Skip to main content
Log in

Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Image hiding secures information security in multimedia communication. Existing deep image hiding methods usually process the secret and cover information at first, and then fuse such entire processed information. This complete and rough fusion pipeline, however, severely hinders the quality improvement of the stego and revealed secret images. This paper proposes a deep image hiding architecture, named Deep Adaptive Hiding Network (DAH-Net), to gradually extract and fuse the necessary secret and cover information at the frequency and the depth (layer) extents. Specifically, we propose the Attentive Frequency Extraction method for the DAH-Net to adaptively extract the necessary secret and cover information at the frequency level. The Gradual Depth Extraction method is further proposed for the DAH-Net to gradually extract and fuse the attentive frequency secret and cover information at the depth (layer) level of the deep image hiding network. Extensive experiment results demonstrate the proposed DAH-Net is more universal and achieves state-of-the-art performances in image hiding, watermarking, and photographic steganography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Data availability

The data generated and analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. You W, Zhang H, Zhao X (2020) A siamese CNN for image steganalysis. IEEE Trans Inf Forensics Secur 16:291–306

    Article  Google Scholar 

  2. Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the European conference on computer vision, pp 657–672

  3. Yin Z, Peng Y, Xiang Y (2020) Reversible data hiding in encrypted images based on pixel prediction and bit-plane compression. IEEE Trans Depend Secure Computing 19(2):992–1002

  4. Chen F, Yuan Y, He H, Tian M, Tai H-M (2020) Multi-msb compression based reversible data hiding scheme in encrypted images. IEEE Trans Circuits Syst Video Technol 31(3):905–916

    Article  Google Scholar 

  5. Thodi DM, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730

    Article  MathSciNet  Google Scholar 

  6. Chen B, Lu W, Huang J, Weng J, Zhou Y (2020) Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans Depend Secure Computing 19(2):978–991

  7. Zhang C, Benz P, Karjauv A, Sun G, Kweon IS (2020) Udh: universal deep hiding for steganography, watermarking, and light field messaging. Adv Neural Inf Process Syst 33:10223–10234

    Google Scholar 

  8. Lu Y, Lu G, Li J, Zhang Z, Xu Y (2021) Fully shared convolutional neural networks. Neural Comput Appl 33(14):8635–8648

    Article  Google Scholar 

  9. Li Y, Zhang Z, Chen B, Lu G, Zhang D (2022) Deep margin-sensitive representation learning for cross-domain facial expression recognition. IEEE Trans Multimed. https://doi.org/10.1109/TMM.2022.3141604

    Article  Google Scholar 

  10. Lu Y, Lu G, Xu Y, Zhang B (2018) Aar-cnns: auto adaptive regularized convolutional neural networks. In: International joint conference on artificial intelligence, pp 2511–2517

  11. Lu Y, Lu G, Li J, Xu Y, Zhang D (2020) High-parameter-efficiency convolutional neural networks. Neural Comput Appl 32(14):10633–10644

    Article  Google Scholar 

  12. Xie Q, Zhang P, Yu B, Choi J (2021) Semisupervised training of deep generative models for high-dimensional anomaly detection. IEEE Trans Neural Networks Learn System 33(6):2444–2453

  13. Alom MZ, Hasan M, Yakopcic C, Taha TM, Asari VK (2020) Improved inception-residual convolutional neural network for object recognition. Neural Comput Appl 32(1):279–293

    Article  Google Scholar 

  14. Ignatov A, Byeoung-su K, Timofte R, Pouget A (2021) Fast camera image denoising on mobile gpus with deep learning, mobile ai 2021 challenge: Report. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 2515–2524

  15. Feng X, Pei W, Jia Z, Chen F, Zhang D, Lu G (2021) Deep-masking generative network: a unified framework for background restoration from superimposed images. IEEE Trans Image Process 30:4867–4882

    Article  Google Scholar 

  16. Zhang C, Hu W, Jin T, Mei Z (2018) Nonlocal image denoising via adaptive tensor nuclear norm minimization. Neural Comput Appl 29(1):3–19

    Article  Google Scholar 

  17. Das PK, Meher S, Panda R, Abraham A (2021) An efficient blood-cell segmentation for the detection of hematological disorders. IEEE Trans Cybern

  18. Abdel-Basset M, Chang V, Mohamed R (2021) A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems. Neural Comput Appl 33(17):10685–10718

    Article  Google Scholar 

  19. Brempong EA, Kornblith S, Chen T, Parmar N, Minderer M, Norouzi M (2022) Denoising pretraining for semantic segmentation. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 4175–4186

  20. Baluja S (2017) Hiding images in plain sight: deep steganography. Adv Neural Inf Process Syst 30:2069–2079

    Google Scholar 

  21. Baluja S (2019) Hiding images within images. IEEE Trans Pattern Anal Mach Intell 42(7):1685–1697

    Article  Google Scholar 

  22. Thai TH, Cogranne R, Retraint F (2014) Statistical model of quantized dct coefficients: application in the steganalysis of jsteg algorithm. IEEE Trans Image Process 23(5):1980–1993

    Article  MATH  MathSciNet  Google Scholar 

  23. Denemark T, Fridrich J (2015) Side-informed steganography with additive distortion. In: 2015 IEEE international workshop on information forensics and security (WIFS), pp 1–6. IEEE

  24. Li B, Tan S, Wang M, Huang J (2014) Investigation on cost assignment in spatial image steganography. IEEE Trans Inf Forensics Secur 9(8):1264–1277

    Article  Google Scholar 

  25. Bandyopadhyay SK, Bhattacharyya D, Ganguly D, Mukherjee S, Das P (2008) A tutorial review on steganography. In: International conference on contemporary computing, vol 101, pp 105–114

  26. Wu H-T, Cheung Y-M, Zhuang Z, Xu L, Hu J (2022) Lossless data hiding in encrypted images compatible with homomorphic processing. IEEE Trans Cybernetics. https://doi.org/10.1109/TCYB.2022.3163245

  27. Pevnỳ T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. International workshop on information hiding. Springer, Berlin, pp 161–177

    Chapter  Google Scholar 

  28. Hayes J, Danezis G (2017) Generating steganographic images via adversarial training. arXiv preprint arXiv:1703.00371

  29. Lu S-P, Wang R, Zhong T, Rosin PL (2021) Large-capacity image steganography based on invertible neural networks. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 10816–10825

  30. Xiao M, Zheng S, Liu C, Wang Y, He D, Ke G, Bian J, Lin Z, Liu T-Y (2020) Invertible image rescaling. In: Proceedings of the European conference on computer vision. Springer, Berlin. pp 126–144.

  31. Jing J, Deng X, Xu M, Wang J, Guan Z (2021) Hinet: deep image hiding by invertible network. In: Proceedings of the IEEE/CVF international conference on computer vision, pp 4733–4742

  32. Gonzalez RC, Woods RE et al (2002) Digit Image Process. Prentice hall, Upper Saddle River

    Google Scholar 

  33. Ulicny M, Krylov VA, Dahyot R (2020) Harmonic convolutional networks based on discrete cosine transform. arXiv preprint arXiv:2001.06570

  34. Zhu J-Y, Park T, Isola P, Efros AA (2017) Unpaired image-to-image translation using cycle-consistent adversarial networks. In: Proceedings of the IEEE international conference on computer vision, pp 2223–2232

  35. Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp 248–255. IEEE

  36. Wengrowski E, Dana K (2019) Light field messaging with deep photographic steganography. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 1515–1524

  37. Boehm B (2014) Stegexpose-a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656

  38. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181–1193

    Article  Google Scholar 

  39. Wu Y, AbdAlmageed W, Natarajan P (2019) Mantra-net: manipulation tracing network for detection and localization of image forgeries with anomalous features. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 9543–9552

  40. Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. International workshop on information hiding. Springer, Berlin, pp 61–76

    Google Scholar 

  41. Dumitrescu S, Wu X, Memon N (2002) On steganalysis of random lsb embedding in continuous-tone images. In: Proceedings of the international conference on image processing, vol 3, pp 641–644. IEEE

  42. Fridrich J, Goljan M, Du R (2001) Reliable detection of lsb steganography in color and grayscale images. In: Proceedings of the 2001 workshop on multimedia and security: new challenges, pp 27–30

  43. Dumitrescu S, Wu X, Wang Z (2002) Detection of lsb steganography via sample pair analysis. International workshop on information hiding. Springer, Berlin, pp 355–372

    Google Scholar 

Download references

Funding

This work was supported in part by Guangdong Shenzhen joint Youth Fund under Grant 2021A151511074, in part by Shenzhen Key Technical Project under Grant 2022N063, in part by National Key Research and Development Program of China under Project Number 2018AAA0100100, in part by the NSFC funds 62206073 and 62176077, in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2019Bl515120055, in part by the Shenzhen Key Technical Project under Grant 2022N001, 2020N046, in part by the Shenzhen Fundamental Research Fund under Grant JCYJ20210324132210025, and in part by the Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangming Lu.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, L., Lu, Y., Li, J. et al. Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction. Neural Comput & Applic 35, 10909–10927 (2023). https://doi.org/10.1007/s00521-023-08274-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-023-08274-w

Keywords

Navigation