Covert Communication and Image Authentication Algorithm Based on Adversarial Examples

The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial...

Full description

Saved in:
Bibliographic Details
Published inInternational Symposium on Communications and Information Technologies (Online) pp. 199 - 203
Main Authors Wu, Qiwen, Feng, Zijing, Huang, Yingkai, Zhong, Jiehui, Liu, Xiaolong
Format Conference Proceeding
LanguageEnglish
Published IEEE 27.09.2022
Subjects
Online AccessGet full text
ISSN2643-6175
DOI10.1109/ISCIT55906.2022.9931289

Cover

Abstract The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image.
AbstractList The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use of the adversarial examples, rather than just taking it as the defects of neural network, a covert communication method based on adversarial examples is proposed in this paper. Using the characteristics that adversarial examples can carry information, we combine it with specific coding rules to develop a covert communication algorithm. Unlike the traditional steganography, the secret information is not contained in the communication content of the sender and the receiver itself in the proposed scheme. The mapping relationship between adversarial examples and secret information is hidden in the neural network model, so as to realize the hidden transmission of information and improve the concealment and security of communication. At the same time, the tamper identification is embedded in the tensor of adversarial output. When the image is modified during transmission, the tamper identification will also change, so that the image can be authenticated. Experiments show the feasibility of the algorithm and verify that it can completely extract secret information from the encrypted image adversarial example and authenticate the integrity of the image.
Author Zhong, Jiehui
Wu, Qiwen
Huang, Yingkai
Feng, Zijing
Liu, Xiaolong
Author_xml – sequence: 1
  givenname: Qiwen
  surname: Wu
  fullname: Wu, Qiwen
  email: 1211193016@fafu.edn.cn
  organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China
– sequence: 2
  givenname: Zijing
  surname: Feng
  fullname: Feng, Zijing
  email: fzj971012@sina.com
  organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China
– sequence: 3
  givenname: Yingkai
  surname: Huang
  fullname: Huang, Yingkai
  email: 1211193007@fafu.edn.cn
  organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China
– sequence: 4
  givenname: Jiehui
  surname: Zhong
  fullname: Zhong, Jiehui
  email: antelope1004@163.com
  organization: School of Mechanical and Electrical Engineering, Fujian Agriculture and Forestry University,Fuzhou,China
– sequence: 5
  givenname: Xiaolong
  surname: Liu
  fullname: Liu, Xiaolong
  email: xlliu@fafu.edu.cn
  organization: College of Computer and Information Sciences, Fujian Agriculture and Forestry Universit,Fuzhou,China
BookMark eNo1kMtKw0AYhUdRsK19AhfOCyTONTOzjKHVQMGFEdyVycyfdiSXkklF396KdXE4cD74FmeOrvqhB4TuKUkpJeahfC3KSkpDspQRxlJjOGXaXKA5zTIpjJb0_RLNWCZ4klElb9Ayxg9CCKfaGMpm6K0YPmGccDF03bEPzk5h6LHtPS47uwOcH6c99NM_yNvdMIZp3-FHG8Hj38mfBNGOwbZ49WW7QwvxFl03to2wPPcCVetVVTwnm5enssg3SRCaJOCEEyJz3CnXeH6KbxRT2mtec1M7bmzDGikZF6xW2kkOSoM0TqpaCQ98ge7-tAEAtocxdHb83p5P4D8KG1UZ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISCIT55906.2022.9931289
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 166549851X
9781665498517
EISSN 2643-6175
EndPage 203
ExternalDocumentID 9931289
Genre orig-research
GrantInformation_xml – fundername: Fujian agriculture and Forestry University
  grantid: KCX21F31A
  funderid: 10.13039/501100008766
– fundername: Natural Science Foundation of Fujian Province
  grantid: 2021J01123
  funderid: 10.13039/501100003392
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i480-ec4c446c3c7cfd3cfddf7278d83b39bc39af2f552342b78c53e78e59c57b74de3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:14:21 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i480-ec4c446c3c7cfd3cfddf7278d83b39bc39af2f552342b78c53e78e59c57b74de3
PageCount 5
ParticipantIDs ieee_primary_9931289
PublicationCentury 2000
PublicationDate 2022-Sept.-27
PublicationDateYYYYMMDD 2022-09-27
PublicationDate_xml – month: 09
  year: 2022
  text: 2022-Sept.-27
  day: 27
PublicationDecade 2020
PublicationTitle International Symposium on Communications and Information Technologies (Online)
PublicationTitleAbbrev ISCIT
PublicationYear 2022
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0003189912
Score 1.8109738
Snippet The research on the application of adversarial examples mainly focuses on considering adversarial examples as a threat in the past. In order to make better use...
SourceID ieee
SourceType Publisher
StartPage 199
SubjectTerms adversarial examples
Authentication
covert communication
Deep learning
image authentication
Image coding
Neural networks
Receivers
Steganography
Tensors
Title Covert Communication and Image Authentication Algorithm Based on Adversarial Examples
URI https://ieeexplore.ieee.org/document/9931289
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Ak178Acbf6cGjG1vbrd1RCQRMMCZCwo10r50SBQyMxPjX2zcmivHgYUnTZd3SNv3ee_u-9wi5ilGMGUjm6SwIPKGRBMAYeInQ3BowUQSoHe7fx92huBtFowq53mhhrLUF-cz62Cz-5Zs5rDBU1nRY6o7TpEqqUsVrrdYmnuL2pjN1WEnhCoOk2Xts9QbOYA6QicCYXz69VUalQJHOHul_vX9NHnnxV3nqw8ev1Iz__cB90vjW69GHDRIdkIqdHZLdH6kG62TYQq5mTrcEIVTPDO1N3ZFCMVSGxKHyxs3r03wxyZ-n9NbBnKHYhaWblxo3LG2_a8wqvGyQQac9aHW9sqSCNxEq8CwIcP4fcJCQGe4ukzkDRhnFU56kwBOdsSxyzqlgqVQQcSuVjRKIZCqFsfyI1GbzmT0mlOswUaDBOUAgQulGELHinFmuo9AE4Qmp4_yM39ZJM8bl1Jz-3X1GdnCNkIjB5Dmp5YuVvXBon6eXxTJ_AlzXqoo
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG8QD-rFDzB-24NHN7Z-0O2oBAIKxMSRcCPda6dEGQZGYvzrbcdEMR48LGm6dGnapr_33n6_9xC6qlsxpieIIxPPc5i0JABCwAmZpFqB4hysdrjXr7cH7G7IhyV0vdLCaK1z8pl2bTP_l6-msLChsprBUnOdhhtokzPG-FKttYqomNNpjB1SkLh8L6x1HhudyJjMnuUiEOIW49cKqeQ40tpFva8ZLOkjL-4ii134-JWc8b9T3EPVb8Ueflhh0T4q6fQA7fxINlhBg4Zla2Z4TRKCZapwZ2IuFWyDZZY6VLy4eX2azsbZ8wTfGqBT2HbZ4s1zaY8sbr5Lm1d4XkVRqxk12k5RVMEZs8BzNDAwHiBQEJAoah6VGBMmUAGNaRgDDWVCEm7cU0ZiEQCnWgSah8BFLJjS9BCV02mqjxCm0g8DkGBcIGC-MF9g9YBSoqnkvvL8Y1Sx6zN6W6bNGBVLc_J39yXaake97qjb6d-fom27X5aWQcQZKmezhT432J_FF_mWfwJ49q3X
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=International+Symposium+on+Communications+and+Information+Technologies+%28Online%29&rft.atitle=Covert+Communication+and+Image+Authentication+Algorithm+Based+on+Adversarial+Examples&rft.au=Wu%2C+Qiwen&rft.au=Feng%2C+Zijing&rft.au=Huang%2C+Yingkai&rft.au=Zhong%2C+Jiehui&rft.date=2022-09-27&rft.pub=IEEE&rft.eissn=2643-6175&rft.spage=199&rft.epage=203&rft_id=info:doi/10.1109%2FISCIT55906.2022.9931289&rft.externalDocID=9931289