Citation: Xianyi Chen, Anqi Qiu, Xingming Sun, Shuai Wang, Guo Wei. A high-capacity coverless image steganography method based on double-level index and block matching[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4708-4722. doi: 10.3934/mbe.2019236
[1] | R. H. Meng, S. G. Rice, J. Wang, et al., A fusion steganographic algorithm based on faster R-CNN, CMC-Comput. Mater. Con., 55 (2018), 1–16. |
[2] | Q. K. Nie, X. B. Xu, B. W. Feng, et al., Defining embedding distortion for intra prediction mode-based video steganography, CMC-Comput. Mater. Con., 55 (2018), 59–70. |
[3] | X. Y. Chen, H. Y. Sun, Y. Tobe, et al., Coverless information hiding method based on the Chinese mathematical expression, International Conference on Cloud Computing and Security, (2015), 133–143. |
[4] | Z. L. Zhou, Y. Mu, C. N. Yang, et al., Coverless multi-keywords information hiding method based on text, IJSIA, 10 (2016), 309–320. |
[5] | Z. L. Zhou, Y. Mu, N. S. Zhao, et al., Coverless information hiding method based on Multi-keywords, International Conference on Cloud Computing and Security, (2016), 39–47. |
[6] | Z. H. Xia, X. Li and Y. L. Wu, Coverless information hiding based on LSB of the character's unicode, J. Internet Technol., 18 (2017), 1353–1360. |
[7] | X. Y. Chen, S. Chen, and Y. L. Wu, Coverless information hiding method based on the Chinese character encoding, J. Internet Technol., 18 (2017), 313–320. |
[8] | Y. L. Wu and X. M. Sun, Text coverless information hiding method based on Hybrid Tags, J. Internet Technol., 19 (2018), 649–655. |
[9] | X. Y. Chen and S. Chen, Text coverless information hiding based on composition and selection of words, Soft Comput., (2018), 1–8. |
[10] | Z. J. Fu and H. Y. Ji, Label model based coverless information hiding method, J. Internet Technol., 19 (2018), 1509–1514. |
[11] | Y. L. Wu, X. Y. Chen and X. M. Sun, Coverless steganography based on English texts using binary tags protocol, J. Internet Technol., 19 (2018), 599–606. |
[12] | Z. L. Zhou, H. Y. Sun, R. Harit, et al., Coverless image steganography without embedding, International Conference on Cloud Computing and Security, (2015), 123–132. |
[13] | S. L. Zheng, L. Wang, B. H. Ling, et al., Coverless information hiding based on robust image hashing, International Conference on Intelligent Computing, (2017), 536–547. |
[14] | C. S. Yuan, Z. H. Xia and X. M. Sun, Coverless image steganography based on SIFT and BOF, J. Internet Technol., 18 (2017), 435–442. |
[15] | Z. L. Zhou, Y. Mu and Q. M. Wu, Coverless image steganography using partial-duplicate visual retrieval, Soft Comput., (2018), 1–12. |
[16] | H. Y. Sun, R. Grishman and Y. C. Wang, Active learning based named entity recognition and its application in natural language coverless information hiding, J. Internet Technol., 18 (2017), 443–451. |
[17] | M. M. Liu, M. Q. Zhang, J. Liu, et al., Coverless information hiding based on generative adversarial networks, J. Appl. Sci., 36 (2018), 371–382. |
[18] | X. T. Duan and H. X. Song, Coverless information hiding based on generative model, Internaltional Conference on Computer Vision and Pattern Recogintion, (2018). |
[19] | X. Zhang, F. Peng and M. Long, Robust coverless image steganography based on DCT and LDA topic classification, IEEE T. Multimedia, 99 (2018), 1. |
[20] | Z. L. Zhou, Y. Cao and X. M. Sun, Coverless information hiding based onbag-of-words model of image, J. Appl. Sci., 34 (2016), 527–536. |
[21] | Q. Huynh-Thu and M. Ghanbari, Scope of validity of PSNR in image/video quality assessment. Electron. Lett., 44 (2008), 800–801. |
[22] | Q. L. Zhou, Y. B. Qiu, L. Li, et al., Steganography using reversible texture synthesis based on seeded region growing and LSB, CMC-Comput. Mater. Con., 55 (2018), 151–163. |
[23] | J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, International Workshop on Information Hiding, (2004), 67–81. |