Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Coverless real-time image information hiding based on image block matching and dense convolutional network

Published: 01 February 2020 Publication History

Abstract

Information security has become a key issue of public concern recently. In order to radically resist the decryption and analysis in the field of image information hiding and significantly improve the security of the secret information, a novel coverless information hiding approach based on deep learning is proposed in this paper. Deep learning can select the appropriate carrier according to requirements to achieve real-time image data hiding and the high-level semantic features extracted by CNN are more accurate than the low-level features. This method does not need to employ the designated image for embedding the secret data but transfer a set of real-time stego-images which share one or several visually similar blocks with the given secret image. In this approach, a group of real-time images searched online are segmented according to specific requirements. Then, the DenseNet is used to extract the high-level semantic features of each similar block. At the same time, a robust hash sequence with feature sequence, DC and location is generated by DCT. The inverted index structure based on the hash sequence is constructed to attain real-time image matching efficiently. At the sending end, the stego-images are matched and sent through feature retrieval. At the receiving end, the secret image can be recovered by extracting similar blocks through the received stego-images and stitching the image blocks according to the location information. Experimental results demonstrate that the proposed method without any modification traces provides better robustness and has higher retrieval accuracy and capacity when compared with some existing coverless image information hiding.

References

[1]
Ma W, Qin J, Xiang X, Tan Y, Luo Y, and Xiong NN Adaptive median filtering algorithm based on divide and conquer and its application in CAPTCHA recognition Comput. Mater. Contin. 2019 58 3 665-677
[2]
Qi J, Sun X, Xiang X, and Niu C Principal feature selection and fusion method for image steganalysis J. Electron. Imag. 2009 18 3 1-14
[3]
Zhou, Z., Sun, H., R.H., Chen, X., Sun, X.: Coverless image steganography without embedding. Cloud Computing and Security, pp. 123–132 (2016)
[4]
Ni J, Ye J, and Yi Y Deep learning hierarchical representations for image steganalysis IEEE Trans. Inf. Forensics Secur. 2017 12 11 2545-2557
[5]
Gao H Summary of research on key technologies of information hiding Electron. World 2016 9 146-148
[6]
Tan Y, Qin J, Xiang X, Ma W, Pan W, and Xiong NN A robust watermarking scheme in YCbCr color space based on channel coding IEEE Access. 2019 7 1 25026-25036
[7]
Bilal, M., Imtiaz, S, Abdul, W., Ghouzali, S.: Zero-steganography using DCT and spatial domain. In: 2013 ACS International Conference on Computer Systems and Applications (AICCSA) (2013)
[8]
Zhou Z, Cao Y, and Sun X Coverless information hiding based on bag-of-words model of image J. Appl. Sci. Electron. Inf. Eng. 2016 34 5 527-536
[9]
Guo Y, Li C, and Liu Q R2N: a novel deep learning architecture for rain removal from single image Comput. Mater. Contin. 2019 58 3 829-843
[10]
Zhou Z, Jonathan W, and Sun X Encoding multiple contextual clues for partial-duplicate image retrieval Pattern Recognit. Lett. 2017 15 6 1-9
[11]
Zhou Z, Mu Y, and Jonathan W Coverless image steganography using partial-duplicate image retrieval Soft Comput. 2018 23 4927-4938
[12]
Wang J, Qin J, Xiang X, Tan Y, and Pan NCAPTCHA recognition based on deep convolutional neural networkMath. Biosci. Eng.20191655851-58614032654
[13]
Bay H, Ess A, Tuytelaars T, and Gool LV Speeded-up robust features (SURF) Comput. Vis. Image Underst. 2018 110 3 346-359
[14]
Xu F, Zhang X, Xin Z, and Yang A Investigation on the Chinese text sentiment analysis based on convolutional neural networks in deep learning Comput. Mater. Contin. 2019 58 3 697-709
[15]
Zhang J, Lu C, Li X, Kim H, and Wang J A full convolutional network based on DenseNet for remote sensing scene classification Math. Biosci. Eng. 2019 16 5 3345-3367
[16]
Zhang X, Peng F, and Long M Robust coverless image steganography based on DCT and LDA topic classification IEEE Trans. Multimed. 2018 20 12 3223-3238
[17]
Wang S, Sun J, Phillips P, Zhao G, and Zhang Y Polarimetric synthetic aperture radar image segmentation by convolutional neural network using graphical processing units Real-Time Image Process. 2018 15 3 631-642
[18]
Qi, L., Yu, J., Zhou, Z.: An invocation cost optimization method for web services in cloud environment. Sci. Program. (2017)
[19]
Zhou, Z., Jonathan, W., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data (2019)
[20]
Pan L, Qin J, Chen H, Xiang X, Li C, and Chen R Image augmentation-based food recognition with convolutional neural networks Comput. Mater. Contin. 2019 59 1 297-313
[21]
Pan W, Qin J, Xiang X, Wu Y, Tan Y, and Xiang L A smart mobile diagnosis system for citrus diseases based on densely connected convolutional networks IEEE Access. 2019 7 87534-87542
[22]
Xu, Y., Qi, L., Dou, W., Yu, J.: Privacy-preserving and scalable service recommendation based on SimHash in a distributed cloud environment. Complexity (2017)
[23]
Zhang, J., Jin, X., Sun, J., Wang, J., Sangaiah, A.K.: Spatial and semantic convolutional features for robust visual object tracking. Multimed. Tools Appl. (2018)
[24]
Qin J, Li H, Xiang X, Tan Y, Pan W, and Xiong NN An encrypted image retrieval method based on harris corner optimization and LSH in cloud computing IEEE Access. 2019 7 1 24626-24633
[25]
Qi L, Zhang X, Dou W, and Ni Q A distributed locality-sensitive hashing based approach for cloud service recommendation from multi-source data IEEE J. Select. Areas Commun. 2017 35 11 2616-2624
[26]
Xiang L, Shen X, Qin J, and Hao W Discrete multi-graph hashing for large-scale visual search Neural Process. Lett. 2019 49 3 1055-1069
[27]
Yuan C, Xia Z, and Sun X Coverless image steganography based on SIFT and BOF J. Internet Technol. 2017 18 2 435-442
[28]
Li H, Qin J, Xiang X, Pan L, Ma W, and XIONG NN An efficient image matching algorithm based on adaptive threshold and RANSAC IEEE Access. 2018 6 1 66963-66971

Cited By

View all
  • (2024)A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF FeaturesSecurity and Communication Networks10.1155/2024/50346402024Online publication date: 1-Jan-2024
  • (2024)Generative Image Steganography Based on Guidance Feature DistributionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/362529720:11(1-18)Online publication date: 12-Sep-2024
  • (2024)The analysis of Iris image acquisition and real-time detection system using convolutional neural networkThe Journal of Supercomputing10.1007/s11227-023-05629-x80:4(4500-4532)Online publication date: 1-Mar-2024
  • Show More Cited By

Index Terms

  1. Coverless real-time image information hiding based on image block matching and dense convolutional network
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image Journal of Real-Time Image Processing
            Journal of Real-Time Image Processing  Volume 17, Issue 1
            Feb 2020
            187 pages

            Publisher

            Springer-Verlag

            Berlin, Heidelberg

            Publication History

            Published: 01 February 2020
            Accepted: 12 September 2019
            Received: 25 July 2019

            Author Tags

            1. Coverless information hiding
            2. Data hiding
            3. Deep learning
            4. DCT
            5. DenseNet
            6. Real-time image processing

            Qualifiers

            • Research-article

            Funding Sources

            • National Natural Science Foundation of China
            • Key Research and Development Plan of Hunan Province
            • Science Research Projects of Hunan Provincial Education Department
            • Science and Technology Innovation Platform and Talent Plan of Hunan Provincial Education Department

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 23 Dec 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF FeaturesSecurity and Communication Networks10.1155/2024/50346402024Online publication date: 1-Jan-2024
            • (2024)Generative Image Steganography Based on Guidance Feature DistributionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/362529720:11(1-18)Online publication date: 12-Sep-2024
            • (2024)The analysis of Iris image acquisition and real-time detection system using convolutional neural networkThe Journal of Supercomputing10.1007/s11227-023-05629-x80:4(4500-4532)Online publication date: 1-Mar-2024
            • (2024)To deliver more information in coverless information hidingMultimedia Tools and Applications10.1007/s11042-023-15263-783:3(7215-7229)Online publication date: 1-Jan-2024
            • (2023)A 3D Model Information Hiding Algorithm Based on Grid SaliencyProceedings of the 7th International Conference on Computer Science and Application Engineering10.1145/3627915.3627928(1-6)Online publication date: 17-Oct-2023
            • (2023)Large capacity generative image steganography via image style transfer and feature-wise deep fusionApplied Intelligence10.1007/s10489-023-04993-853:23(28675-28693)Online publication date: 1-Dec-2023
            • (2022)Coverless image steganography using morphed face recognition based on convolutional neural networkEURASIP Journal on Wireless Communications and Networking10.1186/s13638-022-02107-52022:1Online publication date: 29-Mar-2022
            • (2022)Humanoid robot runs maze mode using depth-first traversal algorithmMultimedia Tools and Applications10.1007/s11042-022-13729-882:8(11847-11871)Online publication date: 9-Sep-2022
            • (2022)Humanoid robot runs up-down stairs using zero-moment with supporting polygons controlMultimedia Tools and Applications10.1007/s11042-022-13723-082:9(13275-13305)Online publication date: 9-Sep-2022
            • (2022)An effective shearlet-based anisotropic diffusion technique for despeckling ultrasound medical imagesMultimedia Tools and Applications10.1007/s11042-022-13642-082:7(10491-10514)Online publication date: 3-Sep-2022
            • Show More Cited By

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media