Jinjin Liu, Sa Xue, Xinyu Zhang, Fengyuan Xiang, Yuanyuan Ma
{"title":"Steganography Defense Network Based on Simulation of Steganography Information Distribution","authors":"Jinjin Liu, Sa Xue, Xinyu Zhang, Fengyuan Xiang, Yuanyuan Ma","doi":"10.1155/int/9958912","DOIUrl":null,"url":null,"abstract":"<p>In order to block the spread of illegal stego-image and reduce the erasing traces of steganography attacks on images, this paper proposes a steganography attack network based on simulation of steganography information distribution. First, a strategy of simulating steganography noise was adopted, and the distribution of steganography noise was learned by convolutional neural network, and a small amount of noise was added to the position of the secret message accurately to complete the attack on the steganography information, while protecting the image content to the maximum extent. In addition, different image recovery modules are designed in the deep network, such as the shallow feature extraction module, progressive attention recovery module, and detail feature reconstruction module, which collectively leverage hierarchical pixel features to mitigate discrepancies between reconstructed and original images while preserving visual fidelity before and after image attacks. Through two kinds of loss functions, the deep network model continuously optimizes the network performance to achieve the minimum degree of damage to the image content and the maximum degree of recovery of the reconstructed image. Experimental results show that the proposed method is superior to other methods in erasing secret message and restoring image quality.</p>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2025 1","pages":""},"PeriodicalIF":3.7000,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/int/9958912","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Systems","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1155/int/9958912","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
In order to block the spread of illegal stego-image and reduce the erasing traces of steganography attacks on images, this paper proposes a steganography attack network based on simulation of steganography information distribution. First, a strategy of simulating steganography noise was adopted, and the distribution of steganography noise was learned by convolutional neural network, and a small amount of noise was added to the position of the secret message accurately to complete the attack on the steganography information, while protecting the image content to the maximum extent. In addition, different image recovery modules are designed in the deep network, such as the shallow feature extraction module, progressive attention recovery module, and detail feature reconstruction module, which collectively leverage hierarchical pixel features to mitigate discrepancies between reconstructed and original images while preserving visual fidelity before and after image attacks. Through two kinds of loss functions, the deep network model continuously optimizes the network performance to achieve the minimum degree of damage to the image content and the maximum degree of recovery of the reconstructed image. Experimental results show that the proposed method is superior to other methods in erasing secret message and restoring image quality.
期刊介绍:
The International Journal of Intelligent Systems serves as a forum for individuals interested in tapping into the vast theories based on intelligent systems construction. With its peer-reviewed format, the journal explores several fascinating editorials written by today''s experts in the field. Because new developments are being introduced each day, there''s much to be learned — examination, analysis creation, information retrieval, man–computer interactions, and more. The International Journal of Intelligent Systems uses charts and illustrations to demonstrate these ground-breaking issues, and encourages readers to share their thoughts and experiences.