Qiwen Wu, Zijing Feng, Yingkai Huang, Jiehui Zhong, Xiaolong Liu
{"title":"Covert Communication and Image Authentication Algorithm Based on Adversarial Examples","authors":"Qiwen Wu, Zijing Feng, Yingkai Huang, Jiehui Zhong, Xiaolong Liu","doi":"10.1109/ISCIT55906.2022.9931289","DOIUrl":null,"url":null,"abstract":"The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image.","PeriodicalId":325919,"journal":{"name":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 21st International Symposium on Communications and Information Technologies (ISCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCIT55906.2022.9931289","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image.