Advanced Search
Volume 44 Issue 5
May  2022
Turn off MathJax
Article Contents
DUAN Xintao, WANG Wenxin, LI Lei, SHAO Zhiqiang, WANG Xianfang, QIN Chuan. Image Hiding Method Based on Two-Channel Deep Convolutional Neural Network[J]. Journal of Electronics & Information Technology, 2022, 44(5): 1782-1791. doi: 10.11999/JEIT210280
Citation: DUAN Xintao, WANG Wenxin, LI Lei, SHAO Zhiqiang, WANG Xianfang, QIN Chuan. Image Hiding Method Based on Two-Channel Deep Convolutional Neural Network[J]. Journal of Electronics & Information Technology, 2022, 44(5): 1782-1791. doi: 10.11999/JEIT210280

Image Hiding Method Based on Two-Channel Deep Convolutional Neural Network

doi: 10.11999/JEIT210280
Funds:  The National Natural Science Foundation of China (U1904123, 61672354, 62072157), The Key Laboratory Foundation of Artificial Intelligence and Personalized Learning in Education of Henan Province
  • Received Date: 2021-04-06
  • Accepted Date: 2021-09-13
  • Rev Recd Date: 2021-09-13
  • Available Online: 2021-12-22
  • Publish Date: 2022-05-25
  • The existing image information hiding methods based on Deep Convolutional Neural Networks (DCNN) have the problems of poor image visual quality and low hiding capacity. Addressing such issues, an image hiding method based on a two-channel deep convolutional neural network is proposed. First, different from the previous hiding framework, the hiding method proposed in this paper includes one hiding network and two revealing networks with the same structure, and two full-size secret images can be effectively hidden and revealed at the same time is realized. Then, to improve the visual quality of the image, an improved pyramid pooling module and a preprocessing module are added to the hiding and revealing network. The test results on multiple data sets show that the proposed method has a significant improvement in visual quality compared with existing image information hiding methods. The Peak Signal-to-Noise Ratio (PSNR) and Structural SIMilarity (SSIM) values are increased by 3.75 dB and 3.61 % respectively, a relative capacity of 2 and good generalization ability are achieved.
  • loading
  • [1]
    ZHANG Chaoning, LIN Chenguo, BENZ P, et al. A brief survey on deep learning based data hiding, steganography and watermarking[EB/OL]. https://arxiv.org/abs/2103.01607, 2021.
    [2]
    KER A D. Improved detection of LSB steganography in grayscale images[C]. The 6th International Workshop on Information Hiding (IH), Toronto, Canada, 2004: 97–115.
    [3]
    FILLER T, JUDAS J, and FRIDRICH J. Minimizing additive distortion in steganography using Syndrome-Trellis Codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 920–935. doi: 10.1109/TIFS.2011.2134094
    [4]
    FRIDRICH J and FILLER T. Practical methods for minimizing embedding impact in steganography[C]. SPIE 6505, Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, USA, 2007: 13–27.
    [5]
    FRIDRICH J, GOLJAN M, LISONEK P, et al. Writing on wet paper[C]. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, USA, 2005: 328–340.
    [6]
    TANG Weixuan, LI Bin, BARNI M, et al. An automatic cost learning framework for image steganography using deep reinforcement learning[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 952–967. doi: 10.1109/TIFS.2020.3025438
    [7]
    ZHANG Chaoning, BENZ P, KARJAUV A, et al. UDH: Universal Deep Hiding for steganography, watermarking, and light field messaging[J]. Advances in Neural Information Processing Systems, 2020, 33: 10223–10234.
    [8]
    LUO Xiyang, ZHAN Ruohan, CHANG Huiwen, et al. Distortion agnostic deep watermarking[C]. 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, USA, 2020: 13545–13554.
    [9]
    BALUJA S. Hiding images within images[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020, 42(7): 1685–1697. doi: 10.1109/TPAMI.2019.2901877
    [10]
    CHEN Feng, XING Qinghua, and LIU Fuxian. Technology of hiding and protecting the secret image based on two-channel deep hiding network[J]. IEEE Access, 2020, 8: 21966–21979. doi: 10.1109/ACCESS.2020.2969524
    [11]
    SZEGEDY C, VANHOUCKE V, IOFFE S, et al. Rethinking the inception architecture for computer vision[C]. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, USA, 2016: 2818–2826.
    [12]
    YU Chong. Attention based data hiding with generative adversarial networks[C]. The 34th AAAI Conference on Artificial Intelligence (AAAI), New York, USA, 2020: 1120–1128.
    [13]
    ZHU Junyan, PARK T, ISOLA P, et al. Unpaired image-to-image translation using cycle-consistent adversarial networks[C]. 2017 IEEE International Conference on Computer Vision (ICCV), Venice, Italy, 2017: 2242–2251.
    [14]
    ZHOU Bolei, KHOSLA A, LAPEDRIZA À, et al. Learning deep features for discriminative localization[C]. 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, USA, 2016: 2921–2929.
    [15]
    ZHOU Bolei, KHOSLA A, LAPEDRIZA À, et al. Object detectors emerge in deep scene CNNs[EB/OL]. http://arxiv.org/abs/1412.6856, 2015.
    [16]
    ZHAO Hengshuang, SHI Jianping, QI Xiaojuan, et al. Pyramid scene parsing network[C]. 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, USA, 2017: 6230–6239.
    [17]
    RONNEBERGER O, FISCHER P, and BROX T. U-Net: Convolutional networks for biomedical image segmentation[C]. The 18th International Conference on Medical Image Computing and Computer-Assisted Intervention, Munich, Germany, 2015: 234–241.
    [18]
    HORÉ A and ZIOU D. Image quality metrics: PSNR vs. SSIM[C]. The 20th International Conference on Pattern Recognition, Istanbul, Turkey, 2010: 2366–2369.
    [19]
    YE Yuanxin, SHAN Jie, BRUZZONE L, et al. Robust registration of multimodal remote sensing images based on structural similarity[J]. IEEE Transactions on Geoscience and Remote Sensing, 2017, 55(5): 2941–2958. doi: 10.1109/TGRS.2017.2656380
    [20]
    BOEHM B. StegExpose - A tool for detecting LSB steganography[EB/OL]. http://arxiv.org/abs/1410.6656, 2014.
    [21]
    BOROUMAND M, CHEN Mo, and FRIDRICH J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(5): 1181–1193. doi: 10.1109/TIFS.2018.2871749
    [22]
    WU Kuochen and WANG C. Steganography using reversible texture synthesis[J]. IEEE Transactions on Image Processing, 2015, 24(1): 130–139. doi: 10.1109/TIP.2014.2371246
    [23]
    YANG Jianhua, LIU Kai, KANG Xiangui, et al. Spatial image steganography based on generative adversarial network[OL]. http://arxiv.org/abs/1804.07939, 2018.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(6)

    Article Metrics

    Article views (804) PDF downloads(126) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return