Export file:

Format

  • RIS(for EndNote,Reference Manager,ProCite)
  • BibTex
  • Text

Content

  • Citation Only
  • Citation and Abstract

A high-capacity coverless image steganography method based on double-level index and block matching

1 School of Computer and Software, Nanjing University of Information Science and Technology, Ning Liu Road, No. 219, Nanjing, 210044, China
2 Jiangsu Engineering Centre of Network Monitoring, Ning Liu Road, No. 219, Nanjing, 210044, China
3 Department of Radiology and BRIC, University of North Carolina at Chapel Hill, North Carolina 27599, USA
4 Mathematics and Computer Science, University of North Carolina at Pembroke, North Carolina 28372, USA

Special Issues: Security and Privacy Protection for Multimedia Information Processing and communication

Recently, a new information hiding technology called coverless information steganography (CIS) is proposed, which uses the original natural image as stego image for the transmission of secret information which can resist the detection of image steganalysis algorithm, so it received extensive attention and support. However, it is still a low hidden capacity of the CIS methods up to now. This paper proposes a high-capacity coverless information steganography technology. In which we divide the cover image into several image blocks and every image block can represent one bit secret information which improves the capacity greatly. Then we retrieve the image blocks for replacement from the image block database based on secret information and then synthesize them into stego image. The quality of the stego image is still high because the required image blocks are similar to cover image blocks and they are all from natural images. Moreover, in order to improve the retrieval efficiency, we have established a double-level index structure. The experimental results show that compared with the existing CIS methods, the proposed method has larger capacity and better visual quality.
  Figure/Table
  Supplementary
  Article Metrics

Keywords coverless-information-steganography (CIS); high capacity; big data; data hiding

Citation: Xianyi Chen, Anqi Qiu, Xingming Sun, Shuai Wang, Guo Wei. A high-capacity coverless image steganography method based on double-level index and block matching. Mathematical Biosciences and Engineering, 2019, 16(5): 4708-4722. doi: 10.3934/mbe.2019236

References

  • 1. R. H. Meng, S. G. Rice, J. Wang, et al., A fusion steganographic algorithm based on faster R-CNN, CMC-Comput. Mater. Con., 55 (2018), 1–16.
  • 2. Q. K. Nie, X. B. Xu, B. W. Feng, et al., Defining embedding distortion for intra prediction mode-based video steganography, CMC-Comput. Mater. Con., 55 (2018), 59–70.
  • 3. X. Y. Chen, H. Y. Sun, Y. Tobe, et al., Coverless information hiding method based on the Chinese mathematical expression, International Conference on Cloud Computing and Security, (2015), 133–143.
  • 4. Z. L. Zhou, Y. Mu, C. N. Yang, et al., Coverless multi-keywords information hiding method based on text, IJSIA, 10 (2016), 309–320.
  • 5. Z. L. Zhou, Y. Mu, N. S. Zhao, et al., Coverless information hiding method based on Multi-keywords, International Conference on Cloud Computing and Security, (2016), 39–47.
  • 6. Z. H. Xia, X. Li and Y. L. Wu, Coverless information hiding based on LSB of the character's unicode, J. Internet Technol., 18 (2017), 1353–1360.
  • 7. X. Y. Chen, S. Chen, and Y. L. Wu, Coverless information hiding method based on the Chinese character encoding, J. Internet Technol., 18 (2017), 313–320.
  • 8. Y. L. Wu and X. M. Sun, Text coverless information hiding method based on Hybrid Tags, J. Internet Technol., 19 (2018), 649–655.
  • 9. X. Y. Chen and S. Chen, Text coverless information hiding based on composition and selection of words, Soft Comput., (2018), 1–8.
  • 10. Z. J. Fu and H. Y. Ji, Label model based coverless information hiding method, J. Internet Technol., 19 (2018), 1509–1514.
  • 11. Y. L. Wu, X. Y. Chen and X. M. Sun, Coverless steganography based on English texts using binary tags protocol, J. Internet Technol., 19 (2018), 599–606.
  • 12. Z. L. Zhou, H. Y. Sun, R. Harit, et al., Coverless image steganography without embedding, International Conference on Cloud Computing and Security, (2015), 123–132.
  • 13. S. L. Zheng, L. Wang, B. H. Ling, et al., Coverless information hiding based on robust image hashing, International Conference on Intelligent Computing, (2017), 536–547.
  • 14. C. S. Yuan, Z. H. Xia and X. M. Sun, Coverless image steganography based on SIFT and BOF, J. Internet Technol., 18 (2017), 435–442.
  • 15. Z. L. Zhou, Y. Mu and Q. M. Wu, Coverless image steganography using partial-duplicate visual retrieval, Soft Comput., (2018), 1–12.
  • 16. H. Y. Sun, R. Grishman and Y. C. Wang, Active learning based named entity recognition and its application in natural language coverless information hiding, J. Internet Technol., 18 (2017), 443–451.
  • 17. M. M. Liu, M. Q. Zhang, J. Liu, et al., Coverless information hiding based on generative adversarial networks, J. Appl. Sci., 36 (2018), 371–382.
  • 18. X. T. Duan and H. X. Song, Coverless information hiding based on generative model, Internaltional Conference on Computer Vision and Pattern Recogintion, (2018).
  • 19. X. Zhang, F. Peng and M. Long, Robust coverless image steganography based on DCT and LDA topic classification, IEEE T. Multimedia, 99 (2018), 1.
  • 20. Z. L. Zhou, Y. Cao and X. M. Sun, Coverless information hiding based onbag-of-words model of image, J. Appl. Sci., 34 (2016), 527–536.
  • 21. Q. Huynh-Thu and M. Ghanbari, Scope of validity of PSNR in image/video quality assessment. Electron. Lett., 44 (2008), 800–801.
  • 22. Q. L. Zhou, Y. B. Qiu, L. Li, et al., Steganography using reversible texture synthesis based on seeded region growing and LSB, CMC-Comput. Mater. Con., 55 (2018), 151–163.
  • 23. J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, International Workshop on Information Hiding, (2004), 67–81.

 

Reader Comments

your name: *   your email: *  

© 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution Licese (http://creativecommons.org/licenses/by/4.0)

Download full text in PDF

Export Citation

Copyright © AIMS Press All Rights Reserved