Abstract
Deep learning-based methods have been popular in multimedia analysis tasks, including classification, detection, segmentation, and so on. In addition to conventional applications, this model can be widely used for cover communication, i.e., information hiding. This article presents a review of deep learning-based covert communication scheme for protecting digital contents, devices, and models. In particular, we discuss the background knowledge, current applications, and constraints of existing deep learning-based information hiding schemes, identify recent challenges, and highlight possible research directions. Further, major role of deep learning in the area of information hiding are highlighted. Then, the contribution of surveyed scheme is also summarized and compared in the context of estimation of design objectives, approaches, evaluation metric, and weaknesses. We believe that this survey can pave the way to new research in this crucial field of information hiding in deep-learning environment.
- [1] . 2020. Data hiding: Current trends, innovation, and potential challenges. ACM Trans. Multimed. Comput. Commun. Appl. 16, 3s (2020), 1–16.
DOI: Google ScholarDigital Library - [2] . 2021. Robust high-capacity watermarking over online social network shared images. IEEE Trans. Circ. Syst. Video Technol. 31, 3 (2021), 1208–1221.Google ScholarCross Ref
- [3] . 2020. Reversible data hiding based on multiple histograms modification and deep neural networks. Signal Process. Image Commun. 92 (2020).
DOI: Google ScholarCross Ref - [4] . 2021. Water chaotic fruit fly optimization-based deep convolutional neural network for image watermarking using wavelet transform. Multimed. Tools Appl. (2021).
DOI: Google ScholarCross Ref - [5] . 2017. Medical Image Watermarking: Techniques and Applications. Springer International Publishing.Google ScholarDigital Library
- [6] . 2021. A survey on healthcare data: A security perspective. ACM Trans. Multimed. Comput. Commun. Appl. 17, 2s (2021), 1–26.
DOI: Google ScholarDigital Library - [7] . 2022. Towards integrating image encryption with compression : A survey. ACM Trans. Multimed. Comput. Commun. Appl. 18, 3 (2022), 1–21.Google ScholarDigital Library
- [8] . 2020. Coronavirus disease 2019 (COVID-19): A systematic review of imaging findings in 919 patients. Am. J. Roentgenol. 215, 1 (2020), 1–7.
DOI: Google ScholarCross Ref - [9] . 2021. SDH : Secure data hiding in fused medical image for smart healthcare. IEEE Trans. Comput. Soc. Syst. (2021), 1–9.
DOI: Google ScholarCross Ref - [10] . 2022. RDH-DES : Reversible data hiding over distributed encrypted-image servers based on secret sharing ching-nung yang. ACM Trans. Multimed. Comput. Commun. Appl. (2022).
DOI: Google ScholarDigital Library - [11] . 2002. Human computer interaction: An information security perspectives. IFIP Adv. Inf. Commun. Technol. 86 (2002), 535–545.
DOI: Google ScholarCross Ref - [12] . 2017. Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Trans. Ind. Informatics 13, 3 (2017), 1227–1237.
DOI: Google ScholarCross Ref - [13] . 2016. Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Comput 20, 9 (2016), 3679–3686.
DOI: Google ScholarDigital Library - [14] . 2020. Analysis of watermarking framework for color image through a neural network-based approach. Complex Intell. Syst. 6, 1 (2020), 213–220.
DOI: Google ScholarCross Ref - [15] . 2017. A robust blind watermarking using convolutional neural network. arXiv (2017) 1–5. https://arxiv.org/pdf/1704.03248.pdf.Google Scholar
- [16] . 2018. Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur. Gener. Comput. Syst. 86 (2018), 926–939.
DOI: Google ScholarDigital Library - [17] . 2016. A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl. 77, 4 (2016), 4863–4882.
DOI: Google ScholarCross Ref - [18] . 2020. An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 152 (2020), 72–80.
DOI: Google Scholar - [19] . 2019. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed. Tools Appl. 78, 3 (2019), 3457–3470.
DOI: Google ScholarDigital Library - [20] . 2020. Compression-then-encryption based secure watermarking technique for smart healthcare system. IEEE Multimed 27, 4 (2020), 133–134.
DOI: Google ScholarDigital Library - [21] 2018. Protecting intellectual property of deep neural networks with watermarking. In Proceedings of the ACM Asia Conference on Computer Communication Security (ASIACCS’18). 159–171.
DOI: Google ScholarDigital Library - [22] . 2018. Digital watermarking for deep neural networks. Int. J. Multimed. Inf. Retr. 7, 1 (2018), 3–16.
DOI: Google ScholarCross Ref - [23] . 2018. A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl 77, 3 (2018), 3597–3622.
DOI: Google ScholarDigital Library - [24] . 2021. Watermarking techniques for medical data authentication: A survey. Multimed. Tools Appl. 80 (2021), 30165–30197.
DOI: Google ScholarDigital Library - [25] . 2018. Neural network based robust image watermarking technique in LWT domain. J. Intell. Fuzzy Syst. 34, 3 (2018), 1691–1700.
DOI: Google ScholarDigital Library - [26] . 2021. A generalized deep neural network approach for digital watermarking analysis. IEEE Trans. Emerg. Top. Comput. Intell. (2021), 1–15.
DOI: Google ScholarCross Ref - [27] . 2020. Digital image watermarking based on ANN and least significant bit. Inf. Secur. J 29, 1 (2020), 30–39.
DOI: Google ScholarCross Ref - [28] . 2020. Using deep learning for image watermarking attack. Signal Process. Image Commun. 90 (2020), 116019.
DOI: Google ScholarCross Ref - [29] . 2019. Deep learning methods and applications. In Deep Learning: Convergence to Big Data Analytics, SpringerBriefs in Computer Science. Springer Singapore, 2019, 31–42.Google Scholar
- [30] . 2018. Fault identification based on PD ultrasonic signal using RNN, DNN, and CNN. 2018 Condition Monitring and Diagnosis. IEEE, 1–6.Google Scholar
- [31] . 2019. A robust image zero-watermarking using convolutional neural networks. In Proceedings of the 7th International Workshop on Biometrics Forensics (IWBF’19).
DOI: Google ScholarCross Ref - [32] . 2017. Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput. Secur. 65 (2017), 247–268.
DOI: Google ScholarDigital Library - [33] . 2020. Adaptive control of embedding strength for image watermarking using neural networks. arXiv (2020), 1–4.
DOI: Google ScholarCross Ref - [34] . 2019. Robust image watermarking framework powered by convolutional encoder-decoder network. In Proceedings of the Digital Image Computing: Techniques and Applications (DICTA’19).
DOI: Google ScholarCross Ref - [35] 2018. Robust and high capacity watermarking for image based on DWT-SVD and CNN. In Proceedings of the 13th IEEE Conference Industrial Electronics and Applications (ICIEA’18). 1233–1237.
DOI: Google ScholarCross Ref - [36] . 2019. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. (N.Y.) 479 (2019), 432–447, 2019.
DOI: Google ScholarCross Ref - [37] . 2020. Digital watermarking using deep neural network. Int. J. Mach. Learn. Comput. 10, 2 (2020), 277–282.
DOI: Google Scholar - [38] . 2021. A survey of deep neural network watermarking techniques. Neurocomputing 461, (2021), 171–193.
DOI: Google ScholarDigital Library - [39] . 2021. Data hiding with deep learning: A survey unifying digital watermarking and steganography. Retrieved from http://arxiv.org/abs/2107.09287Google Scholar
- [40] . 2021. A brief survey on deep learning based data hiding, steganography and watermarking. Retrieved from http://arxiv.org/abs/2103.01607Google Scholar
- [41] . 2013. Fuzzy neural based copyright protection scheme for superresolution. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. 328–332.
DOI: Google ScholarDigital Library - [42] . 2011. Adaptative image watermarking scheme based on neural network. Int. J. Eng. Sci. Technol. 3, 1 (2011), 748–756.Google Scholar
- [43] . 2011. Digital watermarking method based on fuzzy image segmentation technique. In Proceedings of the IEEE International Symposium on Signal Processing and Information Technology. 218–223.Google Scholar
- [44] . 2017. Efficient PVO-based reversible data hiding using multistage blocking and prediction accuracy matrix. J. Vis. Commun. Image Represent. 46 (2017), 58–69.
DOI: Google ScholarDigital Library - [45] . 2019. Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Processing 163 (2019), 238–246.
DOI: Google ScholarDigital Library - [46] . 2015. Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 10, 9 (2015), 2016–2027.Google ScholarDigital Library
- [47] . 2017. Deep convolutional neural network architecture with reconfigurable computation patterns. IEEE Trans. Very Large Scale Integr. Syst. 25, 8 (2017), 2220–2223.
DOI: Google ScholarDigital Library - [48] . 2018. DeepSigns: A generic watermarking framework for protecting the ownership of deep learning models. arXiv (2018), 1–13.
DOI: Google ScholarCross Ref - [49] . 2019. An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J. King Saud Univ. Comput. Inf. Sci. 2019.
DOI: Google ScholarDigital Library - [50] . 2019. Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process. 169 (2019), 107421.
DOI: Google ScholarDigital Library - [51] . 2021. Machine learning based blind color image watermarking scheme for copyright protection ✩. Pattern Recogn. Lett. 145 (2021), 171–177.
DOI: Google ScholarDigital Library - [52] . 2014. Adaptive color image watermarking by the use of quaternion image moments. Expert Syst. Appl. 41, 14 (2014), 6408–6418.
DOI: Google ScholarCross Ref - [53] . 2020. Improving the management of medical imaging by using robust and secure dual watermarking. Biomed. Signal Process. Control 56 (2020), 101695.
DOI: Google ScholarCross Ref - [54] . 2007. Color image watermark extraction based on support vector machines. Inf. Sci. (N.Y.) 177 (2007), 550–569.
DOI: Google ScholarCross Ref - [55] . 2016. Watermark compression in medical image watermarking using lempel-ziv-welch (LZW) lossless compression technique. J. Digit. Imaging 29, 2 (2016), 216–225.
DOI: Google ScholarCross Ref - [56] 2018. Robust image watermarking scheme using bit-plane of hadamard coefficients. Multimed. Tools Appl. 77, 2 (2018), 2033–2055.
DOI: Google ScholarDigital Library - [57] . 2018. Robust color image watermarking technique in the spatial domain. Soft Comput. 22, 1 (2018), 91–106.
DOI: Google ScholarDigital Library - [58] . 2016. Robust blind image watermarking algorithm based on singular value quantization. In Proceedings of the ACM International Conference. 277–280.
DOI: Google ScholarDigital Library - [59] . 2021. Robust spatial-spread deep neural image watermarking. In Proceedings of the IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’21). 62–70.Google Scholar
- [60] . 2018. HiDDeN: Hiding data with deep networks. In Proceedings of the European Conference on Computer Vision (ECCV’18). 682–697.
DOI: Google ScholarCross Ref - [61] . 2020. Distortion agnostic deep watermarking. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 13545–13554.
DOI: Google ScholarCross Ref - [62] . 2020. ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 146 (2020).
DOI: Google ScholarDigital Library - [63] . 2021. A new approach of ECG steganography and prediction using deep learning. Biomed. Signal Process. Control 64 (2020), 102151.
DOI: Google ScholarCross Ref - [64] . 2010. A color image watermarking scheme resistant against geometrical attacks. Radioengineering 19, 1 (2010), 62–67.Google Scholar
- [65] . 2012. A non-blind color image watermarking scheme resistent against geometric attacks. Radioengineering 21, 4 (2012), 1246–1251.Google Scholar
- [66] . 2011. DC coefficients based watermarking technique for color images using singular value decomposition. Int. J. Comput. Electr. Eng. 3, 1 (2011), 8–16.
DOI: Google ScholarCross Ref - [67] . 2008. Color image copyright protection digital watermarking algorithm based on DWT & DCT. In Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. 1–4.Google ScholarCross Ref
- [68] . 2015. A new robust color image watermarking scheme based on 3D-DCT. World J. Eng. Technol. 3 (2015), 177–183.Google ScholarCross Ref
- [69] . 2014. A blind watermarking technique for color image based on SVD with circulation. J. Softw. 9, 7 (2014), 1749–1756.
DOI: Google ScholarCross Ref - [70] . 2014. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans. Inf. Forensics Secur. 9, 7 (2014), 1108–1119.
DOI: Google ScholarDigital Library - [71] . 2013. Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems. IEEE Trans. Biomed. Eng 60, 12 (2013), 3322–3330.
DOI: Google ScholarCross Ref - [72] . 2014. Discrete wavelet transform and singular value decomposition based ECG steganography for secured patient information transmission. J. Med. Syst. 38 (2014), 1–11.
DOI: Google ScholarDigital Library - [73] . 2014. Reversible watermarking scheme for medical image based on differential evolution. Expert Syst. Appl 41, 7 (2014), 3178–3188.
DOI: Google ScholarDigital Library - [74] . 2014. Hiding patients confidential datainthe ECG signal viaa transform-domain quantization scheme topical collection on mobile systems. J. Med. Syst 38, 6 (2014), 1–8.
DOI: Google ScholarDigital Library - [75] . 2015. A highly secure oblivious sparse coding-based watermarking system for ownership verification. Expert Syst. Appl 42, 4 (2015), 2224–2233.
DOI: Google ScholarDigital Library - [76] . 2016. Integer-to-integer wavelet transform based ECG steganography for securing patient confidential information. Procedia Technol. 24 (2016), 1039–1047.
DOI: Google ScholarCross Ref - [77] . 2016. Imperceptibility - robustness tradeoff studies for ECG steganography using continuous ant colony optimization. Expert Syst. Appl. 49 (2016), 123–135.
DOI: Google ScholarDigital Library - [78] . 2006. Curvelets-based ecg steganography for data security. Multiscale Model. Simul 5, 3 (2006), 861–899.
DOI: Google ScholarCross Ref - [79] . 2017. Walsh-hadamard-based 3D steganography for protecting sensitive information in point-of-care. IEEE Trans. Biomed. Eng 64, 9 (2017), 2186–2195.
DOI: Google ScholarCross Ref - [80] . 2021. Data hiding in encryption—Compression domain. Complex Intell. Syst. (2021).
DOI: Google ScholarCross Ref - [81] . 2016. Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed. Tools Appl. 75, 14 (2016), 8381–8401.
DOI: Google ScholarDigital Library - [82] . 2020. Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption. In Advances in VLSI, Communication, and Signal Processing. Lecture Notes in Electrical Engineering, D. Dutta, H. Kar, C. Kumar, and V. Bhadauria (eds). Springer Singapore, 897–905.Google Scholar
- [83] . 2021. QDCT-based blind color image watermarking with aid of GWO and DnCNN for performance improvement. IEEE Access 9, 155138–155152, 2021.
DOI: Google ScholarCross Ref - [84] . 2019. Fast and robust watermarking method based on DCT specific location. IEEE Access 7 (2019), 100706–100718.Google ScholarCross Ref
- [85] . 2018. A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput. 22, 1 (2018), 47–65.
DOI: Google ScholarDigital Library - [86] . 2018. Quaternion discrete fractional random transform for color image adaptive watermarking. Multimed. Tools Appl. 77 (2018), 20809–20837.Google ScholarDigital Library
- [87] . 2019. A new DCT-based robust image watermarking method using teaching-learning-Based optimization. J. Inf. Secur. Appl. 47 (2019), 28–38.
DOI: Google ScholarDigital Library - [88] . 2020. Watermarking neural networks with watermarked images. IEEE Trans. Circ. Syst. Video Technol. 8215 (2020), 1.
DOI: Google ScholarCross Ref - [89] . 2017. Embedding watermarks into deep neural networks. In Proceedings of the ACM on International Conference on Multimedia Retrieval (ICMR’17). 269–277.Google Scholar
- [90] . 2020. Reversible watermarking in deep convolutional neural networks for integrity authentication. In Proceedings of the 28th ACM International Conference on Multimedia. 2273–2280.
DOI: Google ScholarDigital Library - [91] . 2021. Keynet: An asymmetric key-style framework for watermarking deep learning models. Appl. Sci. 11, 3 (2021), 1–22.
DOI: Google ScholarCross Ref - [92] S. Mastorakis. 2021. DLWIoT: Deep learning-based watermarking for authorized IoT onboarding. In 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA. 1–7.
DOI: Google ScholarDigital Library - [93] . 2013. Modified algorithm for digital image watermarking using combined DCT and DWT. Int. J. Inf. Comput. Technol. 3(7) (2013), 691–700.Google Scholar
- [94] . 2015. A secure non-blind block based digital image watermarking technique using DWT and DCT. In Proceedings of the IEEE Conference on Advances in Computing, Communications and Informatics (ICACCI’15). 2042–2048.Google Scholar
- [95] . 2015. A robust digital watermarking for gray scale image. Int. J. Technol. Res. Eng 2, 10 (2015), 2440–2443.Google Scholar
- [96] . 2014. A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition. Turkish J. Electr. Eng. Comput. Sci 22, 5 (2014), 1354–1366.
DOI: Google ScholarCross Ref - [97] . 2011. Non blind image watermarking based on similarity in contourlet domain. In Proceedings of the IEEE-International Conference on Recent Trends in Information Technology (ICRTIT’11). 1277–1282.
DOI: Google ScholarCross Ref - [98] . 2015. A secure transmission of medical images by single label SWT and SVD based non-blind watermarking technique. INFOCOMP J. Comp. Sci. 14, 1 (2015), 50–59.
DOI: Google ScholarCross Ref - [99] . 2014. Non blind watermarking technique using enhanced one time pad in DWT domain. In Proceedings of the International Conference on Computing, Communication, and Networking Technologies (ICCCNT’14). 1–6.Google Scholar
- [100] . 2021. Mapping based residual convolution neural network for non-embedding and blind image watermarking. J. Inf. Secur. Appl 59 (2021), 102820.
DOI: Google ScholarCross Ref - [101] . 2020. A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis. Comput. 36, 1 (2020), 19–37.
DOI: Google ScholarDigital Library - [102] . 2018. A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed. Tools Appl. 77, 11 (2018), 13197–13224.
DOI: Google ScholarDigital Library - [103] , and Araghi. 2018. A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst. Appl. 112 (2018), 208–228.
DOI: Google ScholarCross Ref - [104] . 2019. WACA : A new blind robust watermarking method based on arnold cat map and amplified pseudo-noise strings with weak correlation. Multimed. Tools Appl 78 (2019), 19163–19179.Google ScholarDigital Library
- [105] . 2019. Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing 337 (2019), 191–202.
DOI: Google ScholarDigital Library - [106] . 2019. A new scheme for watermark extraction using combined noise-induced resonance and support vector machine with PCA based feature reduction. Multimed. Tools Appl 78 (2019), 23203–23224.Google ScholarDigital Library
Index Terms
- A Comprehensive Study of Deep Learning-based Covert Communication
Recommendations
Visible watermarking with reversibility of multimedia images for ownership declarations
Digital watermarking technology is primarily the joining of the rightful owner of the protected media. Once the media are suspected to be illegally used, an open algorithm can be used to extract the digital watermark for the purpose of showing the media'...
Tampering with a watermarking-based image authentication scheme
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of ...
Color image ownership protection based on spectral domain watermarking using QR codes and QIM
Some watermarking authentication methods based on spectral domain using QR codes and Quantization Index Modulation (QIM) are proposed for ownership protection in color images. The QR code is created with the owners' information and used as binary ...
Comments