Abstract
Neural networks have been applied in various fields, including steganography (called neural network steganography). The network used for secret data extraction is called the extractor. This paper proposes a neural network steganography scheme using extractor matching. In our scheme, the extractor is a publicly available normal network possessed by the receiver, which is used for conventional intelligent tasks. Sender connects extractor to another neural network (called cover network), and then trains the connected network to guarantee correctly data extraction without decreasing the performance of the original task of cover network. During the process of training, the parameters of extractor remain unchanged. Specifically, these network parameters are obtained using an extraction key. The receiver can correctly extract secret data with the help of correct extraction key, while an incorrect key will fail to extract secret data. The feasibility of our scheme is demonstrated in experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Elhaki, O., Shojaei, K.: Neural network-based target tracking control of underactuated autonomous underwater vehicles with a prescribed performance. Ocean Eng. 167(NOV.1), 239–256 (2018)
He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770–778 (2016)
Chowdhary, K.R.: Natural language processing. In: Chowdhary, K.R. (ed.) Fundamentals of Artificial Intelligence, pp. 603–649. Springer, New York (2020). https://doi.org/10.1007/978-81-322-3972-7_19
Devi A.G., Thota A., Nithya G., Majji S., Gopatoti A., Dhavamani L.: Advancement of digital image steganography using deep convolutional neural networks. In: 2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC), Bengaluru, India, pp. 250–254 (2022)
Wu, H., Liu, G., Yao, Y., Zhang, X.: Watermarking neural networks with watermarked images. IEEE Trans. 31(7), 2591–2601 (2021)
Adi Y., Baum C., Cisse M., Pinkas B., Keshet J.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium. pp. 1615–1631. {USENIX} Association, Baltimore (2018)
Wang, Z., Feng, G., Wu, H., Zhang, X.: Data hiding in neural networks for multiple receivers. IEEE Comput. Intell. Mag. 16(4), 70–84 (2021)
Yang, Z., Wang, Z., Zhang, X.: A general steganographic framework for neural network models. Inf. Sci. 643, 119250 (2023)
Yang Z., Wang Z., Zhang X., Tang Z.: Multi-source data hiding in neural networks. In: 2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP), Shanghai, China, pp. 1–6 (2022)
He K., Zhang X., Ren S., Sun J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, pp. 770–778 (2016)
Krizhevsky A., Sutskever I., Hinton G.: ImageNet classification with deep convolutional neural networks. Neural Information Processing Systems (NeurIPS), vol. 25, no. 2, pp. 84–90 (2012)
Uchida Y., Nagai Y., Sakazawa S., Satoh S.: Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM International Conference on Multimedia Retrieval, pp. 269–277 (2017)
Kingma D.P., Ba, L.J.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR), Ithaca, NY. ArXiv, San Diego (2015)
Acknowledgment
This work was supported in part by the Natural Science Foundation of China under Grants 62376148 and 62002214, and supported in part by the Chenguang Program of Shanghai Education Development Foundation and Shanghai Municipal Education Commission under Grant 22CGA46.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xie, Y., Wang, Z. (2024). Neural Network Steganography Using Extractor Matching. In: Ma, B., Li, J., Li, Q. (eds) Digital Forensics and Watermarking. IWDW 2023. Lecture Notes in Computer Science, vol 14511. Springer, Singapore. https://doi.org/10.1007/978-981-97-2585-4_12
Download citation
DOI: https://doi.org/10.1007/978-981-97-2585-4_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-2584-7
Online ISBN: 978-981-97-2585-4
eBook Packages: Computer ScienceComputer Science (R0)