Skip to main content
Log in

Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

Coverless image steganography (CIS) have attracted considerable attention due to their ability to resist steganalysis detection completely. However, most of the existing CIS methods are weak in robustness to geometric attacks, and it is difficult to achieve a balance between geometric attacks and non-geometric attacks. So, a robust coverless image steganography method based on DenseUNet with multi-scale feature fusion attention mechanism is proposed in this paper. At the sender, an end-to-end hash sequence generation model is designed by combining the DenseUNet network with the multi-scale feature fusion attention mechanism to extract the multi-scale CNN features of the images, and as serve matching benchmarks. Secondly, a hybrid loss function is introduced into the network model for network training to generate hash sequences with robust features. Finally, the secret information is segmented into equal-length segments, and the image whose hash sequence matches the secret information segment is selected as a stego-images using the inverted index. At the receiver, the secret information was recovered from the stego-images using the constructed network model. Experimental results show that the proposed method has stronger performance in terms of robustness and security compared with existing CIS schemes, and achieves enhanced robustness against both the geometric attacks and non-geometric attacks at four different datasets.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price includes VAT (Netherlands)

Instant access to the full article PDF.

Fig. 1
The alternative text for this image may have been generated using AI.
Fig. 2
The alternative text for this image may have been generated using AI.
Fig. 3
The alternative text for this image may have been generated using AI.
Fig. 4
The alternative text for this image may have been generated using AI.
Fig. 5
The alternative text for this image may have been generated using AI.
Algorithm 1
The alternative text for this image may have been generated using AI.
Algorithm 2
The alternative text for this image may have been generated using AI.
Fig. 6
The alternative text for this image may have been generated using AI.
Fig. 7
The alternative text for this image may have been generated using AI.

Similar content being viewed by others

Data availibility

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Li, G., Feng, B., He, M., Weng, J., Lu, W.: High-capacity coverless image steganographic scheme based on image synthesis. Signal Process.: Image Commun. 111, 116894 (2023)

    Google Scholar 

  2. Wen, W., Huang, H., Qi, S., Zhang, Y., Fang, Y.: Joint coverless steganography and image transformation for covert communication of secret messages. IEEE Trans. Netw. Sci. Eng. 11(3), 2951–2962 (2024)

    Article  Google Scholar 

  3. Mandal, P.C., Mukherjee, I., Paul, G., Chatterji, B.: Digital image steganography: A literature survey. Inf. Sci. 609, 1451–1488 (2022)

    Article  Google Scholar 

  4. Zhou, Z.L., Cao, Y., Sun, X.M.: Coverless information hiding based on bag-of-words model of image. J. Appl. Sci. 34(5), 527–536 (2016)

    Google Scholar 

  5. Anggriani, K., Chiou, S.-F., Wu, N.-I., Hwang, M.-S.: A robust and high-capacity coverless information hiding based on combination theory. Informatica 34(3), 449–464 (2023)

    Article  MathSciNet  Google Scholar 

  6. Meng, L., Jiang, X., Zhang, Z., Li, Z., Sun, T.: A robust coverless video steganography based on maximum dc coefficients against video attacks. Multimed. Tools Appl. 83(5), 13427–13461 (2024)

    Article  Google Scholar 

  7. Meng, L., Jiang, X., Sun, T.: A review of coverless steganography. Neurocomputing 566, 126945 (2023)

    Article  Google Scholar 

  8. Chen, X., Zhang, Z., Qiu, A., Xia, Z., Xiong, N.N.: Novel coverless steganography method based on image selection and stargan. IEEE Trans. Netw. Sci. Eng. 9(1), 219–230 (2020)

    Article  Google Scholar 

  9. Kulkarni, T., Debnath, S., Kumar, J., Mohapatra, R.K.: Dct based robust coverless information hiding scheme with high capacity. In: 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 358–364 (2023). IEEE

  10. Biswas, S., Debnath, S., Mohapatra, R.K.: Coverless image steganography based on dwt approximation and pixel intensity averaging. In: 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1554–1561 (2023). IEEE

  11. Liu, Q., Xiang, X., Qin, J., Tan, Y., Tan, J., Luo, Y.: Coverless steganography based on image retrieval of densenet features and dwt sequence mapping. Knowl.-Based Syst. 192, 105375 (2020)

    Article  Google Scholar 

  12. Zhou, Z., Mu, Y., Wu, Q.J.: Coverless image steganography using partial-duplicate image retrieval. Soft. Comput. 23(13), 4927–4938 (2019)

    Article  Google Scholar 

  13. Qin, J., Wang, J., Sun, J., Xiang, X., Xiang, L.: Coverless image information hiding based on deep convolution features. In: National Conference of Theoretical Computer Science, pp. 15–30 (2021). Springer

  14. Liu, J., Tan, L., Zhou, Z., Li, Y., Chen, P.: A dynamic yolo-based sequence-matching model for efficient coverless image steganography. arXiv preprint arXiv:2401.11946 (2024)

  15. Zhou, Z., Ding, Y.: A coverless image steganography method based on invertible neural network. In: Third International Symposium on Computer Engineering and Intelligent Communications (ISCEIC 2022), vol. 12462, pp. 657–665 (2023). SPIE

  16. Liu, Q., Xiang, X., Qin, J., Tan, Y., Zhang, Q.: Reversible sub-feature retrieval: Toward robust coverless image steganography for geometric attacks resistance. KSII Trans. Internet Inf. Syst. (TIIS) 15(3), 1078–1099 (2021)

    Google Scholar 

  17. Liu, Q., Xiang, X., Qin, J., Tan, Y., Zhang, Q.: A robust coverless steganography scheme using camouflage image. IEEE Trans. Circuits Syst. Video Technol. 32(6), 4038–4051 (2021)

    Article  Google Scholar 

  18. Hu, D., Wang, L., Jiang, W., Zheng, S., Li, B.: A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6, 38303–38314 (2018)

    Article  Google Scholar 

  19. Li, J., Niu, K., Liao, L., Wang, L., Liu, J., Lei, Y., Zhang, M.: A generative steganography method based on wgan-gp. In: Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I 6, pp. 386–397 (2020). Springer

  20. Cao, Y., Zhou, Z., Wu, Q.J., Yuan, C., Sun, X.: Coverless information hiding based on the generation of anime characters. EURASIP J. Image Video Process. 2020, 1–15 (2020)

    Article  Google Scholar 

  21. Qin, J., Wang, J., Tan, Y., Huang, H., Xiang, X., He, Z.: Coverless image steganography based on generative adversarial network. Mathematics 8(9), 1394 (2020)

    Article  Google Scholar 

  22. Li, Q., Wang, X., Wang, X., Ma, B., Wang, C., Shi, Y.: An encrypted coverless information hiding method based on generative models. Inf. Sci. 553, 19–30 (2021)

    Article  MathSciNet  Google Scholar 

  23. Peng, F., Chen, G., Long, M.: A robust coverless steganography based on generative adversarial networks and gradient descent approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9), 5817–5829 (2022)

    Article  Google Scholar 

  24. Liu, X., Ma, Z., Ma, J., Zhang, J., Schaefer, G., Fang, H.: Image disentanglement autoencoder for steganography without embedding. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2303–2312 (2022)

  25. Wei, P., Li, S., Zhang, X., Luo, G., Qian, Z., Zhou, Q.: Generative steganography network. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 1621–1629 (2022)

  26. Zhou, Z., Su, Y., Li, J., Yu, K., Wu, Q.J., Fu, Z., Shi, Y.: Secret-to-image reversible transformation for generative steganography. IEEE Trans. Dependable Secure Comput. 20(5), 4118–4134 (2022)

    Article  Google Scholar 

  27. Sun, Y., Liu, J., Zhang, R.: Large capacity generative image steganography via image style transfer and feature-wise deep fusion. Appl. Intell. 53(23), 28675–28693 (2023)

    Article  Google Scholar 

  28. Zhang, X., Peng, F., Long, M.: Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimed. 20(12), 3223–3238 (2018)

    Article  Google Scholar 

  29. Zou, L., Sun, J., Gao, M., Wan, W., Gupta, B.B.: A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed. Tools Appl. 78, 7965–7980 (2019)

  30. Govindasamy, V., Sharma, A., Thanikaiselvan, V.: Coverless image steganography using haar integer wavelet transform. In: 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), pp. 885–890 (2020). IEEE

  31. Luo, Y., Qin, J., Xiang, X., Tan, Y.: Coverless image steganography based on multi-object recognition. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2779–2791 (2020)

    Article  Google Scholar 

  32. Liu, Q., Xiang, X., Qin, J., Tan, Y., Qiu, Y.: Coverless image steganography based on densenet feature mapping. EURASIP J. Image Video Process. 2020, 1–18 (2020)

    Article  Google Scholar 

  33. Luo, Y., Qin, J., Xiang, X., Tan, Y., He, Z., Xiong, N.N.: Coverless image steganography based on image segmentation. Comput., Mater. Continua 64(2), 1281–1295 (2020)

    Article  Google Scholar 

  34. Meng, L., Jiang, X., Zhang, Z., Li, Z., Sun, T.: A robust coverless image steganography based on an end-to-end hash generation model. IEEE Trans. Circuits Syst. Video Technol. 33(7), 3542–3558 (2022)

    Article  Google Scholar 

  35. Zou, L., Li, J., Wan, W., Wu, Q.J., Sun, J.: Robust coverless image steganography based on neglected coverless image dataset construction. IEEE Trans. Multimedia 25, 5552–5564 (2022)

    Article  Google Scholar 

  36. Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700–4708 (2017)

  37. Woo, S., Park, J., Lee, J.-Y., Kweon, I.S.: Cbam: Convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3–19 (2018)

  38. Li, Y., Gemert, J.: Deep unsupervised image hashing by maximizing bit entropy. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 2002–2010 (2021)

  39. Everingham, M., Eslami, S.A., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The pascal visual object classes challenge: A retrospective. Int. J. Comput. Vision 111, 98–136 (2015)

    Article  Google Scholar 

  40. Jegou, H., Douze, M., Schmid, C.: Hamming embedding and weak geometric consistency for large scale image search. In: Computer Vision–ECCV 2008: 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part I 10, pp. 304–317 (2008). Springer

  41. Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., Dollár, P., Zitnick, C.L.: Microsoft coco: Common objects in context. In: Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, pp. 740–755 (2014). Springer

  42. Griffin, G., Holub, A., Perona, P.: Caltech-256 object category dataset (2007)

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (No. 61862041).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Xiaopeng Li and Zhe Li. The first draft of the manuscript was written by Xiaopeng Li, Qiuyu Zhang commented on previous versions of the manuscript and critically revised the work. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Qiuyu Zhang.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Zhang, Q. & Li, Z. Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism. SIViP 18, 8251–8266 (2024). https://doi.org/10.1007/s11760-024-03468-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Version of record:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11760-024-03468-8

Keywords