Information Hiding Course

Welcome to the Information Hiding Course page! This course aims to explore the theoretical foundations and practical applications of information hiding technologies.

Innovation Practice

Framework for Robust Generative Steganography for Image Hiding Using Concatenated Mappings
Robust Generative Steganography for Image Hiding Using Concatenated Mappings
Liyan Chen, Bingwen Feng*, Zhihua Xia, et al.
Generative steganography stands as a promising technique for information hiding, primarily due to its remarkable resistance to steganalysis detection. Despite its potential, hiding a secret image using existing generative steganographic models remains a challenge, especially in lossy or noisy communication channels. This paper proposes a robust generative steganography model for hiding full-size image. It lies on three reversible concatenated mappings proposed. The first mapping uses VQGAN with an order-preserving codebook to compress an image into a more concise representation. The second mapping incorporates error correction to further convert the representation into a robust binary representation. The third mapping devises a distribution-preserving sampling mapping that transforms the binary representation into the latent representation. This latent representation is then used as input for a text-to-image Diffusion model, which generates the final stego image. Experimental results show that our proposed scheme can freely customize the stego image content. Moreover, it simultaneously attains high stego and recovery image quality, high robustness, and provable security.
show all ▼
IEEE Transactions on Information Forensics and Security, 2025
Framework for JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible Networks
JPEG Compression-Resistant Generative Image Hiding Utilizing Cascaded Invertible Networks
Tiewei Qin, Bingwen Feng*, Bingbing Zhou, et al.
Generative steganography is renowned for its exceptional undetectability. However, prevalent generative methods often have insufficient capacity for concealing secret images. Furthermore, the sensitivity of commonly utilized generative models exacerbates the challenge of ensuring robustness against channel distortions such as JPEG compression. In this paper, we introduce a generative image hiding network that employs two invertible generators to transform secret images into stego images within a disparate image domain. Additionally, we seamlessly integrate an up-and-down sampling module (UDM) within these generators to facilitate efficient decoupling of the intermediate representations obtained by each generator. The UDM serves multiple purposes: preserving coherence between the intermediate representations, enhancing resilience against JPEG compression, and safeguarding the confidentiality of the concealed images. To address the complexity of mapping both uncompressed and compressed stego images to a unified intermediary representation, we implement two distinct flows for the forward and backward processes of the generator associated with the stego images. The experimental results show that our scheme offers concurrent advantages in terms of full-size image hiding ability, undetectability, confidentiality, and robustness.
show all ▼
IEEE Transactions on Information Forensics and Security, 2025
Framework for Camera-shooting resilient watermarking on image instance level
Camera-shooting resilient watermarking on image instance level
Lin He, Bingwen Feng*, Zecheng Peng, et al.
Capturing displayed images using portable cameras has become familiar among multimedia pirates, necessitating the urgent requirement of camera-shooting resilient watermarking schemes. In this paper, we consider the stealers who only record parts of images, and propose a robust watermarking scheme at the image instance level. This scheme consists of an encoding end, a noise layer, and a decoding end. The encoding end first selects specific watermarking regions associated with segmented image instances. Afterwards, an encoder is employed to embed watermark sequences into the RGB color model of these watermarking regions. At last, templates are embedded to product the final watermarked images. Specifically, our suggested template-based resynchronization comprises a template embedding module at the encoding end and a geometric correction module at the decoding end. The former embeds templates by a correlation-aware multiplicative spread spectrum with an adaptive amplitude, while the latter learns a calibrator to estimate the perspective projection. Experiments on both simulation and real-world scenarios support that the proposed scheme effectively resists camera-shooting attacks with various shooting conditions, regardless of whether the entire displayed images have been captured.
show all ▼
IEEE Transactions on Circuits and Systems for Video Technology, 2024
Framework for Robust image hiding network with Frequency and Spatial Attentions
Robust image hiding network with Frequency and Spatial Attentions
Xiaobin Zeng, Bingwen Feng*, Zhihua Xia, et al.
Convert Image Communication (CIC) is a promising technology to protect the privacy of images. Recently, the emergence of robust CIC resistant to JPEG compression has gained due to the widespread use of JPEG compression in image communication. This paper introduces a Robust image hiding network with Frequency and Spatial Attentions (RFSA) to implement robust CIC. RFSA can hide an image within another image with high robust. It incorporates multiple image attentions corresponding to imperceptibility, recovered image quality, and resistance to JPEG compression, which ensure that secret images are hidden within regions that cause little distortion and can well withstand JPEG compression. Additionally, two encoders, that is, a frequency encoder and a spatial encoder, are mixed to adaptively embed secret images across both frequency and spatial domains. Experimental results demonstrate that the proposed scheme not only maintains high image quality and capacity but also exhibits exceptional resistance to JPEG compression compared to other state-of-the-art image hiding methods. The average Peak Signal-to-Noise Ratio (PSNR) of the recovered image remains at 24.96 dB even under JPEG compression with a quality factor of 55.
show all ▼
Pattern Recognition, 2024
Framework for Multi-Party Reversible Data Hiding in Ciphertext Binary Images Based on Visual Cryptography
Multi-Party Reversible Data Hiding in Ciphertext Binary Images Based on Visual Cryptography
Bing Chen, Jingkun Yu, Bingwen Feng, et al.
Existing methods for reversible data hiding in ciphertext binary images only involve one data hider to perform data embedding. When the data hider is attacked, the original binary image cannot be perfectly reconstructed. To this end, this letter proposes multi-party reversible data hiding in ciphertext binary images (MRDHCBI), where multiple data hiders are involved in data embedding. In this solution, we use visual cryptography technology to encrypt a binary image into multiple ciphertext binary images, and transmit the ciphertext binary images to different data hiders. Each data hider can embed data into a ciphertext binary image and generate a marked ciphertext binary image. The original binary image is perfectly reconstructed by collecting a portion of marked ciphertext binary images from the unattacked data hiders. Compared with existing solutions, the proposed solution enhances the recoverability of the original binary image. Besides, the proposed solution maintains a stable embedding capacity for different categories of images.
show all ▼
IEEE Signal Processing Letters, 2025
Framework for A robust reversible watermarking scheme using DC prediction and histogram shifting
A robust reversible watermarking scheme using DC prediction and histogram shifting
Jiancheng Xiao, Shuaichao Wu, Bingwen Feng*, et al.
Robust Reversible Watermarking (RRW) not only ensures the resilience of watermarked images under various attacks but also enables the exact recovery of the original host images from these watermarked versions. However, many existing RRW methods suffer from compromised reversibility when subjected to attacks, preventing successful restoration of the host image. In this paper, we explore the dual robustness of RRW—simultaneously enhancing both watermark resilience and reversibility. We propose a JPEG compression-resistant histogram-shifting algorithm that withstands targeted compression and exhibits strong robustness against common image manipulations. Building on this algorithm, we introduce two RRW schemes: one embeds watermark bits into the AC coefficients, and the other embeds them into the prediction error of DC coefficients. Furthermore, we design a convolutional neural network (CNN)-based DC predictor to infer DC coefficients from AC coefficients. Experimental results demonstrate that our approach achieves superior robustness and watermarked image quality, while reliably preserving reversibility under various distortions.
show all ▼
Signal Processing, 2025
Framework for Conditional image hiding network based on style transfer
Conditional image hiding network based on style transfer
Fenghua Zhang, Bingwen Feng*, Zhihua Xia, et al.
Various data hiding methods have been suggested to hide secret images within stego images. However, many of them could be easily detected by steganalytic tools due to their large hidden information. In this paper, we enhance the undetectability of image hiding network by mapping latent representation conditional on secret information. We extend the idea of image generation-based steganography and propose a Transformer-based image hiding network, which can hide secret images of the same size as the target image. The proposed scheme uses style transfer to help map the latent representation. The proposed scheme's hiding network includes three modules: encoding module, transfer module, and synthesis module. The encoding module extracts latent representations from the content image and the secret image, the transfer module stylizes intermediate representations conditional on secret information, and the synthesis module fuses the stylized features and the secret image features to synthesize the target image with the secret image hidden in it. A new synthesis module and corresponding extraction network are developed to improve recovery accuracy. The proposed scheme shows high image quality on both target images and recovered secret images. Furthermore, it is robust to steganalytic tools, thus providing good security.
show all ▼
Information Sciences, 2024

Innovation Practice Projects

Generative Steganography Research

Exploring generative information hiding techniques based on deep learning

Robust Hiding Algorithms

Developing compression-resistant and attack-resistant information hiding methods

Multimedia Watermarking Technology

Research on copyright protection for multimedia content such as images and videos

Covert Communication Systems

Building secure communication platforms based on information hiding

Course Materials

Course PPT Materials

Course PPT

Detailed course slide materials covering theoretical foundations to practical applications

Course Videos

Course Videos

Recorded course lectures supporting online viewing and downloading

Online Reference Books

Reference Books

Online textbooks and reference materials related to information hiding

Deep Learning Resources

Deep Learning

Learning materials on deep learning applications in information hiding

Practical Tools

Experimental Code Repository

Course experiment code examples and implementation templates

Access Repository

Datasets

Standard datasets and test samples for experiments

Download Data

Evaluation Tools

Performance evaluation and analysis tools for information hiding algorithms

Get Tools

Extended Reading

Professional WeChat Public Accounts

Recommended Journals and Conferences

IEEE Transactions on Information Forensics and Security

Top-tier journal in information security

ACM Transactions on Multimedia Computing, Communications, and Applications

Multimedia technology journal

International Workshop on Digital Watermarking (IWDW)

International workshop on digital watermarking

Media Watermarking, Security, and Forensics

SPIE multimedia security conference


If you have any questions or need further learning resources, please feel free to contact us!