【24h】

Technique of Information Hiding Based on Neural Network

机译:基于神经网络的信息隐藏技术

获取原文
获取原文并翻译 | 示例

摘要

A neural network algorithm is proposed which can conceal different files effectively such as ~*.exe, ~*.com, ~*.doc, ~*.txt and self-defined file formats. First, the important contents of the file are coded into a binary array. The total number of 0s and 1s is N. Second, to make the neural network learn the sample space, N pixel values and their closely relevant pixel values are randomly chosen from a color BMP format image and used to train the neural network, thus we get a group of network parameters and its outputs Y1. Each element of Y1 is increased by 0 or 1 according to the zeros and ones from the array, the increased Y1 is called Y2. Third, using the transmitted parameters, a receiver can restore the neural network. Network outputs Y3(Y1) can also be obtained by simulating the restored neural network with the seed pixel values. Finally, the encrypted information can be decoded by Y2 and Y3. The acquisition of parameters and Y1 is different when the neural network is trained each time, so the algorithm has the characteristic of a one-time pad, which can enhance the correspondence security. Because the network colligates the chosen pixel values and their closely relevant pixel values, a cryptanalyst can not restore the network parameters and Y3 easily. Without the seed picture and the password, he does not know the encrypted data even if he knows the network parameters and Y2. If he only has the seed picture, he does not know the encrypted contents either, because there is no other information in the picture, which just is used to train the network. Using the same algorithm, the fragile watermark can be embedded into Y1 simultaneously. Besides telling you whether Y2 or network parameters have been tampered with, the fragile watermark could as well, reflecting the distortion status in the spatial domain of the tampered image. Therefore, the proposed method is of significance in practice.
机译:提出了一种神经网络算法,该算法可以有效地隐藏不同的文件,例如〜* .exe,〜* .com,〜* .doc,〜* .txt和自定义文件格式。首先,将文件的重要内容编码为二进制数组。 0和1的总数为N。其次,为了使神经网络学习样本空间,从彩色BMP格式图像中随机选择N个像素值及其紧密相关的像素值,并将其用于训练神经网络。得到一组网络参数及其输出Y1。 Y1的每个元素根据数组中的零和1增加0或1,增加的Y1称为Y2。第三,使用传输的参数,接收器可以还原神经网络。网络输出Y3(Y1)也可以通过使用种子像素值模拟恢复的神经网络来获得。最后,加密的信息可以由Y2和Y3解码。每次训练神经网络时,参数的获取和Y1都不相同,因此该算法具有一次性填充的特点,可以提高对应的安全性。由于网络会汇总所选的像素值及其紧密相关的像素值,因此密码分析器无法轻松恢复网络参数和Y3。没有种子图片和密码,即使他知道网络参数和Y2,他也不知道加密的数据。如果他只有种子图片,那么他也不知道加密的内容,因为图片中没有其他信息,这些信息仅用于训练网络。使用相同的算法,可以将脆弱的水印同时嵌入到Y1中。除了告诉您Y2或网络参数是否已被篡改之外,脆弱的水印还可以反映被篡改图像的空间域中的失真状态。因此,该方法在实践中具有重要意义。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号