Skip to main content
Log in

Coverless real-time image information hiding based on image block matching and dense convolutional network

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Information security has become a key issue of public concern recently. In order to radically resist the decryption and analysis in the field of image information hiding and significantly improve the security of the secret information, a novel coverless information hiding approach based on deep learning is proposed in this paper. Deep learning can select the appropriate carrier according to requirements to achieve real-time image data hiding and the high-level semantic features extracted by CNN are more accurate than the low-level features. This method does not need to employ the designated image for embedding the secret data but transfer a set of real-time stego-images which share one or several visually similar blocks with the given secret image. In this approach, a group of real-time images searched online are segmented according to specific requirements. Then, the DenseNet is used to extract the high-level semantic features of each similar block. At the same time, a robust hash sequence with feature sequence, DC and location is generated by DCT. The inverted index structure based on the hash sequence is constructed to attain real-time image matching efficiently. At the sending end, the stego-images are matched and sent through feature retrieval. At the receiving end, the secret image can be recovered by extracting similar blocks through the received stego-images and stitching the image blocks according to the location information. Experimental results demonstrate that the proposed method without any modification traces provides better robustness and has higher retrieval accuracy and capacity when compared with some existing coverless image information hiding.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Ma, W., Qin, J., Xiang, X., Tan, Y., Luo, Y., Xiong, N.N.: Adaptive median filtering algorithm based on divide and conquer and its application in CAPTCHA recognition. Comput. Mater. Contin. 58(3), 665–677 (2019)

    Article  Google Scholar 

  2. Qin, J., Sun, X., Xiang, X., Niu, C.: Principal feature selection and fusion method for image steganalysis. J. Electron. Imag. 18(3), 1–14 (2009)

    Google Scholar 

  3. Zhou, Z., Sun, H., R.H., Chen, X., Sun, X.: Coverless image steganography without embedding. Cloud Computing and Security, pp. 123–132 (2016)

  4. Ni, J., Ye, J., Yi, Y.: Deep learning hierarchical representations for image steganalysis. IEEE Trans. Inf. Forensics Secur. 12(11), 2545–2557 (2017)

    Article  Google Scholar 

  5. Gao, H.: Summary of research on key technologies of information hiding. Electron. World 9, 146–148 (2016)

    Google Scholar 

  6. Tan, Y., Qin, J., Xiang, X., Ma, W., Pan, W., Xiong, N.N.: A robust watermarking scheme in YCbCr color space based on channel coding. IEEE Access. 7(1), 25026–25036 (2019)

    Article  Google Scholar 

  7. Bilal, M., Imtiaz, S, Abdul, W., Ghouzali, S.: Zero-steganography using DCT and spatial domain. In: 2013 ACS International Conference on Computer Systems and Applications (AICCSA) (2013)

  8. Zhou, Z., Cao, Y., Sun, X.: Coverless information hiding based on bag-of-words model of image. J. Appl. Sci. Electron. Inf. Eng. 34(5), 527–536 (2016)

    Google Scholar 

  9. Guo, Y., Li, C., Liu, Q.: R2N: a novel deep learning architecture for rain removal from single image. Comput. Mater. Contin. 58(3), 829–843 (2019)

    Article  Google Scholar 

  10. Zhou, Z., Jonathan, W., Sun, X.: Encoding multiple contextual clues for partial-duplicate image retrieval. Pattern Recognit. Lett. 15(6), 1–9 (2017)

    Article  Google Scholar 

  11. Zhou, Z., Mu, Y., Jonathan, W.: Coverless image steganography using partial-duplicate image retrieval. Soft Comput. 23, 4927–4938 (2018)

    Article  Google Scholar 

  12. Wang, J., Qin, J., Xiang, X., Tan, Y., Pan, N.: CAPTCHA recognition based on deep convolutional neural network. Math. Biosci. Eng. 16(5), 5851–5861 (2019)

    Article  MathSciNet  Google Scholar 

  13. Bay, H., Ess, A., Tuytelaars, T., Gool, L.V.: Speeded-up robust features (SURF). Comput. Vis. Image Underst. 110(3), 346–359 (2018)

    Article  Google Scholar 

  14. Xu, F., Zhang, X., Xin, Z., Yang, A.: Investigation on the Chinese text sentiment analysis based on convolutional neural networks in deep learning. Comput. Mater. Contin. 58(3), 697–709 (2019)

    Article  Google Scholar 

  15. Zhang, J., Lu, C., Li, X., Kim, H., Wang, J.: A full convolutional network based on DenseNet for remote sensing scene classification. Math. Biosci. Eng. 16(5), 3345–3367 (2019)

    Article  Google Scholar 

  16. Zhang, X., Peng, F., Long, M.: Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimed. 20(12), 3223–3238 (2018)

    Article  Google Scholar 

  17. Wang, S., Sun, J., Phillips, P., Zhao, G., Zhang, Y.: Polarimetric synthetic aperture radar image segmentation by convolutional neural network using graphical processing units. Real-Time Image Process. 15(3), 631–642 (2018)

    Article  Google Scholar 

  18. Qi, L., Yu, J., Zhou, Z.: An invocation cost optimization method for web services in cloud environment. Sci. Program. (2017)

  19. Zhou, Z., Jonathan, W., Sun, X.: Multiple distances-based coding: toward scalable feature matching for large-scale web image search. IEEE Trans. Big Data (2019)

  20. Pan, L., Qin, J., Chen, H., Xiang, X., Li, C., Chen, R.: Image augmentation-based food recognition with convolutional neural networks. Comput. Mater. Contin. 59(1), 297–313 (2019)

    Article  Google Scholar 

  21. Pan, W., Qin, J., Xiang, X., Wu, Y., Tan, Y., Xiang, L.: A smart mobile diagnosis system for citrus diseases based on densely connected convolutional networks. IEEE Access. 7, 87534–87542 (2019)

    Article  Google Scholar 

  22. Xu, Y., Qi, L., Dou, W., Yu, J.: Privacy-preserving and scalable service recommendation based on SimHash in a distributed cloud environment. Complexity (2017)

  23. Zhang, J., Jin, X., Sun, J., Wang, J., Sangaiah, A.K.: Spatial and semantic convolutional features for robust visual object tracking. Multimed. Tools Appl. (2018)

  24. Qin, J., Li, H., Xiang, X., Tan, Y., Pan, W., Xiong, N.N.: An encrypted image retrieval method based on harris corner optimization and LSH in cloud computing. IEEE Access. 7(1), 24626–24633 (2019)

    Article  Google Scholar 

  25. Qi, L., Zhang, X., Dou, W., Ni, Q.: A distributed locality-sensitive hashing based approach for cloud service recommendation from multi-source data. IEEE J. Select. Areas Commun. 35(11), 2616–2624 (2017)

    Article  Google Scholar 

  26. Xiang, L., Shen, X., Qin, J., Hao, W.: Discrete multi-graph hashing for large-scale visual search. Neural Process. Lett. 49(3), 1055–1069 (2019)

    Article  Google Scholar 

  27. Yuan, C., Xia, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18(2), 435–442 (2017)

    Google Scholar 

  28. Li, H., Qin, J., Xiang, X., Pan, L., Ma, W., XIONG, N.N.: An efficient image matching algorithm based on adaptive threshold and RANSAC. IEEE Access. 6(1), 66963–66971 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 61772561), the Key Research and Development Plan of Hunan Province (Nos. 2018NK2012, 2019SK2022), the Science Research Projects of Hunan Provincial Education Department (Nos. 18A174, 18C0262), the Postgraduate Research and Innovation Project of Hunan Province (No.CX20190625), the Postgraduate Science and Technology Innovation Foundation of Central South University of Forestry and Technology (No. CX20192016), and Science and Technology Innovation Platform and Talent Plan of Hunan Province (No. 2017TP1022).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jiaohua Qin or Xuyu Xiang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, Y., Qin, J., Xiang, X. et al. Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc 17, 125–135 (2020). https://doi.org/10.1007/s11554-019-00917-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-019-00917-3

Keywords

Navigation