IEEE Computational Intelligence Magazine - November 2021 - 73

represents the existence possibility of a
digit class. Most importantly, a routingby-agreement
mechanism is executed
between PrimaryCaps and DigitCaps to
enlarge the active features and ignore the
negative ones.
Denoting the output of the i-th
c a p sule in PrimaryCaps as u , ii
{, ,, },
12 32f
a prediction vector uji;
t
calculated by multiplying ui
matrix Wij sized 81 .6#
j {, ,, }.
= / t ji;
! 12 10f
sucjij
i
2
sj
v =
j
where cij
1 + sj
2
s
s
j
j
,
(2)
is the coupling coefficient calculated
using the routing-by-agreement
mechanism, as shown in Equation (3).
The parameter bij
is 0 at the beginning
and then dynamically updated using
Equation (4) in a routing-by-agreement
mechanism. Usually, there are 2 routing
iterations for parameter-update.
cij = /exp ()
z
exp()
bij
biz
t
bb vu=+ $
ij
The vector vj
ij jj i
;
,
,
(3)
A. General Framework
This paper aims to embed additional
data into some elements (such as weights,
layer output, and coupling coefficients)
of CapsNets during training. Denote the
embedding function for one receiver as
PPM = (, ),fKx
where Px
(5)
is the element used for
(4) mm t201Tt
!
f
of each capsule in
DigitCaps represents a digit class, and the
norm represents the existence possibility
of digit class. The nonlinear function in
Equation (2) ensures that short vectors
shrink to almost zero length and that long
vectors shrink to a length close to 1.
In the next section, the redundancy in
network parameters of CapsNets is used
for data hiding, and a data hiding scheme
with multiple receivers is proposed.
III. Proposed Method
In this section, a data hiding scheme is
proposed to transmit data with multiple
receivers via CapsNets as an example. It is
easy to embed additional data in a trained
CapsNets by directly modifying the network
weights, which is widely used for
data hiding in digital images. However,
the modifications will decrease the detection
accuracy of the original network. For
embedding, which will be discussed
in the next subsection, and K is the
embedding key possessed by the receiver.
Given a data vector
f
M [( ),m 1=
PMm mm [( ), (),, ()][ ,]
= pp pt12
! 01
(),, ()]{ ,} , the output
Tt
of the embedding function should be
close to M as much as possible since the
elements in PM
are decimals. Meanwhile,
the detection accuracy of CapsNets
should not be visibly decreased.
Without loss of generality, the embedding
function for the case of n receivers
is defined as
{, ,, }( ,,, ,).ff=
(6)
12 n
1
pmr(i )
0.5
pmr(i )
mr (i )
FIGURE 4 Redundant space of the output pimr
().
Redundancy
!
is
by a weight
Then, the output
vj of the j-th capsule in DigitCaps
is calculated using Equations (1) and
(2),
,
(1)
In this paper, a data hiding scheme is proposed to
transmit data with multiple receivers via CapsNets
as an example.
this reason, the authors propose embedding
additional data during the process of
training. Satisfactory detection accuracy of
CapsNets containing additional data can
be guaranteed this way. In the proposed
scheme, the parameters of data decoding
networks are generated using the embedding
keys possessed by the receivers.
Therefore, it is unnecessary to store and
transmit the decoders using covert channels.
Details are as follows.
Similarly, {, ,, }KK Kn12
f are the
embedding keys possessed by the n
receivers. For the outputs of the embedding
function, vectors {, ,, }
should be close to {, ,, },MM Mn12
= [( ), (),, ()]T
Mm mmrr rr
12
PP PMM Mn12
f
f
where M mm mt12rr rr
{, }, [( ), (),, ()]T
[, ], {, ,, }.rn01
01 pp pt12Pt
t ! f
=
f
f
!
!
To achieve the function, the total loss
L of CapsNets containing additional
data is defined as the weighted summation
of two parts, as shown in Equations
(7) and (8). Lx
original CapsNets [8], which is used to
guarantee satisfactory detection accuracy
on the MNIST dataset. LM
is used to
facilitate the embedding of additional
data, and b is used to adjust the weights
of the two parts. A large value of b is
advantageous to data extraction but disadvantageous
to detection accuracy, and
vice versa. The value of b will be discussed
in Subsection IV-A. In addition,
the extraction error e can be calculated
using Equation (9), where e 0= means
that the additional data are extracted
correctly and
round (ยท)
rounding operation.
LL .LM
=+b $
n
L
e
MM r
r
==
n
1
nt
r
==
((
))
1
1 / / roundp im i() . (9)mrr
r=1 i
n
t
Since the value range of pimr () is
mir
PP PPMM Mn12xfK KK [0, 1] while () is binary ( " 0 " or " 1 " ),
there is a redundant space of pimr (). As
x
/ PM .
1
2
stands for the
(7)
(8)
is the loss defined in the
mr (i )
Redundancy
NOVEMBER 2021 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 73

IEEE Computational Intelligence Magazine - November 2021

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2021

IEEE Computational Intelligence Magazine - November 2021 - Cover1
IEEE Computational Intelligence Magazine - November 2021 - Cover2
IEEE Computational Intelligence Magazine - November 2021 - 1
IEEE Computational Intelligence Magazine - November 2021 - 2
IEEE Computational Intelligence Magazine - November 2021 - 3
IEEE Computational Intelligence Magazine - November 2021 - 4
IEEE Computational Intelligence Magazine - November 2021 - 5
IEEE Computational Intelligence Magazine - November 2021 - 6
IEEE Computational Intelligence Magazine - November 2021 - 7
IEEE Computational Intelligence Magazine - November 2021 - 8
IEEE Computational Intelligence Magazine - November 2021 - 9
IEEE Computational Intelligence Magazine - November 2021 - 10
IEEE Computational Intelligence Magazine - November 2021 - 11
IEEE Computational Intelligence Magazine - November 2021 - 12
IEEE Computational Intelligence Magazine - November 2021 - 13
IEEE Computational Intelligence Magazine - November 2021 - 14
IEEE Computational Intelligence Magazine - November 2021 - 15
IEEE Computational Intelligence Magazine - November 2021 - 16
IEEE Computational Intelligence Magazine - November 2021 - 17
IEEE Computational Intelligence Magazine - November 2021 - 18
IEEE Computational Intelligence Magazine - November 2021 - 19
IEEE Computational Intelligence Magazine - November 2021 - 20
IEEE Computational Intelligence Magazine - November 2021 - 21
IEEE Computational Intelligence Magazine - November 2021 - 22
IEEE Computational Intelligence Magazine - November 2021 - 23
IEEE Computational Intelligence Magazine - November 2021 - 24
IEEE Computational Intelligence Magazine - November 2021 - 25
IEEE Computational Intelligence Magazine - November 2021 - 26
IEEE Computational Intelligence Magazine - November 2021 - 27
IEEE Computational Intelligence Magazine - November 2021 - 28
IEEE Computational Intelligence Magazine - November 2021 - 29
IEEE Computational Intelligence Magazine - November 2021 - 30
IEEE Computational Intelligence Magazine - November 2021 - 31
IEEE Computational Intelligence Magazine - November 2021 - 32
IEEE Computational Intelligence Magazine - November 2021 - 33
IEEE Computational Intelligence Magazine - November 2021 - 34
IEEE Computational Intelligence Magazine - November 2021 - 35
IEEE Computational Intelligence Magazine - November 2021 - 36
IEEE Computational Intelligence Magazine - November 2021 - 37
IEEE Computational Intelligence Magazine - November 2021 - 38
IEEE Computational Intelligence Magazine - November 2021 - 39
IEEE Computational Intelligence Magazine - November 2021 - 40
IEEE Computational Intelligence Magazine - November 2021 - 41
IEEE Computational Intelligence Magazine - November 2021 - 42
IEEE Computational Intelligence Magazine - November 2021 - 43
IEEE Computational Intelligence Magazine - November 2021 - 44
IEEE Computational Intelligence Magazine - November 2021 - 45
IEEE Computational Intelligence Magazine - November 2021 - 46
IEEE Computational Intelligence Magazine - November 2021 - 47
IEEE Computational Intelligence Magazine - November 2021 - 48
IEEE Computational Intelligence Magazine - November 2021 - 49
IEEE Computational Intelligence Magazine - November 2021 - 50
IEEE Computational Intelligence Magazine - November 2021 - 51
IEEE Computational Intelligence Magazine - November 2021 - 52
IEEE Computational Intelligence Magazine - November 2021 - 53
IEEE Computational Intelligence Magazine - November 2021 - 54
IEEE Computational Intelligence Magazine - November 2021 - 55
IEEE Computational Intelligence Magazine - November 2021 - 56
IEEE Computational Intelligence Magazine - November 2021 - 57
IEEE Computational Intelligence Magazine - November 2021 - 58
IEEE Computational Intelligence Magazine - November 2021 - 59
IEEE Computational Intelligence Magazine - November 2021 - 60
IEEE Computational Intelligence Magazine - November 2021 - 61
IEEE Computational Intelligence Magazine - November 2021 - 62
IEEE Computational Intelligence Magazine - November 2021 - 63
IEEE Computational Intelligence Magazine - November 2021 - 64
IEEE Computational Intelligence Magazine - November 2021 - 65
IEEE Computational Intelligence Magazine - November 2021 - 66
IEEE Computational Intelligence Magazine - November 2021 - 67
IEEE Computational Intelligence Magazine - November 2021 - 68
IEEE Computational Intelligence Magazine - November 2021 - 69
IEEE Computational Intelligence Magazine - November 2021 - 70
IEEE Computational Intelligence Magazine - November 2021 - 71
IEEE Computational Intelligence Magazine - November 2021 - 72
IEEE Computational Intelligence Magazine - November 2021 - 73
IEEE Computational Intelligence Magazine - November 2021 - 74
IEEE Computational Intelligence Magazine - November 2021 - 75
IEEE Computational Intelligence Magazine - November 2021 - 76
IEEE Computational Intelligence Magazine - November 2021 - 77
IEEE Computational Intelligence Magazine - November 2021 - 78
IEEE Computational Intelligence Magazine - November 2021 - 79
IEEE Computational Intelligence Magazine - November 2021 - 80
IEEE Computational Intelligence Magazine - November 2021 - 81
IEEE Computational Intelligence Magazine - November 2021 - 82
IEEE Computational Intelligence Magazine - November 2021 - 83
IEEE Computational Intelligence Magazine - November 2021 - 84
IEEE Computational Intelligence Magazine - November 2021 - 85
IEEE Computational Intelligence Magazine - November 2021 - 86
IEEE Computational Intelligence Magazine - November 2021 - 87
IEEE Computational Intelligence Magazine - November 2021 - 88
IEEE Computational Intelligence Magazine - November 2021 - 89
IEEE Computational Intelligence Magazine - November 2021 - 90
IEEE Computational Intelligence Magazine - November 2021 - 91
IEEE Computational Intelligence Magazine - November 2021 - 92
IEEE Computational Intelligence Magazine - November 2021 - 93
IEEE Computational Intelligence Magazine - November 2021 - 94
IEEE Computational Intelligence Magazine - November 2021 - 95
IEEE Computational Intelligence Magazine - November 2021 - 96
IEEE Computational Intelligence Magazine - November 2021 - 97
IEEE Computational Intelligence Magazine - November 2021 - 98
IEEE Computational Intelligence Magazine - November 2021 - 99
IEEE Computational Intelligence Magazine - November 2021 - 100
IEEE Computational Intelligence Magazine - November 2021 - Cover3
IEEE Computational Intelligence Magazine - November 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com