), neural-network-automated tasks have been embedded more deeply in our daily lives. However, a series of wrong labeling or bad captioning on the embedded images has left a trace of skepticism and finally leads to a self-confession like exposure. To improve the security of image steganography and minimize task result distortion, models must maintain the feature maps generated by task-specific networks being irrelative to any hidden information embedded in the carrier. This paper introduces a binary attention mechanism into image steganography to help alleviate the security issue, and, in the meantime, increase embedding payload capacity. The experimental results show that our method has the advantage of high payload capacity with little feature map distortion and still resist detection by state-of-the-art image steganalysis algorithms.

 Artículos similares

       
 
Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt    
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existin... ver más
Revista: Future Internet

 
Wojciech Rymarkiewicz, Pawel Cybulski and Tymoteusz Horbinski    
This study investigated the impact of smartphone usage frequency on the effectiveness and accuracy of symbol location in a variety of spatial contexts on mobile maps using eye-tracking technology while utilizing the example of Mapy.cz. The scanning speed... ver más

 
Jianlong Ye, Hongchuan Yu, Gaoyang Liu, Jiong Zhou and Jiangpeng Shu    
Component identification and depth estimation are important for detecting the integrity of post-disaster structures. However, traditional manual methods might be time-consuming, labor-intensive, and influenced by subjective judgments of inspectors. Deep-... ver más
Revista: Buildings

 
Ziyi Wang, Jinqing Jia, Lihua Zhang and Ziqi Li    
The direct-shear test is the primary method used to test the shear strength of transparent soil, but this experiment is complex and easily influenced by experimental conditions. In order to simplify the process of obtaining the shear strength of transpar... ver más
Revista: Buildings

 
Ruocheng Feng, Youquan Jia, Ting Wang and Hongxiao Gan    
In the construction industry, the construction process of rebar tying is highly dependent on manual operation, which leads to a wide range of work areas, high labor intensity, and limited efficiency. Therefore, robot technology for automatic rebar tying ... ver más
Revista: Buildings