Cargando…
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks
The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage. Traditional image steganography algorithms us...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9460549/ https://www.ncbi.nlm.nih.gov/pubmed/36080965 http://dx.doi.org/10.3390/s22176497 |
_version_ | 1784786774362423296 |
---|---|
author | Ding, Kangyi Hu, Teng Niu, Weina Liu, Xiaolei He, Junpeng Yin, Mingyong Zhang, Xiaosong |
author_facet | Ding, Kangyi Hu, Teng Niu, Weina Liu, Xiaolei He, Junpeng Yin, Mingyong Zhang, Xiaosong |
author_sort | Ding, Kangyi |
collection | PubMed |
description | The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage. Traditional image steganography algorithms use manually crafted steganographic algorithms or custom models for steganography, while our approach uses ordinary OCR models for information embedding and extraction. Even if our OCR models for steganography are intercepted, it is difficult to find their relevance to steganography. We propose a novel steganography method for character-level text images based on adversarial attacks. We exploit the complexity and uniqueness of neural network boundaries and use neural networks as a tool for information embedding and extraction. We use an adversarial attack to embed the steganographic information into the character region of the image. To avoid detection by other OCR models, we optimize the generation of the adversarial samples and use a verification model to filter the generated steganographic images, which, in turn, ensures that the embedded information can only be recognized by our local model. The decoupling experiments show that the strategies we adopt to weaken the transferability can reduce the possibility of other OCR models recognizing the embedded information while ensuring the success rate of information embedding. Meanwhile, the perturbations we add to embed the information are acceptable. Finally, we explored the impact of different parameters on the algorithm with the potential of our steganography algorithm through parameter selection experiments. We also verify the effectiveness of our validation model to select the best steganographic images. The experiments show that our algorithm can achieve a 100% information embedding rate and more than 95% steganography success rate under the set condition of 3 samples per group. In addition, our embedded information can be hardly detected by other OCR models. |
format | Online Article Text |
id | pubmed-9460549 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-94605492022-09-10 A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks Ding, Kangyi Hu, Teng Niu, Weina Liu, Xiaolei He, Junpeng Yin, Mingyong Zhang, Xiaosong Sensors (Basel) Article The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage. Traditional image steganography algorithms use manually crafted steganographic algorithms or custom models for steganography, while our approach uses ordinary OCR models for information embedding and extraction. Even if our OCR models for steganography are intercepted, it is difficult to find their relevance to steganography. We propose a novel steganography method for character-level text images based on adversarial attacks. We exploit the complexity and uniqueness of neural network boundaries and use neural networks as a tool for information embedding and extraction. We use an adversarial attack to embed the steganographic information into the character region of the image. To avoid detection by other OCR models, we optimize the generation of the adversarial samples and use a verification model to filter the generated steganographic images, which, in turn, ensures that the embedded information can only be recognized by our local model. The decoupling experiments show that the strategies we adopt to weaken the transferability can reduce the possibility of other OCR models recognizing the embedded information while ensuring the success rate of information embedding. Meanwhile, the perturbations we add to embed the information are acceptable. Finally, we explored the impact of different parameters on the algorithm with the potential of our steganography algorithm through parameter selection experiments. We also verify the effectiveness of our validation model to select the best steganographic images. The experiments show that our algorithm can achieve a 100% information embedding rate and more than 95% steganography success rate under the set condition of 3 samples per group. In addition, our embedded information can be hardly detected by other OCR models. MDPI 2022-08-29 /pmc/articles/PMC9460549/ /pubmed/36080965 http://dx.doi.org/10.3390/s22176497 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Ding, Kangyi Hu, Teng Niu, Weina Liu, Xiaolei He, Junpeng Yin, Mingyong Zhang, Xiaosong A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks |
title | A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks |
title_full | A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks |
title_fullStr | A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks |
title_full_unstemmed | A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks |
title_short | A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks |
title_sort | novel steganography method for character-level text image based on adversarial attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9460549/ https://www.ncbi.nlm.nih.gov/pubmed/36080965 http://dx.doi.org/10.3390/s22176497 |
work_keys_str_mv | AT dingkangyi anovelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT huteng anovelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT niuweina anovelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT liuxiaolei anovelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT hejunpeng anovelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT yinmingyong anovelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT zhangxiaosong anovelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT dingkangyi novelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT huteng novelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT niuweina novelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT liuxiaolei novelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT hejunpeng novelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT yinmingyong novelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks AT zhangxiaosong novelsteganographymethodforcharacterleveltextimagebasedonadversarialattacks |