Dhu-Net: High-Capacity Binary Data Hiding Network Based on Improved U-Net
作者:
Xintao Duan,Chun Li,Bingxin Wei,Guoming Wu,Chuan Qin,Nam Haewoon
DOI:10.2139/ssrn.4495226
A Steganography Model Data Protection Method Based on Scrambling Encryption
期刊:
Computers, Materials & Continua
2022
作者:
Xintao Duan,Zhiqiang Shao,Wenxin Wang,En Zhang,Dongli Yue,Chuan Qin,Haewoon Nam
DOI:10.32604/cmc.2022.027807
Image Steganography with Deep Learning Networks
期刊:
2022 13th International Conference on Information and Communication Technology Convergence (ICTC)
2022
作者:
Bingxin Wei,Xintao Duan,Haewoon Nam
DOI:10.1109/ictc55196.2022.9952432
High-Capacity Information Hiding Based on Residual Network
期刊:
IETE Technical Review
2020
作者:
Xintao Duan,Baoxia Li,Zimei Xie,Dongli Yue,Yuanyuan Ma
DOI:10.1080/02564602.2020.1808097
High-Capacity Image Steganography Based on Improved Xception
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this problem. The Xception architecture is used for image steganography for the first time, which not only increases the width of the network, but also improves the adaptability of network expansion, and adds different receiving fields to carry out multi-scale information in it. By introducing jump connections, we solved the problems of gradient dissipation and gradient descent in the Xception architecture. After cascading the secret image and the mask image, high-quality images can be reconstructed through the network, which greatly improves the speed of steganography. When hiding, only the secret image and the cover image are cascaded, and then the secret image can be embedded in the cover image through the hidden network in order to obtain the secret image. After extraction, the secret image can be reconstructed by bypassing the secret image through the extraction network. The results show that the results that are obtained by our model have high peak signal-to-noise ratio (PSNR) and structural similarity (SSIM), and the average high load capacity is 23.96 bpp (bit per pixel), thus realizing large-capacity image steganography surgery.
期刊:
Sensors
2020
作者:
Xintao Duan,Mengxiao Gou,Nao Liu,Wenxin Wang,Chuan Qin
DOI:10.3390/s20247253
A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System
Aiming at the problems of small key space, low security of encryption structure, and easy to crack existing image encryption algorithms combining chaotic system and DNA sequence, this paper proposes an image encryption algorithm based on a hidden attractor chaotic system and shuffling algorithm. Firstly, the chaotic sequence generated by the hidden attractor chaotic system is used to encrypt the image. The shuffling algorithm is used to scramble the image, and finally, the DNA sequence operation is used to diffuse the pixel value of the image. Experimental results show that the key space of the scheme reaches 2327 and is very sensitive to keys. The histogram of encrypted images is evenly distributed. The correlation coefficient of adjacent pixels is close to 0. The entropy values of encrypted images are all close to eight and the unified average change intensity (UACI) value and number of pixel changing rate (NPCR) value are close to ideal values. All-white and all-black image experiments meet the requirements. Experimental results show that the encryption scheme in this paper can effectively resist exhaustive attacks, statistical attacks, differential cryptanalysis, known plaintext and selected plaintext attacks, and noise attacks. The above research results show that the system has better encryption performance, and the proposed scheme is useful and practical in communication and can be applied to the field of image encryption.
期刊:
Entropy
2020
作者:
Xin Jin,Xintao Duan,Hang Jin,Yuanyuan Ma
DOI:10.3390/e22060640
SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper, a new Steganography Convolution Neural Network (SteganoCNN) model is proposed, which solves the problem of two images embedded in a carrier image and can effectively reconstruct two secret images. SteganoCNN has two modules, an encoding network, and a decoding network, whereas the decoding network includes two extraction networks. First, the entire network is trained end-to-end, the encoding network automatically embeds the secret image into the carrier image, and the decoding network is used to reconstruct two different secret images. The experimental results show that the proposed steganography scheme has a maximum image payload capacity of 47.92 bits per pixel, and at the same time, it can effectively avoid the detection of steganalysis tools while keeping the stego-image undistorted. Meanwhile, StegaoCNN has good generalization capabilities and can realize the steganography of different data types, such as remote sensing images and aerial images.
期刊:
Entropy
2020
作者:
Xintao Duan,Nao Liu,Mengxiao Gou,Wenxin Wang,Chuan Qin
DOI:10.3390/e22101140
Image Information Hiding Method Based on Image Compression
and Deep Neural Network
期刊:
Computer Modeling in Engineering & Sciences
2020
作者:
Xintao Duan,Daidou Guo,Chuan Qin
DOI:10.32604/cmes.2020.09463
A coverless steganography method based on generative adversarial network
期刊:
EURASIP Journal on Image and Video Processing
2020
作者:
Xintao Duan,Baoxia Li,Daidou Guo,Zhen Zhang,Yuanyuan Ma
DOI:10.1186/s13640-020-00506-6
Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation
期刊:
IEEE Access
2019
作者:
Chuan Qin,Yecen Hu,Heng Yao,Xintao Duan,Liping Gao
DOI:10.1109/access.2019.2908029
Cliques-based Data Smoothing Approach for Solving Data Sparsity in Collaborative Filtering
期刊:
TELKOMNIKA Indonesian Journal of Electrical Engineering
2014
作者:
Yujie Yang,Zhijun Zhang,Xintao Duan
DOI:10.11591/telkomnika.v12i8.4617
Detection of Composite Images Based on Single Channel Blind Signal Separation
期刊:
Information Technology Journal
2014
作者:
Wei Wang,Feng Zeng,Xintao Duan,Hongjun Li
DOI:10.3923/itj.2014.1341.1345
Binary Artificial Bee Colony optimization using bitwise operation
期刊:
Computers & Industrial Engineering
2014
作者:
Dongli Jia,Xintao Duan,Muhammad Khurram Khan
DOI:10.1016/j.cie.2014.08.016
Modified artificial bee colony optimization with block perturbation strategy
期刊:
Engineering Optimization
2014
作者:
Dongli Jia,Xintao Duan,Muhammad Khurram Khan
DOI:10.1080/0305215x.2014.914189
Hyperlipidemia in Male Aircrew Members of Civil Aviation and Analysis of Influence Factors
期刊:
2009 3rd International Conference on Bioinformatics and Biomedical Engineering
2009
作者:
Weiru Chen,Yingjin Feng,Bo Yang,Tao Zhang,Xintao Peng,Jun Zhang,Wenjing Zhao,Shiying Duan,Fen Liu
DOI:10.1109/icbbe.2009.5162911