Skip to main content

Neural Network Steganography Using Extractor Matching

  • Conference paper
  • First Online:
Digital Forensics and Watermarking (IWDW 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14511))

Included in the following conference series:

  • 85 Accesses

Abstract

Neural networks have been applied in various fields, including steganography (called neural network steganography). The network used for secret data extraction is called the extractor. This paper proposes a neural network steganography scheme using extractor matching. In our scheme, the extractor is a publicly available normal network possessed by the receiver, which is used for conventional intelligent tasks. Sender connects extractor to another neural network (called cover network), and then trains the connected network to guarantee correctly data extraction without decreasing the performance of the original task of cover network. During the process of training, the parameters of extractor remain unchanged. Specifically, these network parameters are obtained using an extraction key. The receiver can correctly extract secret data with the help of correct extraction key, while an incorrect key will fail to extract secret data. The feasibility of our scheme is demonstrated in experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Elhaki, O., Shojaei, K.: Neural network-based target tracking control of underactuated autonomous underwater vehicles with a prescribed performance. Ocean Eng. 167(NOV.1), 239–256 (2018)

    Article  Google Scholar 

  2. He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)

    Google Scholar 

  3. Chowdhary, K.R.: Natural language processing. In: Chowdhary, K.R. (ed.) Fundamentals of Artificial Intelligence, pp. 603–649. Springer, New York (2020). https://doi.org/10.1007/978-81-322-3972-7_19

    Chapter  Google Scholar 

  4. Devi A.G., Thota A., Nithya G., Majji S., Gopatoti A., Dhavamani L.: Advancement of digital image steganography using deep convolutional neural networks. In: 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, pp. 250–254 (2022)

    Google Scholar 

  5. Wu, H., Liu, G., Yao, Y., Zhang, X.: Watermarking neural networks with watermarked images. IEEE Trans. 31(7), 2591–2601 (2021)

    Google Scholar 

  6. Adi Y., Baum C., Cisse M., Pinkas B., Keshet J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium. pp. 1615–1631. {USENIX} Association, Baltimore (2018)

    Google Scholar 

  7. Wang, Z., Feng, G., Wu, H., Zhang, X.: Data hiding in neural networks for multiple receivers. IEEE Comput. Intell. Mag. 16(4), 70–84 (2021)

    Article  Google Scholar 

  8. Yang, Z., Wang, Z., Zhang, X.: A general steganographic framework for neural network models. Inf. Sci. 643, 119250 (2023)

    Article  Google Scholar 

  9. Yang Z., Wang Z., Zhang X., Tang Z.: Multi-source data hiding in neural networks. In: 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), Shanghai, China, pp. 1–6 (2022)

    Google Scholar 

  10. He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp. 770–778 (2016)

    Google Scholar 

  11. Krizhevsky A., Sutskever I., Hinton G.: ImageNet classification with deep convolutional neural networks. Neural Information Processing Systems (NeurIPS), vol. 25, no. 2, pp. 84–90 (2012)

    Google Scholar 

  12. Uchida Y., Nagai Y., Sakazawa S., Satoh S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM International Conference on Multimedia Retrieval, pp. 269–277 (2017)

    Google Scholar 

  13. Kingma D.P., Ba, L.J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR), Ithaca, NY. ArXiv, San Diego (2015)

    Google Scholar 

Download references

Acknowledgment

This work was supported in part by the Natural Science Foundation of China under Grants 62376148 and 62002214, and supported in part by the Chenguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission under Grant 22CGA46.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zichi Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, Y., Wang, Z. (2024). Neural Network Steganography Using Extractor Matching. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2585-4_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2584-7

  • Online ISBN: 978-981-97-2585-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics