IEEE Computational Intelligence Magazine - November 2021 - 71
data during training by prespecified predictions.
By employing crossed techniques,
data hiding can also be achieved.
The authors in [12] used a backdooring
technique to train a model that deliberately
outputs specific data with a trigger.
The specific data have no noticeable
impact on the primary task for which
the model is designed. In [13], a zero-bit
watermarking algorithm was designed
for neural networks using a frontier
stitching algorithm based on adversarial
perturbations. Wu et al. in [14] proposed
a digital watermarking framework for
deep neural networks in which the
trained neural network can accomplish
the original task while embedding a
watermark into the outputted images.
Recently, the authors in [15] proposed a
digital watermarking technique to prove
the ownership of the deep models using
selective weights for watermarking.
However, the abovementioned methods
are not designed for multiple receivers.
In some situations [16], e.g., command
delivery, a commander (the sender) plans
to transmit different instructions (secret
data) to multiple officers (the receivers).
For the consideration of security and efficiency,
the media carrying secret data
should be sent only once. In this case,
multiple instructions should be embedded
into the same media and sent to officers
(multiple channels). Therefore, a data
hiding scheme for multiple receivers is
Except for the intelligent tasks, these network models can
be used for data hiding which aims to transmit additional
data via digital media without causing serious distortion
on the cover media.
desirable. Moreover, these data hiding
methods for deep learning are based on
CNNs. Recently, a new network architecture
called CapsNets (capsule networks)
was developed [8]. The rudiments
of CapsNets were proposed in 2011 [17],
and enriched in 2017 with the routingby-agreement
mechanism [8]. In CapsNets,
several neurons are constituted as a
capsule that represents some properties
of an entity, e.g., pose, viewpoint, and
velocity. The capsules in a low-level layer
make pose predictions for the high-level
capsules using a transformation matrix.
Most importantly, a routing-by-agreement
mechanism is designed to pass the
information of the relevant capsules to
the next layer by iterative clustering.
Using this structure, variations of an entity
can be maintained. More details on
CapsNets will be given in Section II-B.
Currently, a CapsNet performs satisfactorily
in some popular image sets such as
the MNIST dataset [18], and is promising
for some intelligent tasks, such as multiobjects
detection [19]. In addition to
these conventional intelligent tasks, CapsNets
can be used for data hiding with
multiple receivers.
In this paper, the proposed scheme
achieves data hiding for multiple receivers
using CapsNets as an example, as
shown in Fig. 2. Additional data for
multiple receivers are embedded into
CapsNets. With CapsNets containing
additional data, a receiver can extract the
data for himself using his embedding
key. For other parts of additional data,
the receiver cannot affirm their existence
and therefore cannot extract them.
The security of data hiding can be guaranteed
this way since the existence of
additional data will not be exposed.
To the best of the authors' knowledge,
this is the first work focusing on data hiding
for multiple receivers using CapsNets.
In the proposed scheme, additional data
are embedded into CapsNets during the
training process instead of modifying the
network parameters after training. As a
result, the detection accuracy of CapsNets
decreases slightly. In addition, the
parameters of data decoding networks are
determined by embedding keys instead
Receiver 1
Sender
Embedding Key 1
Additional Data 1
CapsNets
Additional Data n
Data Extraction
Data Embedding
Embedding Key n
Embedding Key 1
Embedding Key n
CapsNets
Containing
Additional Data
Data Extraction
FIGURE 2 Data hiding for multiple receivers via CapsNets.
Additional
Data n
Additional
Data 1
Receiver n
NOVEMBER 2021 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 71
IEEE Computational Intelligence Magazine - November 2021
Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2021
IEEE Computational Intelligence Magazine - November 2021 - Cover1
IEEE Computational Intelligence Magazine - November 2021 - Cover2
IEEE Computational Intelligence Magazine - November 2021 - 1
IEEE Computational Intelligence Magazine - November 2021 - 2
IEEE Computational Intelligence Magazine - November 2021 - 3
IEEE Computational Intelligence Magazine - November 2021 - 4
IEEE Computational Intelligence Magazine - November 2021 - 5
IEEE Computational Intelligence Magazine - November 2021 - 6
IEEE Computational Intelligence Magazine - November 2021 - 7
IEEE Computational Intelligence Magazine - November 2021 - 8
IEEE Computational Intelligence Magazine - November 2021 - 9
IEEE Computational Intelligence Magazine - November 2021 - 10
IEEE Computational Intelligence Magazine - November 2021 - 11
IEEE Computational Intelligence Magazine - November 2021 - 12
IEEE Computational Intelligence Magazine - November 2021 - 13
IEEE Computational Intelligence Magazine - November 2021 - 14
IEEE Computational Intelligence Magazine - November 2021 - 15
IEEE Computational Intelligence Magazine - November 2021 - 16
IEEE Computational Intelligence Magazine - November 2021 - 17
IEEE Computational Intelligence Magazine - November 2021 - 18
IEEE Computational Intelligence Magazine - November 2021 - 19
IEEE Computational Intelligence Magazine - November 2021 - 20
IEEE Computational Intelligence Magazine - November 2021 - 21
IEEE Computational Intelligence Magazine - November 2021 - 22
IEEE Computational Intelligence Magazine - November 2021 - 23
IEEE Computational Intelligence Magazine - November 2021 - 24
IEEE Computational Intelligence Magazine - November 2021 - 25
IEEE Computational Intelligence Magazine - November 2021 - 26
IEEE Computational Intelligence Magazine - November 2021 - 27
IEEE Computational Intelligence Magazine - November 2021 - 28
IEEE Computational Intelligence Magazine - November 2021 - 29
IEEE Computational Intelligence Magazine - November 2021 - 30
IEEE Computational Intelligence Magazine - November 2021 - 31
IEEE Computational Intelligence Magazine - November 2021 - 32
IEEE Computational Intelligence Magazine - November 2021 - 33
IEEE Computational Intelligence Magazine - November 2021 - 34
IEEE Computational Intelligence Magazine - November 2021 - 35
IEEE Computational Intelligence Magazine - November 2021 - 36
IEEE Computational Intelligence Magazine - November 2021 - 37
IEEE Computational Intelligence Magazine - November 2021 - 38
IEEE Computational Intelligence Magazine - November 2021 - 39
IEEE Computational Intelligence Magazine - November 2021 - 40
IEEE Computational Intelligence Magazine - November 2021 - 41
IEEE Computational Intelligence Magazine - November 2021 - 42
IEEE Computational Intelligence Magazine - November 2021 - 43
IEEE Computational Intelligence Magazine - November 2021 - 44
IEEE Computational Intelligence Magazine - November 2021 - 45
IEEE Computational Intelligence Magazine - November 2021 - 46
IEEE Computational Intelligence Magazine - November 2021 - 47
IEEE Computational Intelligence Magazine - November 2021 - 48
IEEE Computational Intelligence Magazine - November 2021 - 49
IEEE Computational Intelligence Magazine - November 2021 - 50
IEEE Computational Intelligence Magazine - November 2021 - 51
IEEE Computational Intelligence Magazine - November 2021 - 52
IEEE Computational Intelligence Magazine - November 2021 - 53
IEEE Computational Intelligence Magazine - November 2021 - 54
IEEE Computational Intelligence Magazine - November 2021 - 55
IEEE Computational Intelligence Magazine - November 2021 - 56
IEEE Computational Intelligence Magazine - November 2021 - 57
IEEE Computational Intelligence Magazine - November 2021 - 58
IEEE Computational Intelligence Magazine - November 2021 - 59
IEEE Computational Intelligence Magazine - November 2021 - 60
IEEE Computational Intelligence Magazine - November 2021 - 61
IEEE Computational Intelligence Magazine - November 2021 - 62
IEEE Computational Intelligence Magazine - November 2021 - 63
IEEE Computational Intelligence Magazine - November 2021 - 64
IEEE Computational Intelligence Magazine - November 2021 - 65
IEEE Computational Intelligence Magazine - November 2021 - 66
IEEE Computational Intelligence Magazine - November 2021 - 67
IEEE Computational Intelligence Magazine - November 2021 - 68
IEEE Computational Intelligence Magazine - November 2021 - 69
IEEE Computational Intelligence Magazine - November 2021 - 70
IEEE Computational Intelligence Magazine - November 2021 - 71
IEEE Computational Intelligence Magazine - November 2021 - 72
IEEE Computational Intelligence Magazine - November 2021 - 73
IEEE Computational Intelligence Magazine - November 2021 - 74
IEEE Computational Intelligence Magazine - November 2021 - 75
IEEE Computational Intelligence Magazine - November 2021 - 76
IEEE Computational Intelligence Magazine - November 2021 - 77
IEEE Computational Intelligence Magazine - November 2021 - 78
IEEE Computational Intelligence Magazine - November 2021 - 79
IEEE Computational Intelligence Magazine - November 2021 - 80
IEEE Computational Intelligence Magazine - November 2021 - 81
IEEE Computational Intelligence Magazine - November 2021 - 82
IEEE Computational Intelligence Magazine - November 2021 - 83
IEEE Computational Intelligence Magazine - November 2021 - 84
IEEE Computational Intelligence Magazine - November 2021 - 85
IEEE Computational Intelligence Magazine - November 2021 - 86
IEEE Computational Intelligence Magazine - November 2021 - 87
IEEE Computational Intelligence Magazine - November 2021 - 88
IEEE Computational Intelligence Magazine - November 2021 - 89
IEEE Computational Intelligence Magazine - November 2021 - 90
IEEE Computational Intelligence Magazine - November 2021 - 91
IEEE Computational Intelligence Magazine - November 2021 - 92
IEEE Computational Intelligence Magazine - November 2021 - 93
IEEE Computational Intelligence Magazine - November 2021 - 94
IEEE Computational Intelligence Magazine - November 2021 - 95
IEEE Computational Intelligence Magazine - November 2021 - 96
IEEE Computational Intelligence Magazine - November 2021 - 97
IEEE Computational Intelligence Magazine - November 2021 - 98
IEEE Computational Intelligence Magazine - November 2021 - 99
IEEE Computational Intelligence Magazine - November 2021 - 100
IEEE Computational Intelligence Magazine - November 2021 - Cover3
IEEE Computational Intelligence Magazine - November 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com