General Steganography for Neural Network Models Based on Graph Convolutional Network

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Yunlong Hao;Zichi Wang;Jiaming Cao;Xinpeng Zhang
{"title":"General Steganography for Neural Network Models Based on Graph Convolutional Network","authors":"Yunlong Hao;Zichi Wang;Jiaming Cao;Xinpeng Zhang","doi":"10.1109/JIOT.2024.3520994","DOIUrl":null,"url":null,"abstract":"In this article, our idea is to propose a general steganographic framework for neural network models, embedding secret data during the network training process to obtain a stego network for covert communication. A novelty of this method is that it can be applied to various types of neural networks, such as neural networks that perform image classification, image segmentation, image generation, and language generation tasks. Additionally, our method enables data embedding in different layers of neural networks, including linear layers, convolutional layers, and transpose convolutional layers. In cover networks, the hidden layer is transformed into a graph structure to facilitate data embedding using graph convolutional networks (GCNs). Another novelty is that the parameters of the GCN can be randomly initialized or directly specified. The connectivity of the graph structure is predetermined collaboratively by the sender and receiver, eliminating the need to transmit the GCN parameters and graph connectivity. Using our framework, embedding and extraction of secret data can be successfully applied to different layers of the stego network. Experimental results demonstrate that the proposed method offers higher security at the same capacity and exhibits sufficient robustness. To enhance understanding of our work, we have uploaded a set of application instances embedding abstract content to <uri>https://github.com/timedeadline/ApplicationInstance</uri>.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 9","pages":"12512-12526"},"PeriodicalIF":8.9000,"publicationDate":"2024-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10811974/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

In this article, our idea is to propose a general steganographic framework for neural network models, embedding secret data during the network training process to obtain a stego network for covert communication. A novelty of this method is that it can be applied to various types of neural networks, such as neural networks that perform image classification, image segmentation, image generation, and language generation tasks. Additionally, our method enables data embedding in different layers of neural networks, including linear layers, convolutional layers, and transpose convolutional layers. In cover networks, the hidden layer is transformed into a graph structure to facilitate data embedding using graph convolutional networks (GCNs). Another novelty is that the parameters of the GCN can be randomly initialized or directly specified. The connectivity of the graph structure is predetermined collaboratively by the sender and receiver, eliminating the need to transmit the GCN parameters and graph connectivity. Using our framework, embedding and extraction of secret data can be successfully applied to different layers of the stego network. Experimental results demonstrate that the proposed method offers higher security at the same capacity and exhibits sufficient robustness. To enhance understanding of our work, we have uploaded a set of application instances embedding abstract content to https://github.com/timedeadline/ApplicationInstance.
基于图卷积网络的神经网络模型通用隐写
在本文中,我们的想法是为神经网络模型提出一个通用的隐写框架,在网络训练过程中嵌入秘密数据,以获得用于秘密通信的隐写网络。这种方法的新颖之处在于它可以应用于各种类型的神经网络,例如执行图像分类、图像分割、图像生成和语言生成任务的神经网络。此外,我们的方法可以在不同的神经网络层中嵌入数据,包括线性层、卷积层和转置卷积层。在覆盖网络中,隐藏层被转换成图形结构,便于使用图卷积网络(GCNs)进行数据嵌入。另一个新颖之处是GCN的参数可以随机初始化或直接指定。图结构的连通性由发送方和接收方共同确定,无需传输GCN参数和图的连通性。利用我们的框架,秘密数据的嵌入和提取可以成功地应用于隐去网络的不同层。实验结果表明,该方法在相同容量下具有较高的安全性,并具有足够的鲁棒性。为了更好地理解我们的工作,我们上传了一组嵌入抽象内容的应用程序实例到https://github.com/timedeadline/ApplicationInstance。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信