Skip to main content
Log in

CSST-Net: an arbitrary image style transfer network of coverless steganography

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

A traditional image steganography embeds secret information into a cover image to generate a secret-embedded image. The modification traces imposed on the cover image can be easily detected by steganalysis tools. Coverless steganography has been introduced to solve this problem. In this study, coverless steganography is combined with image style transfer, an arbitrary image style transfer network CSST-Net is put forward, and a secret information is encoded into the parameters (an adaptive steganography matrix) of CSST-Net, which is used to restrict the style transfer. Arbitrary image style transfer is performed instructed by the adaptive steganography matrix, and the image style transfer result driven by secret information is directly synthesized. Our experiments show that CSST-Net can not only synthesize any image style transfer result with good visual effect, but also achieve good performance in capacity, anti-steganalysis and security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Shen, C.X., Zhang, H.G., Feng, D.G., et al.: Survey of information security. Sci. China Ser. F Inf. Sci. 50(3), 273–298 (2007)

    Article  Google Scholar 

  2. Wu, H.C., Wu, H.C., Wu, N.I., et al.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. IEE Proc. Vis. Image Signal Process. 152(5), 611–615 (2005)

    Article  Google Scholar 

  3. Gulati, A.N., Sawarkar, S.D.: A new steganography approach for image encryption exchange by using the least significant bit insertion. In: International Conference & Workshop on Emerging Trends in Technology (2010)

  4. Bender, W.R., Gruhl, D. et al.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)

  5. Ni, Z., Shi, Y.Q., Ansari, N., et al.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  6. Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177(15), 3099–3109 (2007)

    Article  Google Scholar 

  7. Mckeon, R.T.: Strange Fourier steganography in movies. In: IEEE International Conference on Electro/information Technology

  8. Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. J. Appl. Sci. 34(5), 527–536 (2016)

    Google Scholar 

  9. Otori, H.S.K.: Texture synthesis for mobile data communications. IEEE Comput. Graph. Appl. 29(6), 74–81 (2009)

  10. Wu, K.C., Wang, C.M.: Steganography using reversible texture synthesis. IEEE Trans. Image Process. 24(1), 130–139 (2014)

    MathSciNet  MATH  Google Scholar 

  11. Liu, M.M., Zhang, M.Q., Liu, J., et al.: Coverless information hiding based on generative adversarial networks. J. Appl. Sci. 36(002), 371–382 (2018)

    Google Scholar 

  12. Gatys, L.A., Ecker, A.S., Bethge, M.: A neural algorithm of artistic style. J. Vis. 16, 326 (2016)

  13. Chen, T.Q., Schmidt, M.: Fast patch-based style transfer of arbitrary style (2016). arXiv:abs/1612.04337

  14. Zhang, S., Su, S., Li, L., et al.: Arbitrary style transfer of facial image based on feed-forward network and its application in aesthetic QR code. Adv. Intell. Syst. Comput. 895 (2020)

  15. Kaufman, L., Rousseeuw, P.J.: Agglomerative Nesting (Program AGNES). Finding Groups in Data: An Introduction to Cluster Analysis (1990). https://doi.org/10.1002/9780470316801

  16. Yu, F., Koltun, V.: Multi-scale Context Aggregation by Dilated Convolutions (2015). arXiv:1511.07122 (2016)

  17. Lin, T.Y., Maire, M., Belongie, S., et al.: Microsoft COCO: common objects in context. Comput. Sci. Comput. Vis. Pattern Recognit. (2014). https://doi.org/10.1007/978-3-319-10602-1_48

    Article  Google Scholar 

  18. Li, Y., Fang, C., Yang, J., et al.: Diversified texture synthesis with feed-forward networks. In: IEEE Conference on Computer Vision and Pattern Recognition (2017)

  19. Yi, C., Zhou, Z., Yang, C.N., et al.: Coverless information hiding based on Faster R-CNN. In: International Conference on Security with Intelligent Computing and Big-Data Services (2018)

  20. Zhou, Z., Sun, H., Harit, R., et al.: Coverless Image Steganography Without Embedding (2015). https://doi.org/10.1007/978-3-319-27051-7_11

  21. Wang, Y., Yang, X., Liu, J.: Cross-domain image steganography based on GANs. In: International Conference on Security with Intelligent Computing and Big-Data Services (2018)

  22. Shanqin, Z., Shengqi, S., Li, L., et al.: An image style transfer network using multi-level noise coding mechanism and its application in coverless steganography. Symmetry 11, 1152–1170 (2019)

  23. Liu, Q. et al.: Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. Knowl. Based Syst. 192, 105375 (2020)

  24. Qin, J., et al.: Coverless image steganography based on generative adversarial network. Mathematics 8(9), 1394 (2020)

  25. Kuanar, S., Mahapatra, D., Bilas, M., et al.: Multi-path dilated convolution network for haze and glow removal in nighttime images. Vis. Comput. (2021). https://doi.org/10.1007/s00371-021-02071-z

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant No. 61802101 and in part by the Public Welfare Technology and Industry Project of Zhejiang Provincial Science Technology Department under Grant Nos. LGG18F020013 and LGG19F020016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Li.

Ethics declarations

Conflict of interest

The authors declared that they have no conflicts of interest to this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, S., Su, S., Li, L. et al. CSST-Net: an arbitrary image style transfer network of coverless steganography. Vis Comput 38, 2125–2137 (2022). https://doi.org/10.1007/s00371-021-02272-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-021-02272-6

Keywords

Navigation