HiDDeN: Hiding Data With Deep Networks

07/26/2018
by   Jiren Zhu, et al.
0

Recent work has shown that deep neural networks are highly sensitive to tiny perturbations of input images, giving rise to adversarial examples. Though this property is usually considered a weakness of learned models, we explore whether it can be beneficial. We find that neural networks can learn to use invisible perturbations to encode a rich amount of useful information. In fact, one can exploit this capability for the task of data hiding. We jointly train encoder and decoder networks, where given an input message and cover image, the encoder produces a visually indistinguishable encoded image, from which the decoder can recover the original message. We show that these encodings are competitive with existing data hiding algorithms, and further that they can be made robust to noise: our models learn to reconstruct hidden information in an encoded image despite the presence of Gaussian blurring, pixel-wise dropout, cropping, and JPEG compression. Even though JPEG is non-differentiable, we show that a robust model can be trained using differentiable approximations. Finally, we demonstrate that adversarial training improves the visual quality of encoded images.

READ FULL TEXT

page 6

page 10

page 11

page 12

page 19

page 20

page 21

page 22

research
01/12/2018

A3T: Adversarially Augmented Adversarial Training

Recent research showed that deep neural networks are highly sensitive to...
research
05/24/2020

Robust Spatial-spread Deep Neural Image Watermarking

Watermarking is an operation of embedding an information into an image i...
research
10/25/2021

GANash – A GAN approach to steganography

Data security is of the utmost concern of a communication system. Since ...
research
01/09/2020

Shallow Encoder Deep Decoder (SEDD) Networks for Image Encryption and Decryption

This paper explores a new framework for lossy image encryption and decry...
research
06/22/2022

LECA: A Learned Approach for Efficient Cover-agnostic Watermarking

In this work, we present an efficient multi-bit deep image watermarking ...
research
09/07/2020

Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding

Recent advances in natural language generation have introduced powerful ...
research
10/27/2021

From Image to Imuge: Immunized Image Generation

We introduce Imuge, an image tamper resilient generative scheme for imag...

Please sign up or login with your details

Forgot password? Click here to reset