Covert Communication and Image Authentication Algorithm Based on Adversarial Examples
The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial...
Saved in:
| Published in | International Symposium on Communications and Information Technologies (Online) pp. 199 - 203 |
|---|---|
| Main Authors | , , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
27.09.2022
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2643-6175 |
| DOI | 10.1109/ISCIT55906.2022.9931289 |
Cover
| Abstract | The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image. |
|---|---|
| AbstractList | The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image. |
| Author | Zhong, Jiehui Wu, Qiwen Huang, Yingkai Feng, Zijing Liu, Xiaolong |
| Author_xml | – sequence: 1 givenname: Qiwen surname: Wu fullname: Wu, Qiwen email: 1211193016@fafu.edn.cn organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China – sequence: 2 givenname: Zijing surname: Feng fullname: Feng, Zijing email: fzj971012@sina.com organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China – sequence: 3 givenname: Yingkai surname: Huang fullname: Huang, Yingkai email: 1211193007@fafu.edn.cn organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China – sequence: 4 givenname: Jiehui surname: Zhong fullname: Zhong, Jiehui email: antelope1004@163.com organization: School of Mechanical and Electrical Engineering, Fujian Agriculture and Forestry University,Fuzhou,China – sequence: 5 givenname: Xiaolong surname: Liu fullname: Liu, Xiaolong email: xlliu@fafu.edu.cn organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China |
| BookMark | eNo1kMtKw0AYhUdRsK19AhfOCyTONTOzjKHVQMGFEdyVycyfdiSXkklF396KdXE4cD74FmeOrvqhB4TuKUkpJeahfC3KSkpDspQRxlJjOGXaXKA5zTIpjJb0_RLNWCZ4klElb9Ayxg9CCKfaGMpm6K0YPmGccDF03bEPzk5h6LHtPS47uwOcH6c99NM_yNvdMIZp3-FHG8Hj38mfBNGOwbZ49WW7QwvxFl03to2wPPcCVetVVTwnm5enssg3SRCaJOCEEyJz3CnXeH6KbxRT2mtec1M7bmzDGikZF6xW2kkOSoM0TqpaCQ98ge7-tAEAtocxdHb83p5P4D8KG1UZ |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ISCIT55906.2022.9931289 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 166549851X 9781665498517 |
| EISSN | 2643-6175 |
| EndPage | 203 |
| ExternalDocumentID | 9931289 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Fujian agriculture and Forestry University grantid: KCX21F31A funderid: 10.13039/501100008766 – fundername: Natural Science Foundation of Fujian Province grantid: 2021J01123 funderid: 10.13039/501100003392 |
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i480-ec4c446c3c7cfd3cfddf7278d83b39bc39af2f552342b78c53e78e59c57b74de3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:14:21 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i480-ec4c446c3c7cfd3cfddf7278d83b39bc39af2f552342b78c53e78e59c57b74de3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_9931289 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-Sept.-27 |
| PublicationDateYYYYMMDD | 2022-09-27 |
| PublicationDate_xml | – month: 09 year: 2022 text: 2022-Sept.-27 day: 27 |
| PublicationDecade | 2020 |
| PublicationTitle | International Symposium on Communications and Information Technologies (Online) |
| PublicationTitleAbbrev | ISCIT |
| PublicationYear | 2022 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0003189912 |
| Score | 1.8109738 |
| Snippet | The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 199 |
| SubjectTerms | adversarial examples Authentication covert communication Deep learning image authentication Image coding Neural networks Receivers Steganography Tensors |
| Title | Covert Communication and Image Authentication Algorithm Based on Adversarial Examples |
| URI | https://ieeexplore.ieee.org/document/9931289 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Ak178Acbf6cGjG1vbrd1RCQRMMCZCwo10r50SBQyMxPjX2zcmivHgYUnTZd3SNv3ee_u-9wi5ilGMGUjm6SwIPKGRBMAYeInQ3BowUQSoHe7fx92huBtFowq53mhhrLUF-cz62Cz-5Zs5rDBU1nRY6o7TpEqqUsVrrdYmnuL2pjN1WEnhCoOk2Xts9QbOYA6QicCYXz69VUalQJHOHul_vX9NHnnxV3nqw8ev1Iz__cB90vjW69GHDRIdkIqdHZLdH6kG62TYQq5mTrcEIVTPDO1N3ZFCMVSGxKHyxs3r03wxyZ-n9NbBnKHYhaWblxo3LG2_a8wqvGyQQac9aHW9sqSCNxEq8CwIcP4fcJCQGe4ukzkDRhnFU56kwBOdsSxyzqlgqVQQcSuVjRKIZCqFsfyI1GbzmT0mlOswUaDBOUAgQulGELHinFmuo9AE4Qmp4_yM39ZJM8bl1Jz-3X1GdnCNkIjB5Dmp5YuVvXBon6eXxTJ_AlzXqoo |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG8QD-rFDzB-24NHN7Z-0O2oBAIKxMSRcCPda6dEGQZGYvzrbcdEMR48LGm6dGnapr_33n6_9xC6qlsxpieIIxPPc5i0JABCwAmZpFqB4hysdrjXr7cH7G7IhyV0vdLCaK1z8pl2bTP_l6-msLChsprBUnOdhhtokzPG-FKttYqomNNpjB1SkLh8L6x1HhudyJjMnuUiEOIW49cKqeQ40tpFva8ZLOkjL-4ii134-JWc8b9T3EPVb8Ueflhh0T4q6fQA7fxINlhBg4Zla2Z4TRKCZapwZ2IuFWyDZZY6VLy4eX2azsbZ8wTfGqBT2HbZ4s1zaY8sbr5Lm1d4XkVRqxk12k5RVMEZs8BzNDAwHiBQEJAoah6VGBMmUAGNaRgDDWVCEm7cU0ZiEQCnWgSah8BFLJjS9BCV02mqjxCm0g8DkGBcIGC-MF9g9YBSoqnkvvL8Y1Sx6zN6W6bNGBVLc_J39yXaake97qjb6d-fom27X5aWQcQZKmezhT432J_FF_mWfwJ49q3X |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=International+Symposium+on+Communications+and+Information+Technologies+%28Online%29&rft.atitle=Covert+Communication+and+Image+Authentication+Algorithm+Based+on+Adversarial+Examples&rft.au=Wu%2C+Qiwen&rft.au=Feng%2C+Zijing&rft.au=Huang%2C+Yingkai&rft.au=Zhong%2C+Jiehui&rft.date=2022-09-27&rft.pub=IEEE&rft.eissn=2643-6175&rft.spage=199&rft.epage=203&rft_id=info:doi/10.1109%2FISCIT55906.2022.9931289&rft.externalDocID=9931289 |