Abstract
Coverless image steganography (CIS) have attracted considerable attention due to their ability to resist steganalysis detection completely. However, most of the existing CIS methods are weak in robustness to geometric attacks, and it is difficult to achieve a balance between geometric attacks and non-geometric attacks. So, a robust coverless image steganography method based on DenseUNet with multi-scale feature fusion attention mechanism is proposed in this paper. At the sender, an end-to-end hash sequence generation model is designed by combining the DenseUNet network with the multi-scale feature fusion attention mechanism to extract the multi-scale CNN features of the images, and as serve matching benchmarks. Secondly, a hybrid loss function is introduced into the network model for network training to generate hash sequences with robust features. Finally, the secret information is segmented into equal-length segments, and the image whose hash sequence matches the secret information segment is selected as a stego-images using the inverted index. At the receiver, the secret information was recovered from the stego-images using the constructed network model. Experimental results show that the proposed method has stronger performance in terms of robustness and security compared with existing CIS schemes, and achieves enhanced robustness against both the geometric attacks and non-geometric attacks at four different datasets.









Similar content being viewed by others
Data availibility
The data that support the findings of this study are available from the corresponding author upon reasonable request.
References
Li, G., Feng, B., He, M., Weng, J., Lu, W.: High-capacity coverless image steganographic scheme based on image synthesis. Signal Process.: Image Commun. 111, 116894 (2023)
Wen, W., Huang, H., Qi, S., Zhang, Y., Fang, Y.: Joint coverless steganography and image transformation for covert communication of secret messages. IEEE Trans. Netw. Sci. Eng. 11(3), 2951–2962 (2024)
Mandal, P.C., Mukherjee, I., Paul, G., Chatterji, B.: Digital image steganography: A literature survey. Inf. Sci. 609, 1451–1488 (2022)
Zhou, Z.L., Cao, Y., Sun, X.M.: Coverless information hiding based on bag-of-words model of image. J. Appl. Sci. 34(5), 527–536 (2016)
Anggriani, K., Chiou, S.-F., Wu, N.-I., Hwang, M.-S.: A robust and high-capacity coverless information hiding based on combination theory. Informatica 34(3), 449–464 (2023)
Meng, L., Jiang, X., Zhang, Z., Li, Z., Sun, T.: A robust coverless video steganography based on maximum dc coefficients against video attacks. Multimed. Tools Appl. 83(5), 13427–13461 (2024)
Meng, L., Jiang, X., Sun, T.: A review of coverless steganography. Neurocomputing 566, 126945 (2023)
Chen, X., Zhang, Z., Qiu, A., Xia, Z., Xiong, N.N.: Novel coverless steganography method based on image selection and stargan. IEEE Trans. Netw. Sci. Eng. 9(1), 219–230 (2020)
Kulkarni, T., Debnath, S., Kumar, J., Mohapatra, R.K.: Dct based robust coverless information hiding scheme with high capacity. In: 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 358–364 (2023). IEEE
Biswas, S., Debnath, S., Mohapatra, R.K.: Coverless image steganography based on dwt approximation and pixel intensity averaging. In: 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1554–1561 (2023). IEEE
Liu, Q., Xiang, X., Qin, J., Tan, Y., Tan, J., Luo, Y.: Coverless steganography based on image retrieval of densenet features and dwt sequence mapping. Knowl.-Based Syst. 192, 105375 (2020)
Zhou, Z., Mu, Y., Wu, Q.J.: Coverless image steganography using partial-duplicate image retrieval. Soft. Comput. 23(13), 4927–4938 (2019)
Qin, J., Wang, J., Sun, J., Xiang, X., Xiang, L.: Coverless image information hiding based on deep convolution features. In: National Conference of Theoretical Computer Science, pp. 15–30 (2021). Springer
Liu, J., Tan, L., Zhou, Z., Li, Y., Chen, P.: A dynamic yolo-based sequence-matching model for efficient coverless image steganography. arXiv preprint arXiv:2401.11946 (2024)
Zhou, Z., Ding, Y.: A coverless image steganography method based on invertible neural network. In: Third International Symposium on Computer Engineering and Intelligent Communications (ISCEIC 2022), vol. 12462, pp. 657–665 (2023). SPIE
Liu, Q., Xiang, X., Qin, J., Tan, Y., Zhang, Q.: Reversible sub-feature retrieval: Toward robust coverless image steganography for geometric attacks resistance. KSII Trans. Internet Inf. Syst. (TIIS) 15(3), 1078–1099 (2021)
Liu, Q., Xiang, X., Qin, J., Tan, Y., Zhang, Q.: A robust coverless steganography scheme using camouflage image. IEEE Trans. Circuits Syst. Video Technol. 32(6), 4038–4051 (2021)
Hu, D., Wang, L., Jiang, W., Zheng, S., Li, B.: A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6, 38303–38314 (2018)
Li, J., Niu, K., Liao, L., Wang, L., Liu, J., Lei, Y., Zhang, M.: A generative steganography method based on wgan-gp. In: Artificial Intelligence and Security: 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I 6, pp. 386–397 (2020). Springer
Cao, Y., Zhou, Z., Wu, Q.J., Yuan, C., Sun, X.: Coverless information hiding based on the generation of anime characters. EURASIP J. Image Video Process. 2020, 1–15 (2020)
Qin, J., Wang, J., Tan, Y., Huang, H., Xiang, X., He, Z.: Coverless image steganography based on generative adversarial network. Mathematics 8(9), 1394 (2020)
Li, Q., Wang, X., Wang, X., Ma, B., Wang, C., Shi, Y.: An encrypted coverless information hiding method based on generative models. Inf. Sci. 553, 19–30 (2021)
Peng, F., Chen, G., Long, M.: A robust coverless steganography based on generative adversarial networks and gradient descent approximation. IEEE Trans. Circuits Syst. Video Technol. 32(9), 5817–5829 (2022)
Liu, X., Ma, Z., Ma, J., Zhang, J., Schaefer, G., Fang, H.: Image disentanglement autoencoder for steganography without embedding. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 2303–2312 (2022)
Wei, P., Li, S., Zhang, X., Luo, G., Qian, Z., Zhou, Q.: Generative steganography network. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 1621–1629 (2022)
Zhou, Z., Su, Y., Li, J., Yu, K., Wu, Q.J., Fu, Z., Shi, Y.: Secret-to-image reversible transformation for generative steganography. IEEE Trans. Dependable Secure Comput. 20(5), 4118–4134 (2022)
Sun, Y., Liu, J., Zhang, R.: Large capacity generative image steganography via image style transfer and feature-wise deep fusion. Appl. Intell. 53(23), 28675–28693 (2023)
Zhang, X., Peng, F., Long, M.: Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimed. 20(12), 3223–3238 (2018)
Zou, L., Sun, J., Gao, M., Wan, W., Gupta, B.B.: A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed. Tools Appl. 78, 7965–7980 (2019)
Govindasamy, V., Sharma, A., Thanikaiselvan, V.: Coverless image steganography using haar integer wavelet transform. In: 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), pp. 885–890 (2020). IEEE
Luo, Y., Qin, J., Xiang, X., Tan, Y.: Coverless image steganography based on multi-object recognition. IEEE Trans. Circuits Syst. Video Technol. 31(7), 2779–2791 (2020)
Liu, Q., Xiang, X., Qin, J., Tan, Y., Qiu, Y.: Coverless image steganography based on densenet feature mapping. EURASIP J. Image Video Process. 2020, 1–18 (2020)
Luo, Y., Qin, J., Xiang, X., Tan, Y., He, Z., Xiong, N.N.: Coverless image steganography based on image segmentation. Comput., Mater. Continua 64(2), 1281–1295 (2020)
Meng, L., Jiang, X., Zhang, Z., Li, Z., Sun, T.: A robust coverless image steganography based on an end-to-end hash generation model. IEEE Trans. Circuits Syst. Video Technol. 33(7), 3542–3558 (2022)
Zou, L., Li, J., Wan, W., Wu, Q.J., Sun, J.: Robust coverless image steganography based on neglected coverless image dataset construction. IEEE Trans. Multimedia 25, 5552–5564 (2022)
Huang, G., Liu, Z., Van Der Maaten, L., Weinberger, K.Q.: Densely connected convolutional networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4700–4708 (2017)
Woo, S., Park, J., Lee, J.-Y., Kweon, I.S.: Cbam: Convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3–19 (2018)
Li, Y., Gemert, J.: Deep unsupervised image hashing by maximizing bit entropy. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 2002–2010 (2021)
Everingham, M., Eslami, S.A., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The pascal visual object classes challenge: A retrospective. Int. J. Comput. Vision 111, 98–136 (2015)
Jegou, H., Douze, M., Schmid, C.: Hamming embedding and weak geometric consistency for large scale image search. In: Computer Vision–ECCV 2008: 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part I 10, pp. 304–317 (2008). Springer
Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., Dollár, P., Zitnick, C.L.: Microsoft coco: Common objects in context. In: Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part V 13, pp. 740–755 (2014). Springer
Griffin, G., Holub, A., Perona, P.: Caltech-256 object category dataset (2007)
Acknowledgements
This work is supported by the National Natural Science Foundation of China (No. 61862041).
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Xiaopeng Li and Zhe Li. The first draft of the manuscript was written by Xiaopeng Li, Qiuyu Zhang commented on previous versions of the manuscript and critically revised the work. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, X., Zhang, Q. & Li, Z. Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism. SIViP 18, 8251–8266 (2024). https://doi.org/10.1007/s11760-024-03468-8
Received:
Revised:
Accepted:
Published:
Version of record:
Issue date:
DOI: https://doi.org/10.1007/s11760-024-03468-8


