DeepMIH: Deep Invertible Network for Multiple Image Hiding

被引:130
作者
Guan, Zhenyu [1 ]
Jing, Junpeng [1 ]
Deng, Xin [1 ]
Xu, Mai [2 ]
Jiang, Lai [2 ]
Zhang, Zhou [1 ]
Li, Yipeng [3 ]
机构
[1] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[2] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[3] Tsinghua Univ, Dept Automation, Beijing 100084, Peoples R China
基金
北京市自然科学基金;
关键词
Image hiding; invertible neural network; STEGANALYSIS; CNN;
D O I
10.1109/TPAMI.2022.3141725
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multiple image hiding aims to hide multiple secret images into a single cover image, and then recover all secret images perfectly. Such high-capacity hiding may easily lead to contour shadows or color distortion, which makes multiple image hiding a very challenging task. In this paper, we propose a novel multiple image hiding framework based on invertible neural network, namely DeepMIH. Specifically, we develop an invertible hiding neural network (IHNN) to innovatively model the image concealing and revealing as its forward and backward processes, making them fully coupled and reversible. The IHNN is highly flexible, which can be cascaded as many times as required to achieve the hiding of multiple images. To enhance the invisibility, we design an importance map (IM) module to guide the current image hiding based on the previous image hiding results. In addition, we find that the image hidden in the high-frequency sub-bands tends to achieve better hiding performance, and thus propose a low-frequency wavelet loss to constrain that no secret information is hidden in the low-frequency sub-bands. Experimental results show that our DeepMIH significantly outperforms other state-of-the-art methods, in terms of hiding invisibility, security and recovery accuracy on a variety of datasets.
引用
收藏
页码:372 / 390
页数:19
相关论文
共 64 条
[1]   NTIRE 2017 Challenge on Single Image Super-Resolution: Dataset and Study [J].
Agustsson, Eirikur ;
Timofte, Radu .
2017 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW), 2017, :1122-1131
[2]   ReDMark: Framework for residual diffusion watermarking based on deep networks [J].
Ahmadi, Mahdi ;
Norouzi, Alireza ;
Karimi, Nader ;
Samavi, Shadrokh ;
Emami, Ali .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 146
[3]  
Zhang KA, 2019, Arxiv, DOI arXiv:1901.03892
[4]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[5]  
[Anonymous], 2015, INPROC INT C LEARN R
[6]  
Ardizzone L, 2019, Arxiv, DOI arXiv:1907.02392
[7]  
Arjovsky M, 2017, Arxiv, DOI [arXiv:1701.07875, 10.48550/arXiv.1701.07875]
[8]  
Asad M., 2011, Proceedings of the 1st International Conference on Computer Networks and Information Technology (ICCNIT 2011), P143, DOI 10.1109/ICCNIT.2011.6020921
[9]  
Baluja S, 2017, ADV NEUR IN, V30
[10]   Hiding Images within Images [J].
Baluja, Shumeet .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2020, 42 (07) :1685-1697