Abstract: Highlights•Hide images in images with high quality and security.•Apply verification to make recipient only recover specific image.•Generation keys dynamically to guarantee security.•Learn a redundancy information to improve revealing.
Loading