Digital Cardan Grille: A Modern Approach for Information Hiding

03/25/2018
by   Jia Liu, et al.
0

In this paper, a new framework for construction of Cardan grille for information hiding is proposed. Based on the semantic image inpainting technique, the stego image are driven by secret messages directly. A mask called Digital Cardan Grille (DCG) for determining the hidden location is introduced to hide the message. The message is written to the corrupted region that needs to be filled in the corrupted image in advance. Then the corrupted image with secret message is feeded into a Generative Adversarial Network (GAN) for semantic completion. The adversarial game not only reconstruct the corrupted image , but also generate a stego image which contains the logic rationality of image content. The experimental results verify the feasibility of the proposed method.

READ FULL TEXT

page 4

page 8

page 9

page 10

page 11

page 12

research
04/18/2018

The Reincarnation of Grille Cipher: A Generative Approach

In order to keep the data secret, various techniques have been implement...
research
03/16/2017

Steganographic Generative Adversarial Networks

Steganography is collection of methods to hide secret information ("payl...
research
01/31/2018

Synchronization Detection and Recovery of Steganographic Messages with Adversarial Learning

As a means for secret communication, steganography aims at concealing a ...
research
05/28/2019

EncryptGAN: Image Steganography with Domain Transform

We propose an image steganographic algorithm called EncryptGAN, which di...
research
12/25/2018

Usage of analytic hierarchy process for steganographic inserts detection in images

This article presents the method of steganography detection, which is fo...
research
02/24/2023

RGI: robust GAN-inversion for mask-free image inpainting and unsupervised pixel-wise anomaly detection

Generative adversarial networks (GANs), trained on a large-scale image d...
research
04/26/2018

Generative Steganography by Sampling

In this paper, a new data-driven information hiding scheme called genera...

Please sign up or login with your details

Forgot password? Click here to reset