IEEE Computational Intelligence Magazine - November 2021 - 75

procedures of data embedding, the proposed
scheme is summarized in Algorithm 1.
The parameters of the FC layers in
the decoding networks are obtained
using embedding keys instead of training.
Before training, the parameters of
decoding networks are produced using
embedding keys. These parameter values
are kept unchanged during the process
of training; consequently, it is unnecessary
to store the decoders secretly. Additional
data can be extracted correctly
with correct embedding keys, and the
practicability is thus satisfactory. In
addition, additional data are embedded
during the process of training instead of
modifying the network parameters after
training. For this reason, the detection
accuracy of the neural network will not
be decreased visibly, and security performance
can be guaranteed (the existence
of additional data cannot be exposed). To
verify this, the parameter distributions of
the original and stego CapsNets are
compared on the MNIST dataset, as
shown in Fig. 6, where
b 1 ,=
t 10000=
n 1= ,
, and the batch size is 50. In
data hiding, as shown in Equation (11),
the difference between an original and
stego distribution can be measured using
the KL divergence [33], which is a statistical
test from information theory measuring
the distance of two distributions.
Dp xp xp xxx=
x
s
pxx
pxs
(( )( )) / ()log
px
px
x
s
()
()
(11)
where () and () are the distributions
of the cover and stego objects,
respectively. The value of KL divergence
is always nonnegative and is 0 if and
only if the two distributions are equal. A
smaller value of KL divergence means
higher similarity between the two distributions.
The KL divergence values
between the distributions in Fig. 6 are
listed in Table II. The results indicate
that the distributions of the original and
stego parameters are similar since the
KL divergence values are small. In this
case, it is difficult to judge whether a
given network contains additional data
or not. The existence of additional data
therefore cannot be exposed so as to
guarantee the security of the proposed
A. Parameter Determination
The parameter b in Equation (7),
which is the weight of the loss function,
The embedding capacity of the proposed scheme is
6000 bits, which is satisfactory for data hiding.
scheme. It can also be noticed that the
differences between the original and
stego distributions of sj
and vj
are larger
than those of the other elements. The
reason may be that the redundancy in
coupling coefficients cij
shown in Equations (1) and (2), sj
vj are determined by c .ij
and vj
is trivial. As
and
In this case,
the differences between the original and
stego distributions of sj
large if the redundancy in cij
will be
is trivial. In
future work, a scheme to minimize the
distribution differences of all elements
can be developed.
IV. Experimental Results
To verify the effectiveness of the proposed
scheme, some experiments are
conducted in this section. To the best of
the authors' knowledge, the data hiding
method for multiple receivers using
neural networks has not been reported
in the literature. Thus, this section mainly
examines the performance of the proposed
scheme.
All the experiments are implemented
by TensorFlow and trained under the
environment of Python 3.8 on a Windows
10 system with an NVIDIA
GeForce RTX 2080 Ti GPU with
11GB of memory. The Adam optimizer
[34] is used for optimization.
is important since it balances the detection
accuracy of CapsNets and the performance
of the data hiding scheme. To
determine the value of
b , a group of
experiments for the case of one receiver
()n 1= are conducted on the MNIST
dataset with a capacity of 10000 bits
(),
t 10000=
2 routing iterations, and a
batch size of 50. The extraction error of
data and detection accuracies of CapsNets
containing additional data are
shown in Fig. 7.
There is a trade-off between the
extraction error of data extraction and
the detection accuracy of CapsNets. A
large value of b is advantageous to data
extraction but disadvantageous to detection
accuracy, and vice versa. Fig. 7(b)
shows that the detection accuracy clearly
decreased when
b 2 15 Meanwhile,
..
it can be seen from Fig. 7(a) that the
extraction error also performs well at
..
b 15=
With overall consideration, the
value of b is determined to be 1.5 to
guarantee satisfactory detection accuracy
and extraction error simultaneously.
B. Embedding Capacity
For data hiding, embedding capacity is
one of the most important indicators. In
this subsection, the embedding capacity
of the proposed scheme is tested. For
the case of one receiver (),
n 1= the
length t of additional data M is set as
{, ,, },
500 1000 7500f
Algorithm 1 Procedures of data embedding.
Input: Additional data {, ,, };MM Mn12
f
and the number
of routing iterations is set as {2, 3, 4}.
Embedding keys: {, ,, };KK Kn12
f
Architecture
of CapsNets; Images for training and corresponding labels.
Output: Trained CapsNets with different additional data for n receivers.
1) Construct CapsNets architecture for data hiding as described in Subsection III-B;
2) Produce the parameters of decoding networks (the n FC layers shown in
Fig. 5) using {, ,, },KK Kn12
f
respectively. These parameter values are kept
unchanged during the process of training;
3) With the guidance of {, ,, },MM Mn12
f
train new CapsNets using the given
images and labels to minimize the total loss L calculated in Equation (7);
4) The obtained network is the desired output: " Trained CapsNets with different
additional data for n receivers. "
NOVEMBER 2021 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE 75

IEEE Computational Intelligence Magazine - November 2021

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - November 2021

IEEE Computational Intelligence Magazine - November 2021 - Cover1
IEEE Computational Intelligence Magazine - November 2021 - Cover2
IEEE Computational Intelligence Magazine - November 2021 - 1
IEEE Computational Intelligence Magazine - November 2021 - 2
IEEE Computational Intelligence Magazine - November 2021 - 3
IEEE Computational Intelligence Magazine - November 2021 - 4
IEEE Computational Intelligence Magazine - November 2021 - 5
IEEE Computational Intelligence Magazine - November 2021 - 6
IEEE Computational Intelligence Magazine - November 2021 - 7
IEEE Computational Intelligence Magazine - November 2021 - 8
IEEE Computational Intelligence Magazine - November 2021 - 9
IEEE Computational Intelligence Magazine - November 2021 - 10
IEEE Computational Intelligence Magazine - November 2021 - 11
IEEE Computational Intelligence Magazine - November 2021 - 12
IEEE Computational Intelligence Magazine - November 2021 - 13
IEEE Computational Intelligence Magazine - November 2021 - 14
IEEE Computational Intelligence Magazine - November 2021 - 15
IEEE Computational Intelligence Magazine - November 2021 - 16
IEEE Computational Intelligence Magazine - November 2021 - 17
IEEE Computational Intelligence Magazine - November 2021 - 18
IEEE Computational Intelligence Magazine - November 2021 - 19
IEEE Computational Intelligence Magazine - November 2021 - 20
IEEE Computational Intelligence Magazine - November 2021 - 21
IEEE Computational Intelligence Magazine - November 2021 - 22
IEEE Computational Intelligence Magazine - November 2021 - 23
IEEE Computational Intelligence Magazine - November 2021 - 24
IEEE Computational Intelligence Magazine - November 2021 - 25
IEEE Computational Intelligence Magazine - November 2021 - 26
IEEE Computational Intelligence Magazine - November 2021 - 27
IEEE Computational Intelligence Magazine - November 2021 - 28
IEEE Computational Intelligence Magazine - November 2021 - 29
IEEE Computational Intelligence Magazine - November 2021 - 30
IEEE Computational Intelligence Magazine - November 2021 - 31
IEEE Computational Intelligence Magazine - November 2021 - 32
IEEE Computational Intelligence Magazine - November 2021 - 33
IEEE Computational Intelligence Magazine - November 2021 - 34
IEEE Computational Intelligence Magazine - November 2021 - 35
IEEE Computational Intelligence Magazine - November 2021 - 36
IEEE Computational Intelligence Magazine - November 2021 - 37
IEEE Computational Intelligence Magazine - November 2021 - 38
IEEE Computational Intelligence Magazine - November 2021 - 39
IEEE Computational Intelligence Magazine - November 2021 - 40
IEEE Computational Intelligence Magazine - November 2021 - 41
IEEE Computational Intelligence Magazine - November 2021 - 42
IEEE Computational Intelligence Magazine - November 2021 - 43
IEEE Computational Intelligence Magazine - November 2021 - 44
IEEE Computational Intelligence Magazine - November 2021 - 45
IEEE Computational Intelligence Magazine - November 2021 - 46
IEEE Computational Intelligence Magazine - November 2021 - 47
IEEE Computational Intelligence Magazine - November 2021 - 48
IEEE Computational Intelligence Magazine - November 2021 - 49
IEEE Computational Intelligence Magazine - November 2021 - 50
IEEE Computational Intelligence Magazine - November 2021 - 51
IEEE Computational Intelligence Magazine - November 2021 - 52
IEEE Computational Intelligence Magazine - November 2021 - 53
IEEE Computational Intelligence Magazine - November 2021 - 54
IEEE Computational Intelligence Magazine - November 2021 - 55
IEEE Computational Intelligence Magazine - November 2021 - 56
IEEE Computational Intelligence Magazine - November 2021 - 57
IEEE Computational Intelligence Magazine - November 2021 - 58
IEEE Computational Intelligence Magazine - November 2021 - 59
IEEE Computational Intelligence Magazine - November 2021 - 60
IEEE Computational Intelligence Magazine - November 2021 - 61
IEEE Computational Intelligence Magazine - November 2021 - 62
IEEE Computational Intelligence Magazine - November 2021 - 63
IEEE Computational Intelligence Magazine - November 2021 - 64
IEEE Computational Intelligence Magazine - November 2021 - 65
IEEE Computational Intelligence Magazine - November 2021 - 66
IEEE Computational Intelligence Magazine - November 2021 - 67
IEEE Computational Intelligence Magazine - November 2021 - 68
IEEE Computational Intelligence Magazine - November 2021 - 69
IEEE Computational Intelligence Magazine - November 2021 - 70
IEEE Computational Intelligence Magazine - November 2021 - 71
IEEE Computational Intelligence Magazine - November 2021 - 72
IEEE Computational Intelligence Magazine - November 2021 - 73
IEEE Computational Intelligence Magazine - November 2021 - 74
IEEE Computational Intelligence Magazine - November 2021 - 75
IEEE Computational Intelligence Magazine - November 2021 - 76
IEEE Computational Intelligence Magazine - November 2021 - 77
IEEE Computational Intelligence Magazine - November 2021 - 78
IEEE Computational Intelligence Magazine - November 2021 - 79
IEEE Computational Intelligence Magazine - November 2021 - 80
IEEE Computational Intelligence Magazine - November 2021 - 81
IEEE Computational Intelligence Magazine - November 2021 - 82
IEEE Computational Intelligence Magazine - November 2021 - 83
IEEE Computational Intelligence Magazine - November 2021 - 84
IEEE Computational Intelligence Magazine - November 2021 - 85
IEEE Computational Intelligence Magazine - November 2021 - 86
IEEE Computational Intelligence Magazine - November 2021 - 87
IEEE Computational Intelligence Magazine - November 2021 - 88
IEEE Computational Intelligence Magazine - November 2021 - 89
IEEE Computational Intelligence Magazine - November 2021 - 90
IEEE Computational Intelligence Magazine - November 2021 - 91
IEEE Computational Intelligence Magazine - November 2021 - 92
IEEE Computational Intelligence Magazine - November 2021 - 93
IEEE Computational Intelligence Magazine - November 2021 - 94
IEEE Computational Intelligence Magazine - November 2021 - 95
IEEE Computational Intelligence Magazine - November 2021 - 96
IEEE Computational Intelligence Magazine - November 2021 - 97
IEEE Computational Intelligence Magazine - November 2021 - 98
IEEE Computational Intelligence Magazine - November 2021 - 99
IEEE Computational Intelligence Magazine - November 2021 - 100
IEEE Computational Intelligence Magazine - November 2021 - Cover3
IEEE Computational Intelligence Magazine - November 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com