Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain

被引:1
作者
Li, Zengxiang [1 ]
Wu, Yongchong [2 ]
Al Mazro, Alanoud [3 ]
Jiang, Donghua [4 ]
Wu, Jianhua [5 ]
Zhu, Xishun [6 ]
机构
[1] Nanchang Univ, Gongqing Coll, Dept Informat Engn, Jiujiang 332020, Peoples R China
[2] Gongqing Inst Sci & Technol, Sch Informat Engn, Jiujiang 332020, Peoples R China
[3] Princess Nourah Bint Abdulrahman Univ PNU, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[4] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 511400, Peoples R China
[5] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Peoples R China
[6] Hainan Normal Univ, Sch Math & Stat, Haikou 571158, Peoples R China
来源
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES | 2024年 / 141卷 / 01期
基金
中国国家自然科学基金;
关键词
Image hiding; robustness; wavelet transform; dynamic region attention; STEGANOGRAPHY;
D O I
10.32604/cmes.2024.051762
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Hidden capacity, concealment, security, and robustness are essential indicators of hiding algorithms. Currently, hiding algorithms tend to focus on algorithmic capacity, concealment, and security but often overlook the robustness of the algorithms. In practical applications, the container can suffer from damage caused by noise, cropping, and other attacks during transmission, resulting in challenging or even impossible complete recovery of the secret image. An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms. In this proposed algorithm, a secret image of size 256 x 256 is first decomposed using an eight-level Haar wavelet transform. The wavelet transform generates one coefficient in the approximation component and twenty-four detail bands, which are then embedded into the carrier image via a hiding network. During the recovery process, the container image is divided into four non-overlapping parts, each employed to reconstruct a low-resolution secret image. These lowresolution secret images are combined using dense modules to obtain a high-quality secret image. The experimental results showed that even under destructive attacks on the container image, the proposed algorithm is successful in recovering a high-quality secret image, indicating that the algorithm exhibits a high degree of robustness against various attacks. The proposed algorithm effectively addresses the robustness issue by incorporating both spatial and channel attention mechanisms in the multi-scale wavelet domain, making it suitable for practical applications. In conclusion, the image hiding algorithm introduced in this study offers significant improvements in robustness compared to existing algorithms. Its ability to recover high-quality secret images even in the presence of destructive attacks makes it an attractive option for various applications. Further research and experimentation can explore the algorithm's performance under different scenarios and expand its potential applications.
引用
收藏
页码:847 / 869
页数:23
相关论文
共 44 条
[1]  
[Anonymous], 2015, arXiv
[2]   Hiding Images within Images [J].
Baluja, Shumeet .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 42 (07) :1685-1697
[3]  
Bas Patrick, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P59, DOI 10.1007/978-3-642-24178-9_5
[4]  
Denemark T, 2014, IEEE INT WORKS INFOR, P48, DOI 10.1109/WIFS.2014.7084302
[5]   High-Capacity Information Hiding Based on Residual Network [J].
Duan, Xintao ;
Li, Baoxia ;
Xie, Zimei ;
Yue, Dongli ;
Ma, Yuanyuan .
IETE TECHNICAL REVIEW, 2021, 38 (01) :172-183
[6]   Reversible Image Steganography Scheme Based on a U-Net Structure [J].
Duan, Xintao ;
Jia, Kai ;
Li, Baoxia ;
Guo, Daidou ;
Zhang, En ;
Qin, Chuan .
IEEE ACCESS, 2019, 7 :9314-9323
[7]   Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes [J].
Filler, Tomas ;
Judas, Jan ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :920-935
[8]  
Fridrich J, 2013, INT CONF ACOUST SPEE, P2949, DOI 10.1109/ICASSP.2013.6638198
[9]   Rich Models for Steganalysis of Digital Images [J].
Fridrich, Jessica ;
Kodovsky, Jan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (03) :868-882
[10]  
Gatys Leon A, 2015, A neural algorithm of artistic style, DOI DOI 10.1167/16.12.326