2017
DOI: 10.48550/arxiv.1711.07201
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

End-to-end Trained CNN Encode-Decoder Networks for Image Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…The network structure comprises three components: a pre-processing network resizing the secret image to match the cover image's size, an encoder network combining the secret image and cover image to generate the stego image, and a decoder network facilitating the extraction of the secret image. Rehman et al [22] made improvements on this foundation, but both steganographic networks led to the issue of colour distortion. Zhang et al [23] addressed this by converting the RGB format of the steganography-performed image to YCrYb format.…”
Section: Image Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…The network structure comprises three components: a pre-processing network resizing the secret image to match the cover image's size, an encoder network combining the secret image and cover image to generate the stego image, and a decoder network facilitating the extraction of the secret image. Rehman et al [22] made improvements on this foundation, but both steganographic networks led to the issue of colour distortion. Zhang et al [23] addressed this by converting the RGB format of the steganography-performed image to YCrYb format.…”
Section: Image Steganographymentioning
confidence: 99%
“…Information-hiding encoder-decoder networks proposed by researchers such as Baluja [15] and Rehman et al [22] typically adopt an independent design for encoder and decoder networks. This approach results in the irreversibility of the secret information encoding and decoding processes, consequently diminishing the success rate of secret information restoration.…”
Section: Chaos Mapping Enhanced Image Steganography Network (Chase)mentioning
confidence: 99%
“…In [78], Rehman et al proposed a CNN based encoderdecoder architecture to hide a secret image in a cover image to form stego image and also to extract the hidden secret embedded in the stego image. The encoder network takes two images (i.e.…”
Section: Appendix Amentioning
confidence: 99%
“…Consider the optimal characters of the disentangled latent code w , these two networks also use w as the input. Our noise optimization network is mainly inspired by PGGAN and ResNet [33][34][35] Two simple designing rules are given to optimize the injecting noise: First, we introduc the progressive mechanism to generate the noise with the same size as the different reso lution image. Second, the disentangled latent code w is indirectly utilized to form th secure noise by shortcut connection.…”
mentioning
confidence: 99%
“…Second, the disentangled latent code w is indirectly utilized to form th secure noise by shortcut connection. The progressive model is formed by three blocks in Our noise optimization network is mainly inspired by PGGAN and ResNet [33][34][35]. Two simple designing rules are given to optimize the injecting noise: First, we introduce the progressive mechanism to generate the noise with the same size as the different resolution image.…”
mentioning
confidence: 99%