Abstract
Image hiding secures information security in multimedia communication. Existing deep image hiding methods usually process the secret and cover information at first, and then fuse such entire processed information. This complete and rough fusion pipeline, however, severely hinders the quality improvement of the stego and revealed secret images. This paper proposes a deep image hiding architecture, named Deep Adaptive Hiding Network (DAH-Net), to gradually extract and fuse the necessary secret and cover information at the frequency and the depth (layer) extents. Specifically, we propose the Attentive Frequency Extraction method for the DAH-Net to adaptively extract the necessary secret and cover information at the frequency level. The Gradual Depth Extraction method is further proposed for the DAH-Net to gradually extract and fuse the attentive frequency secret and cover information at the depth (layer) level of the deep image hiding network. Extensive experiment results demonstrate the proposed DAH-Net is more universal and achieves state-of-the-art performances in image hiding, watermarking, and photographic steganography.
Similar content being viewed by others
Data availability
The data generated and analyzed during the current study are available from the corresponding author on reasonable request.
References
You W, Zhang H, Zhao X (2020) A siamese CNN for image steganalysis. IEEE Trans Inf Forensics Secur 16:291–306
Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the European conference on computer vision, pp 657–672
Yin Z, Peng Y, Xiang Y (2020) Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans Depend Secure Computing 19(2):992–1002
Chen F, Yuan Y, He H, Tian M, Tai H-M (2020) Multi-msb compression based reversible data hiding scheme in encrypted images. IEEE Trans Circuits Syst Video Technol 31(3):905–916
Thodi DM, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Chen B, Lu W, Huang J, Weng J, Zhou Y (2020) Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans Depend Secure Computing 19(2):978–991
Zhang C, Benz P, Karjauv A, Sun G, Kweon IS (2020) Udh: universal deep hiding for steganography, watermarking, and light field messaging. Adv Neural Inf Process Syst 33:10223–10234
Lu Y, Lu G, Li J, Zhang Z, Xu Y (2021) Fully shared convolutional neural networks. Neural Comput Appl 33(14):8635–8648
Li Y, Zhang Z, Chen B, Lu G, Zhang D (2022) Deep margin-sensitive representation learning for cross-domain facial expression recognition. IEEE Trans Multimed. https://doi.org/10.1109/TMM.2022.3141604
Lu Y, Lu G, Xu Y, Zhang B (2018) Aar-cnns: auto adaptive regularized convolutional neural networks. In: International joint conference on artificial intelligence, pp 2511–2517
Lu Y, Lu G, Li J, Xu Y, Zhang D (2020) High-parameter-efficiency convolutional neural networks. Neural Comput Appl 32(14):10633–10644
Xie Q, Zhang P, Yu B, Choi J (2021) Semisupervised training of deep generative models for high-dimensional anomaly detection. IEEE Trans Neural Networks Learn System 33(6):2444–2453
Alom MZ, Hasan M, Yakopcic C, Taha TM, Asari VK (2020) Improved inception-residual convolutional neural network for object recognition. Neural Comput Appl 32(1):279–293
Ignatov A, Byeoung-su K, Timofte R, Pouget A (2021) Fast camera image denoising on mobile gpus with deep learning, mobile ai 2021 challenge: Report. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 2515–2524
Feng X, Pei W, Jia Z, Chen F, Zhang D, Lu G (2021) Deep-masking generative network: a unified framework for background restoration from superimposed images. IEEE Trans Image Process 30:4867–4882
Zhang C, Hu W, Jin T, Mei Z (2018) Nonlocal image denoising via adaptive tensor nuclear norm minimization. Neural Comput Appl 29(1):3–19
Das PK, Meher S, Panda R, Abraham A (2021) An efficient blood-cell segmentation for the detection of hematological disorders. IEEE Trans Cybern
Abdel-Basset M, Chang V, Mohamed R (2021) A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems. Neural Comput Appl 33(17):10685–10718
Brempong EA, Kornblith S, Chen T, Parmar N, Minderer M, Norouzi M (2022) Denoising pretraining for semantic segmentation. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 4175–4186
Baluja S (2017) Hiding images in plain sight: deep steganography. Adv Neural Inf Process Syst 30:2069–2079
Baluja S (2019) Hiding images within images. IEEE Trans Pattern Anal Mach Intell 42(7):1685–1697
Thai TH, Cogranne R, Retraint F (2014) Statistical model of quantized dct coefficients: application in the steganalysis of jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993
Denemark T, Fridrich J (2015) Side-informed steganography with additive distortion. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp 1–6. IEEE
Li B, Tan S, Wang M, Huang J (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forensics Secur 9(8):1264–1277
Bandyopadhyay SK, Bhattacharyya D, Ganguly D, Mukherjee S, Das P (2008) A tutorial review on steganography. In: International conference on contemporary computing, vol 101, pp 105–114
Wu H-T, Cheung Y-M, Zhuang Z, Xu L, Hu J (2022) Lossless data hiding in encrypted images compatible with homomorphic processing. IEEE Trans Cybernetics. https://doi.org/10.1109/TCYB.2022.3163245
Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. International workshop on information hiding. Springer, Berlin, pp 161–177
Hayes J, Danezis G (2017) Generating steganographic images via adversarial training. arXiv preprint arXiv:1703.00371
Lu S-P, Wang R, Zhong T, Rosin PL (2021) Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 10816–10825
Xiao M, Zheng S, Liu C, Wang Y, He D, Ke G, Bian J, Lin Z, Liu T-Y (2020) Invertible image rescaling. In: Proceedings of the European conference on computer vision. Springer, Berlin. pp 126–144.
Jing J, Deng X, Xu M, Wang J, Guan Z (2021) Hinet: deep image hiding by invertible network. In: Proceedings of the IEEE/CVF international conference on computer vision, pp 4733–4742
Gonzalez RC, Woods RE et al (2002) Digit Image Process. Prentice hall, Upper Saddle River
Ulicny M, Krylov VA, Dahyot R (2020) Harmonic convolutional networks based on discrete cosine transform. arXiv preprint arXiv:2001.06570
Zhu J-Y, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp 2223–2232
Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp 248–255. IEEE
Wengrowski E, Dana K (2019) Light field messaging with deep photographic steganography. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 1515–1524
Boehm B (2014) Stegexpose-a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656
Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181–1193
Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 9543–9552
Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. International workshop on information hiding. Springer, Berlin, pp 61–76
Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random lsb embedding in continuous-tone images. In: Proceedings of the international conference on image processing, vol 3, pp 641–644. IEEE
Fridrich J, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Proceedings of the 2001 workshop on multimedia and security: new challenges, pp 27–30
Dumitrescu S, Wu X, Wang Z (2002) Detection of lsb steganography via sample pair analysis. International workshop on information hiding. Springer, Berlin, pp 355–372
Funding
This work was supported in part by Guangdong Shenzhen joint Youth Fund under Grant 2021A151511074, in part by Shenzhen Key Technical Project under Grant 2022N063, in part by National Key Research and Development Program of China under Project Number 2018AAA0100100, in part by the NSFC funds 62206073 and 62176077, in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2019Bl515120055, in part by the Shenzhen Key Technical Project under Grant 2022N001, 2020N046, in part by the Shenzhen Fundamental Research Fund under Grant JCYJ20210324132210025, and in part by the Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, L., Lu, Y., Li, J. et al. Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction. Neural Comput & Applic 35, 10909–10927 (2023). https://doi.org/10.1007/s00521-023-08274-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-023-08274-w