{"title":"General Steganography for Neural Network Models Based on Graph Convolutional Network","authors":"Yunlong Hao;Zichi Wang;Jiaming Cao;Xinpeng Zhang","doi":"10.1109/JIOT.2024.3520994","DOIUrl":null,"url":null,"abstract":"In this article, our idea is to propose a general steganographic framework for neural network models, embedding secret data during the network training process to obtain a stego network for covert communication. A novelty of this method is that it can be applied to various types of neural networks, such as neural networks that perform image classification, image segmentation, image generation, and language generation tasks. Additionally, our method enables data embedding in different layers of neural networks, including linear layers, convolutional layers, and transpose convolutional layers. In cover networks, the hidden layer is transformed into a graph structure to facilitate data embedding using graph convolutional networks (GCNs). Another novelty is that the parameters of the GCN can be randomly initialized or directly specified. The connectivity of the graph structure is predetermined collaboratively by the sender and receiver, eliminating the need to transmit the GCN parameters and graph connectivity. Using our framework, embedding and extraction of secret data can be successfully applied to different layers of the stego network. Experimental results demonstrate that the proposed method offers higher security at the same capacity and exhibits sufficient robustness. To enhance understanding of our work, we have uploaded a set of application instances embedding abstract content to <uri>https://github.com/timedeadline/ApplicationInstance</uri>.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 9","pages":"12512-12526"},"PeriodicalIF":8.9000,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10811974/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In this article, our idea is to propose a general steganographic framework for neural network models, embedding secret data during the network training process to obtain a stego network for covert communication. A novelty of this method is that it can be applied to various types of neural networks, such as neural networks that perform image classification, image segmentation, image generation, and language generation tasks. Additionally, our method enables data embedding in different layers of neural networks, including linear layers, convolutional layers, and transpose convolutional layers. In cover networks, the hidden layer is transformed into a graph structure to facilitate data embedding using graph convolutional networks (GCNs). Another novelty is that the parameters of the GCN can be randomly initialized or directly specified. The connectivity of the graph structure is predetermined collaboratively by the sender and receiver, eliminating the need to transmit the GCN parameters and graph connectivity. Using our framework, embedding and extraction of secret data can be successfully applied to different layers of the stego network. Experimental results demonstrate that the proposed method offers higher security at the same capacity and exhibits sufficient robustness. To enhance understanding of our work, we have uploaded a set of application instances embedding abstract content to https://github.com/timedeadline/ApplicationInstance.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.