Open Access iconOpen Access

ARTICLE

crossmark

Constructive Robust Steganography Algorithm Based on Style Transfer

by Xiong Zhang1,2, Minqing Zhang1,2,3,*, Xu’an Wang1,2,3,*, Siyuan Huang1,2, Fuqiang Di1,2

1 College of Cryptography Engineering, Engineering University of People’s Armed Police, Xi’an, 710086, China
2 Key Laboratory of People’s Armed Police for Cryptology and Information Security, Engineering University of People’s Armed Police, Xi’an, 710086, China
3 Key Laboratory of CTC & Information Engineering, Ministry of Education, Engineering University of People’s Armed Police, Xi’an, 710086, China

* Corresponding Authors: Minqing Zhang. Email: email; Xu’an Wang. Email: email

Computers, Materials & Continua 2024, 81(1), 1433-1448. https://doi.org/10.32604/cmc.2024.056742

Abstract

Traditional information hiding techniques achieve information hiding by modifying carrier data, which can easily leave detectable traces that may be detected by steganalysis tools. Especially in image transmission, both geometric and non-geometric attacks can cause subtle changes in the pixels of the image during transmission. To overcome these challenges, we propose a constructive robust image steganography technique based on style transformation. Unlike traditional steganography, our algorithm does not involve any direct modifications to the carrier data. In this study, we constructed a mapping dictionary by setting the correspondence between binary codes and image categories and then used the mapping dictionary to map secret information to secret images. Through image semantic segmentation and style transfer techniques, we combined the style of secret images with the content of public images to generate stego images. This type of stego image can resist interference during public channel transmission, ensuring the secure transmission of information. At the receiving end, we input the stego image into a trained secret image reconstruction network, which can effectively reconstruct the original secret image and further recover the secret information through a mapping dictionary to ensure the security, accuracy, and efficient decoding of the information. The experimental results show that this constructive information hiding method based on style transfer improves the security of information hiding, enhances the robustness of the algorithm to various attacks, and ensures information security.

Keywords


Cite This Article

APA Style
Zhang, X., Zhang, M., Wang, X., Huang, S., Di, F. (2024). Constructive robust steganography algorithm based on style transfer. Computers, Materials & Continua, 81(1), 1433-1448. https://doi.org/10.32604/cmc.2024.056742
Vancouver Style
Zhang X, Zhang M, Wang X, Huang S, Di F. Constructive robust steganography algorithm based on style transfer. Comput Mater Contin. 2024;81(1):1433-1448 https://doi.org/10.32604/cmc.2024.056742
IEEE Style
X. Zhang, M. Zhang, X. Wang, S. Huang, and F. Di, “Constructive Robust Steganography Algorithm Based on Style Transfer,” Comput. Mater. Contin., vol. 81, no. 1, pp. 1433-1448, 2024. https://doi.org/10.32604/cmc.2024.056742



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 401

    View

  • 191

    Download

  • 0

    Like

Share Link