Papers
Topics
Authors
Recent
Search
2000 character limit reached

Diffusion-Based Hierarchical Image Steganography

Published 19 May 2024 in cs.CV | (2405.11523v1)

Abstract: This paper introduces Hierarchical Image Steganography, a novel method that enhances the security and capacity of embedding multiple images into a single container using diffusion models. HIS assigns varying levels of robustness to images based on their importance, ensuring enhanced protection against manipulation. It adaptively exploits the robustness of the Diffusion Model alongside the reversibility of the Flow Model. The integration of Embed-Flow and Enhance-Flow improves embedding efficiency and image recovery quality, respectively, setting HIS apart from conventional multi-image steganography techniques. This innovative structure can autonomously generate a container image, thereby securely and efficiently concealing multiple images and text. Rigorous subjective and objective evaluations underscore our advantage in analytical resistance, robustness, and capacity, illustrating its expansive applicability in content safeguarding and privacy fortification.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (52)
  1. Image2stylegan: How to embed images into the stylegan latent space?. In ICCV.
  2. Eirikur Agustsson and Radu Timofte. 2017. Ntire 2017 challenge on single image super-resolution: Dataset and study. In CVPRW.
  3. Shumeet Baluja. 2017. Hiding images in plain sight: Deep steganography. In NeurIPS.
  4. Shumeet Baluja. 2019. Hiding images within images. TPAMI (2019).
  5. Image steganography and steganalysis: A survey. In IJCAI.
  6. ILVR: Conditioning Method for Denoising Diffusion Probabilistic Models. In ICCV.
  7. Prafulla Dhariwal and Alexander Nichol. 2021. Diffusion models beat gans on image synthesis. In NeurIPS.
  8. Nice: Non-linear independent components estimation. arXiv preprint arXiv:1410.8516 (2014).
  9. Density estimation using Real NVP. In ICLR.
  10. DeepMIH: Deep invertible network for multiple image hiding. IEEE Transactions on Pattern Analysis and Machine Intelligence 45, 1 (2022), 372–390.
  11. Stefan Hetzl and Petra Mutzel. 2005. A graph–theoretic approach to steganography. In IFIP International Conference on Communications and Multimedia Security.
  12. Denoising diffusion probabilistic models. In NeurIPS.
  13. LoRA: Low-Rank Adaptation of Large Language Models. In ICLR.
  14. HiNet: Deep Image Hiding by Invertible Network. In ICCV.
  15. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing (2019).
  16. Denoising Diffusion Restoration Models. In NeurIPS.
  17. DiffusionCLIP: Text-Guided Diffusion Models for Robust Image Manipulation. In CVPR.
  18. A new cost function for spatial image steganography. In ICIP.
  19. Coverless image steganography using morphed face recognition based on convolutional neural network. EURASIP Journal on Wireless Communications and Networking 2022, 1 (2022), 1–21.
  20. Coverless image steganography based on DenseNet feature mapping. EURASIP Journal on Image and Video Processing 2020 (2020), 1–18.
  21. Large-Capacity Image Steganography Based on Invertible Neural Networks. In CVPR.
  22. SDEdit: Guided Image Synthesis and Editing with Stochastic Differential Equations. In ICLR.
  23. Coverless image steganography based on jigsaw puzzle image generation. Computers, Materials and Continua 67, 2 (2021), 2077–2091.
  24. Multi bit plane image steganography. In International Workshop on Digital Watermarking.
  25. High capacity and secure digital steganography to palette-based images. In ICIP.
  26. Image steganography method based on PVD and modulus function. In ICECC.
  27. Using high-dimensional image models to perform highly undetectable steganography. In IHIP.
  28. Niels Provos and Peter Honeyman. 2003. Hide and seek: An introduction to steganography. IEEE Symposium on Security and Privacy (2003).
  29. Coverless image steganography: a survey. IEEE Access 7 (2019), 171372–171394.
  30. Hierarchical text-conditional image generation with clip latents. arXiv preprint arXiv:2204.06125 (2022).
  31. High-Resolution Image Synthesis with Latent Diffusion Models. In CVPR.
  32. Photorealistic Text-to-Image Diffusion Models with Deep Language Understanding. In NeurIPS.
  33. Image super-resolution via iterative refinement. TPAMI (2022).
  34. SSGAN: secure steganography based on generative adversarial networks. In Pacific Rim Conference on Multimedia.
  35. CNN-based adversarial embedding for image steganography. TIFS (2019).
  36. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters (2017).
  37. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing (2009).
  38. Real-esrgan: Training real-world blind super-resolution with pure synthetic data. In ICCV.
  39. Zero-Shot Image Restoration Using Denoising Diffusion Null-Space Model. In ICLR.
  40. Invertible image rescaling. In ECCV.
  41. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters 23, 5 (2016), 708–712.
  42. Robust Invertible Image Steganography. In CVPR.
  43. An embedding cost learning framework using GAN. TIFS (2019).
  44. Yedroudj-net: An efficient CNN for spatial steganalysis. In ICASSP.
  45. A Siamese CNN for image steganalysis. IEEE Transactions on Information Forensics and Security 16 (2020), 291–306.
  46. Cross: Diffusion model makes controllable, robust and secure image steganography. Advances in Neural Information Processing Systems 36 (2024).
  47. SteganoGAN: High Capacity Image Steganography with GANs. arXiv preprint arXiv:1901.03892 (2019).
  48. Lvmin Zhang and Maneesh Agrawala. 2023. Adding Conditional Control to Text-to-Image Diffusion Models. arXiv preprint arXiv:2302.05543 (2023).
  49. Editguard: Versatile image watermarking for tamper localization and copyright protection. arXiv preprint arXiv:2312.08883 (2023).
  50. V2A-Mark: Versatile Deep Visual-Audio Watermarking for Manipulation Localization and Copyright Protection. arXiv preprint arXiv:2404.16824 (2024).
  51. Egsde: Unpaired image-to-image translation via energy-guided stochastic differential equations. NeurIPS (2022).
  52. Hidden: Hiding data with deep networks. In ECCV.
Citations (1)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.