Steganography for Neural Radiance Fields by Backdooring

09/19/2023
by   Weina Dong, et al.
0

The utilization of implicit representation for visual data (such as images, videos, and 3D models) has recently gained significant attention in computer vision research. In this letter, we propose a novel model steganography scheme with implicit neural representation. The message sender leverages Neural Radiance Fields (NeRF) and its viewpoint synthesis capabilities by introducing a viewpoint as a key. The NeRF model generates a secret viewpoint image, which serves as a backdoor. Subsequently, we train a message extractor using overfitting to establish a one-to-one mapping between the secret message and the secret viewpoint image. The sender delivers the trained NeRF model and the message extractor to the receiver over the open channel, and the receiver utilizes the key shared by both parties to obtain the rendered image in the secret view from the NeRF model, and then obtains the secret message through the message extractor. The inherent complexity of the viewpoint information prevents attackers from stealing the secret message accurately. Experimental results demonstrate that the message extractor trained in this letter achieves high-capacity steganography with fast performance, achieving a 100% accuracy in message extraction. Furthermore, the extensive viewpoint key space of NeRF ensures the security of the steganography scheme.

READ FULL TEXT

page 1

page 2

page 5

research
03/13/2022

Secret-to-Image Reversible Transformation for Generative Steganography

Recently, generative steganography that transforms secret information to...
research
09/18/2023

Securing Fixed Neural Network Steganography

Image steganography is the art of concealing secret information in image...
research
09/21/2023

MarkNerf:Watermarking for Neural Radiance Field

A watermarking algorithm is proposed in this paper to address the copyri...
research
05/25/2022

Deniable Steganography

Steganography conceals the secret message into the cover media, generati...
research
04/05/2018

Composable, Unconditionally Secure Message Authentication without any Secret Key

We consider a setup in which the channel from Alice to Bob is less noisy...
research
04/20/2021

Perceptual Loss for Robust Unsupervised Homography Estimation

Homography estimation is often an indispensable step in many computer vi...
research
04/07/2021

Shared-Dining: Broadcasting Secret Shares using Dining-Cryptographers Groups

A k-anonymous broadcast can be implemented using a small group of dining...

Please sign up or login with your details

Forgot password? Click here to reset