Javascript must be enabled to continue!
Generative Image Steganography Based on Point Cloud
View through CrossRef
Abstract
In deep steganography, the model size is usually related to the underlying mesh resolution, and a separate neural network needs to be trained as a message extractor. In this paper, we propose a generative image steganography based on point cloud representation, which represents image data as a point cloud, learns the distribution of the point cloud data, and represents it in the form of a continuous function. This method breaks through the limitation of the image resolution, and can generate images with arbitrary resolution according to the actual need, and omits the need for explicit data for image steganography. At the same time, using a fixed point cloud extractor transfers the training of the network to the point cloud data, which saves the training time and avoids the risk of exposing the steganography behavior caused by the transmission of the message extractor. Experiments prove that the steganographic images generated by the scheme have very high image quality and the accuracy of message extraction reaches more than 99%.
Title: Generative Image Steganography Based on Point Cloud
Description:
Abstract
In deep steganography, the model size is usually related to the underlying mesh resolution, and a separate neural network needs to be trained as a message extractor.
In this paper, we propose a generative image steganography based on point cloud representation, which represents image data as a point cloud, learns the distribution of the point cloud data, and represents it in the form of a continuous function.
This method breaks through the limitation of the image resolution, and can generate images with arbitrary resolution according to the actual need, and omits the need for explicit data for image steganography.
At the same time, using a fixed point cloud extractor transfers the training of the network to the point cloud data, which saves the training time and avoids the risk of exposing the steganography behavior caused by the transmission of the message extractor.
Experiments prove that the steganographic images generated by the scheme have very high image quality and the accuracy of message extraction reaches more than 99%.
Related Results
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
MSG-Point-GAN: Multi-Scale Gradient Point GAN for Point Cloud Generation
MSG-Point-GAN: Multi-Scale Gradient Point GAN for Point Cloud Generation
The generative adversarial network (GAN) has recently emerged as a promising generative model. Its application in the image field has been extensive, but there has been little rese...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
Hybrid Cloud Scheduling Method for Cloud Bursting
Hybrid Cloud Scheduling Method for Cloud Bursting
In the paper, we consider the hybrid cloud model used for cloud bursting, when the computational capacity of the private cloud provider is insufficient to deal with the peak number...
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The...
Analysis review on feature-based and word-rule based techniques in text steganography
Analysis review on feature-based and word-rule based techniques in text steganography
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation ...
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Leveraging Artificial Intelligence for smart cloud migration, reducing cost and enhancing efficiency
Cloud computing has become a critical component of modern IT infrastructure, offering businesses scalability, flexibility, and cost efficiency. Unoptimized cloud migration strategi...

