IEEE Computational Intelligence Magazine - November 2021 - 72

of training. Therefore, it is unnecessary to
store and transmit the decoding networks
secretly. Additional data can be extracted
correctly with the correct embedding
key. The novelty and contributions of this
paper are summarized as follows:
1) This paper focuses on a new form
of data hiding by embedding additional
data into CapsNets without
visibly decreasing its detection accuracy.
This is achieved by embedding
additional data during the training
process instead of modifying the
network parameters after training.
2) This paper proposes a customized
data hiding scheme for CapsNets,
which is able to transmit different
additional data with multiple receivers.
A receiver can obtain the data for
himself using the correct embedding
key but has no knowledge of other
parts of the additional data.
3) The practicability of the proposed
scheme is satisfactory. This is because
the parameters of data decoding networks
are determined by embedding
keys instead of training. In this way, it
is unnecessary to store and transmit
the decoding networks secretly.
II. Related Work
In this section, some related work is
introduced, including the data hiding
technique and CapsNets employed for
data hiding in this paper.
A. Data Hiding
Data hiding is a technique to imperceptibly
embed additional data into digital
media, which can be mainly categorized
into watermarking and steganography
according to different applications.
Watermarking is the process of marking
digital media for copyright protection
[20], while steganography is mainly
developed for covert communication
[21]. There are many practical applications
of data hiding, e.g., biometric
watermarking, chip and hardware protection,
combination of watermarking and
encryption, and cloud computation [22].
Watermarking can be used in many
applications, such as digital forensics,
integrity authentication, copyright protection,
and source tracking. Popular
media employed for watermarking
include audio, images, and video, to
name a few. To embed watermarked
data, the redundancy components of the
cover media are often exploited, including
but are not limited to the correlation
of pixels in the spatial domain [23]
and the frequency spectrum characteristic
in the transform domain [24]. Watermarking
in neural networks is becoming
a popular topic in information security
since it is a straightforward way to protect
the intellectual property of neural
networks using digital watermarking
[14]. Many watermarking schemes are
designed for neural networks [15] by
embedding watermarking in weight
parameters in networks or using the
backdooring technique.
Modern steganography hopes to
minimize the embedding distortion on a
cover image with a given distortion
function [25]. Many distortion functions
for steganography have been reported
[26]. Recently, generative steganography
has been developed in which stego
images are generated directly according
to additional data [27]. Some researchers
generate stego images with the help of
GANs or encoder-decoder networks
[28]. In [29], additional data were transformed
directly into a fingerprint image
based on a piece of hologram phase
constructed by the additional data. The
authors in [30] focused on linguistic
steganography. They captured the correlation
between words using a RNN and
generated stego text directly from the
additional data.
This paper focuses on data hiding in
a neural network, which is able to transmit
different additional data with multiple
receivers. Details are described in
Section III.
B. Capsule Network
The fundamental architecture of CapsNets
[8] designed for the MNIST dataset
is shown in Fig. 3, which is equipped
with only two convolutional layers
(Conv1 and PrimaryCaps) and one fully
connected layer (DigitCaps). In the
Conv1 layer, there are 256 convolutional
kernels sized 99# with a stride of 1 and
ReLU activation. This layer extracts local
pixel features that are used as inputs to
the PrimaryCaps layer. PrimaryCaps is a
convolutional capsule layer that contains
32 capsules. Each capsule contains 8 convolutional
kernels sized 99# with a
stride of 2 and ReLU activation. Finally,
the DigitCaps layer contains 10 capsules
sized 16D. Each capsule represents a digit
class connected with all the capsules in
PrimaryCaps, and the capsule norm
DightCaps
ReLU Conv1
ReLU
Conv1
9 × 99×9
9 × 99×9
20
6
FIGURE 3 Architecture of CapsNets for MNIST.
256
Primary
Caps
Primary
Caps
8
32
16
10
||L2||
10
...
72 IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | NOVEMBER 2021

IEEE Computational Intelligence Magazine - November 2021

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2021

IEEE Computational Intelligence Magazine - November 2021 - Cover1
IEEE Computational Intelligence Magazine - November 2021 - Cover2
IEEE Computational Intelligence Magazine - November 2021 - 1
IEEE Computational Intelligence Magazine - November 2021 - 2
IEEE Computational Intelligence Magazine - November 2021 - 3
IEEE Computational Intelligence Magazine - November 2021 - 4
IEEE Computational Intelligence Magazine - November 2021 - 5
IEEE Computational Intelligence Magazine - November 2021 - 6
IEEE Computational Intelligence Magazine - November 2021 - 7
IEEE Computational Intelligence Magazine - November 2021 - 8
IEEE Computational Intelligence Magazine - November 2021 - 9
IEEE Computational Intelligence Magazine - November 2021 - 10
IEEE Computational Intelligence Magazine - November 2021 - 11
IEEE Computational Intelligence Magazine - November 2021 - 12
IEEE Computational Intelligence Magazine - November 2021 - 13
IEEE Computational Intelligence Magazine - November 2021 - 14
IEEE Computational Intelligence Magazine - November 2021 - 15
IEEE Computational Intelligence Magazine - November 2021 - 16
IEEE Computational Intelligence Magazine - November 2021 - 17
IEEE Computational Intelligence Magazine - November 2021 - 18
IEEE Computational Intelligence Magazine - November 2021 - 19
IEEE Computational Intelligence Magazine - November 2021 - 20
IEEE Computational Intelligence Magazine - November 2021 - 21
IEEE Computational Intelligence Magazine - November 2021 - 22
IEEE Computational Intelligence Magazine - November 2021 - 23
IEEE Computational Intelligence Magazine - November 2021 - 24
IEEE Computational Intelligence Magazine - November 2021 - 25
IEEE Computational Intelligence Magazine - November 2021 - 26
IEEE Computational Intelligence Magazine - November 2021 - 27
IEEE Computational Intelligence Magazine - November 2021 - 28
IEEE Computational Intelligence Magazine - November 2021 - 29
IEEE Computational Intelligence Magazine - November 2021 - 30
IEEE Computational Intelligence Magazine - November 2021 - 31
IEEE Computational Intelligence Magazine - November 2021 - 32
IEEE Computational Intelligence Magazine - November 2021 - 33
IEEE Computational Intelligence Magazine - November 2021 - 34
IEEE Computational Intelligence Magazine - November 2021 - 35
IEEE Computational Intelligence Magazine - November 2021 - 36
IEEE Computational Intelligence Magazine - November 2021 - 37
IEEE Computational Intelligence Magazine - November 2021 - 38
IEEE Computational Intelligence Magazine - November 2021 - 39
IEEE Computational Intelligence Magazine - November 2021 - 40
IEEE Computational Intelligence Magazine - November 2021 - 41
IEEE Computational Intelligence Magazine - November 2021 - 42
IEEE Computational Intelligence Magazine - November 2021 - 43
IEEE Computational Intelligence Magazine - November 2021 - 44
IEEE Computational Intelligence Magazine - November 2021 - 45
IEEE Computational Intelligence Magazine - November 2021 - 46
IEEE Computational Intelligence Magazine - November 2021 - 47
IEEE Computational Intelligence Magazine - November 2021 - 48
IEEE Computational Intelligence Magazine - November 2021 - 49
IEEE Computational Intelligence Magazine - November 2021 - 50
IEEE Computational Intelligence Magazine - November 2021 - 51
IEEE Computational Intelligence Magazine - November 2021 - 52
IEEE Computational Intelligence Magazine - November 2021 - 53
IEEE Computational Intelligence Magazine - November 2021 - 54
IEEE Computational Intelligence Magazine - November 2021 - 55
IEEE Computational Intelligence Magazine - November 2021 - 56
IEEE Computational Intelligence Magazine - November 2021 - 57
IEEE Computational Intelligence Magazine - November 2021 - 58
IEEE Computational Intelligence Magazine - November 2021 - 59
IEEE Computational Intelligence Magazine - November 2021 - 60
IEEE Computational Intelligence Magazine - November 2021 - 61
IEEE Computational Intelligence Magazine - November 2021 - 62
IEEE Computational Intelligence Magazine - November 2021 - 63
IEEE Computational Intelligence Magazine - November 2021 - 64
IEEE Computational Intelligence Magazine - November 2021 - 65
IEEE Computational Intelligence Magazine - November 2021 - 66
IEEE Computational Intelligence Magazine - November 2021 - 67
IEEE Computational Intelligence Magazine - November 2021 - 68
IEEE Computational Intelligence Magazine - November 2021 - 69
IEEE Computational Intelligence Magazine - November 2021 - 70
IEEE Computational Intelligence Magazine - November 2021 - 71
IEEE Computational Intelligence Magazine - November 2021 - 72
IEEE Computational Intelligence Magazine - November 2021 - 73
IEEE Computational Intelligence Magazine - November 2021 - 74
IEEE Computational Intelligence Magazine - November 2021 - 75
IEEE Computational Intelligence Magazine - November 2021 - 76
IEEE Computational Intelligence Magazine - November 2021 - 77
IEEE Computational Intelligence Magazine - November 2021 - 78
IEEE Computational Intelligence Magazine - November 2021 - 79
IEEE Computational Intelligence Magazine - November 2021 - 80
IEEE Computational Intelligence Magazine - November 2021 - 81
IEEE Computational Intelligence Magazine - November 2021 - 82
IEEE Computational Intelligence Magazine - November 2021 - 83
IEEE Computational Intelligence Magazine - November 2021 - 84
IEEE Computational Intelligence Magazine - November 2021 - 85
IEEE Computational Intelligence Magazine - November 2021 - 86
IEEE Computational Intelligence Magazine - November 2021 - 87
IEEE Computational Intelligence Magazine - November 2021 - 88
IEEE Computational Intelligence Magazine - November 2021 - 89
IEEE Computational Intelligence Magazine - November 2021 - 90
IEEE Computational Intelligence Magazine - November 2021 - 91
IEEE Computational Intelligence Magazine - November 2021 - 92
IEEE Computational Intelligence Magazine - November 2021 - 93
IEEE Computational Intelligence Magazine - November 2021 - 94
IEEE Computational Intelligence Magazine - November 2021 - 95
IEEE Computational Intelligence Magazine - November 2021 - 96
IEEE Computational Intelligence Magazine - November 2021 - 97
IEEE Computational Intelligence Magazine - November 2021 - 98
IEEE Computational Intelligence Magazine - November 2021 - 99
IEEE Computational Intelligence Magazine - November 2021 - 100
IEEE Computational Intelligence Magazine - November 2021 - Cover3
IEEE Computational Intelligence Magazine - November 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com