Skip to main content

Advertisement

PUA-Net: end-to-end information hiding network based on structural re-parameterization

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Image hiding aims to secretly embed secret information into a cover image and then recover the hidden data with minimal or no loss at the receiving end. Many works on steganography and deep learning have proved the huge prospects of deep learning in the field of image information hiding. However, current deep learning-based steganography research exposes significant limits, among which key issues such as how to improve embedding capacity, imperceptibility, and robustness remain crucial for image-hiding tasks. This article introduces PUA-Net, a new end-to-end neural network model for image steganography. PUA-Net consists of three main components: 1) the CbDw attention module, 2) the attention gate module, and 3) the partial combination convolution module. Each of these components utilizes structural reparameterization operations. In addition, we propose a residual image minimization loss function and use a combination of loss functions based on this loss function. This model can seamlessly embed bit stream information of different capacities into images to generate stego images that are imperceptible to the human eye. Experimental results confirm the effectiveness of our model, achieving an RS-BPP of 5.98 when decoding the extracted secret information and recovering the cover image. When only the extracted secret information is output, the model achieves a maximum RS-BPP of 6.94. Finally, experimental results show that our PUA-Net model outperforms deep learning-based steganography approaches on COCO, ImageNet, and BOSSbase datasets, including GAN-based methods such as Stegastamp and SteganoGAN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Algorithm 1
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability and access

The data that support the findings of this study are available from the author, Feng Lin, upon reasonable request.

References

  1. Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multim Tools Appl 78(3)

  2. Arjovsky M, Chintala S, Bottou L (2017) Wasserstein gan. arXiv:1701.07875

  3. Asikuzzaman M, Pickering MR (2017) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 1–1

  4. Baluja S (2017) Hiding images in plain sight: Deep steganography. Adv Neural Inf Process Syst 30

  5. Baluja S (2019) Hiding images within images. IEEE Trans Pattern Anal Mach Intell 42(7):1685–1697

    Article  MATH  Google Scholar 

  6. Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783–791

    Article  MATH  Google Scholar 

  7. Bas P, Filler T, Pevnỳ T (2011) “break our steganographic system”: the ins and outs of organizing boss. In: International workshop on information hiding. Springer, pp 59–70

  8. Boehm B (2014) Stegexpose-a tool for detecting lsb steganography. arXiv:1410.6656

  9. Boroumand M, Chen M, Fridrich J (2018) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensics Secur 14(5):1181–1193

    Article  MATH  Google Scholar 

  10. Chen K, Zhou H, Zhou W, Zhang W, Yu N (2018) Defining cost functions for adaptive jpeg steganography at the microscale. IEEE Trans Inf Forensics Secur 14(4):1052–1066

    Article  MATH  Google Scholar 

  11. Ding X, Zhang X, Ma N, Han J, Ding G, Sun J (2021) Repvgg: Making vgg-style convnets great again. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. pp 13733–13742

  12. Fang H, Jia Z, Ma Z, Chang EC, Zhang W (2022) Pimog: An effective screen-shooting noise-layer simulation for deep-learning-based watermarking network. In: Proceedings of the 30th ACM International Conference on Multimedia. pp 2267–2275

  13. Fang H, Zhang W, Zhou H, Cui H, Yu N (2019) Screen-shooting resilient watermarking. IEEE Trans Inf Forensics Secur 14(6):1403–1418

    Article  Google Scholar 

  14. Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art. Sec Watermark Multim Contents IV 4675:1–13

    MATH  Google Scholar 

  15. Fridrich J, Soukal D (2006) Matrix embedding for large payloads. IEEE Trans Inf Forensics Secur 1(3):390–395

    Article  MATH  Google Scholar 

  16. Girshick R (2015) Fast r-cnn. In: Proceedings of the IEEE international conference on computer vision. pp 1440–1448

  17. Hayes J, Danezis G (2017) Generating steganographic images via adversarial training. Adv Neural Inform Process Syst 30

  18. Ho CK, Li CT (2004) Semi-fragile watermarking scheme for authentication of jpeg images. In: International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., vol. 1. IEEE, pp 7–11

  19. Krizhevsky A, Sutskever I, Hinton G (2012) Imagenet classification with deep convolutional neural networks. Adv Neural Inform Process Syst 25(2)

  20. Li C, Zhang A, Liu Z, Liao L, Huang D (2015) Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multim Tools Appl 74:10581–10604

    Article  Google Scholar 

  21. Lin ET, Podilchuk CI, Delp III EJ (2000) Detection of image alterations using semifragile watermarks. In: Security and Watermarking of Multimedia Contents II, vol. 3971. SPIE, pp 152–163

  22. Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Dollár P, Zitnick CL (2014) Microsoft coco: Common objects in context. In: Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13. Springer, pp 740–755

  23. Oktay O, Schlemper J, Folgoc LL, Lee M, Heinrich M, Misawa K, Mori K, McDonagh S, Hammerla NY, Kainz B, et al (2018) Attention u-net: Learning where to look for the pancreas. arXiv:1804.03999

  24. Petitcolas F, Anderson R, Kuhn M (1999) Information hiding-a survey. Proc IEEE 87(7):1062–1078. https://doi.org/10.1109/5.771065

    Article  MATH  Google Scholar 

  25. Pevn T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. In: Information Hiding

  26. Qian Y, Dong J, Wang W, Tan T (2016) Learning and transferring representations for image steganalysis using convolutional neural network. In: 2016 IEEE international conference on image processing (ICIP). Ieee, pp 2752–2756

  27. Ronneberger O, Fischer P, Brox T (2015) U-net: Convolutional networks for biomedical image segmentation. In: Medical Image Computing and Computer-Assisted Intervention–MICCAI 2015: 18th International Conference, Munich, Germany, October 5-9, 2015, Proceedings, Part III 18. pp. 234–241. Springer

  28. Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234

    Article  MATH  Google Scholar 

  29. Shi, H., Dong, J., Wang, W., Qian, Y., Zhang, X.: Ssgan: Secure steganography based on generative adversarial networks. In: Advances in Multimedia Information Processing–PCM 2017: 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I 18, pp. 534–544. Springer (2018)

  30. Steganalysis HCDB, Westfeld A (2001) F5—a steganographic algorithm. In: Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April 25-27, 2001. Proceedings, vol. 2137. p 289

  31. Tancik M, Mildenhall B, Ng R (2020) Stegastamp: Invisible hyperlinks in physical photographs. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. pp 2117–2126

  32. Tao J, Li S, Zhang X, Wang Z (2018) Towards robust image steganography. IEEE Trans Circuits Syst Video Technol 29(2):594–600

    Article  MATH  Google Scholar 

  33. Ulyanov D, Vedaldi A, Lempitsky V (2016) Instance normalization: The missing ingredient for fast stylization

  34. Weng X, Li Y, Chi L, Mu Y (2019) High-capacity convolutional video steganography with temporal residual modeling. In: Proceedings of the 2019 on international conference on multimedia retrieval. pp 87–95

  35. Yang H, Sun X, Sun G (2009) A semi-fragile watermarking algorithm using adaptive least significant bit substitution. Inform Technol J

  36. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensics Secur 12(11):2545–2557

  37. Zhang KA, Cuesta-Infante A, Veeramachaneni K (2019) Steganogan: High capacity image steganography with gans. arXiv:1901.03892

  38. Zhang R, Isola P, Efros AA, Shechtman E, Wang O (2018) The unreasonable effectiveness of deep features as a perceptual metric. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp 586–595

  39. Zhong X, Huang PC, Mastorakis S, Shih FY (2021) An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans Multim

  40. Zhu J, Kaplan R, Johnson J, Fei-Fei L (2018) Hidden: Hiding data with deep networks. In: Proceedings of the European conference on computer vision (ECCV). pp 657–672

Download references

Funding

This work was supported by major programs incubation plan of Xizang Minzu University: 22MDZ03; Key project of the Natural Science Foundation of the Tibet Autonomous Region: image forgery detection and location based on multi semantics and attention: XZ202301ZR0042G; The National Natural Science Foundation of China (No.62262062).

Author information

Authors and Affiliations

Authors

Contributions

Feng Lin conceptualized the main methods and wrote the article. Ruxue, as the corresponding author of this article, provided theoretical guidance on methods and guidance on article writing. Shi Dong designed experimental methods. Fuhao Ding visualized the experimental results. Yixin Han organized the experimental data.

Corresponding author

Correspondence to Ru Xue.

Ethics declarations

Conflicts of Interest

The authors have no competing interests to declare that are relevant to the content of this article.

Ethical and Informed Consent for Data Used

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, F., Xue, R., Dong, S. et al. PUA-Net: end-to-end information hiding network based on structural re-parameterization. Appl Intell 55, 142 (2025). https://doi.org/10.1007/s10489-024-06081-x

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10489-024-06081-x

Keywords