Research article Special Issues

A high-capacity coverless image steganography method based on double-level index and block matching

  • Received: 13 January 2019 Accepted: 31 March 2019 Published: 23 May 2019
  • Recently, a new information hiding technology called coverless information steganography (CIS) is proposed, which uses the original natural image as stego image for the transmission of secret information which can resist the detection of image steganalysis algorithm, so it received extensive attention and support. However, it is still a low hidden capacity of the CIS methods up to now. This paper proposes a high-capacity coverless information steganography technology. In which we divide the cover image into several image blocks and every image block can represent one bit secret information which improves the capacity greatly. Then we retrieve the image blocks for replacement from the image block database based on secret information and then synthesize them into stego image. The quality of the stego image is still high because the required image blocks are similar to cover image blocks and they are all from natural images. Moreover, in order to improve the retrieval efficiency, we have established a double-level index structure. The experimental results show that compared with the existing CIS methods, the proposed method has larger capacity and better visual quality.

    Citation: Xianyi Chen, Anqi Qiu, Xingming Sun, Shuai Wang, Guo Wei. A high-capacity coverless image steganography method based on double-level index and block matching[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 4708-4722. doi: 10.3934/mbe.2019236

    Related Papers:

  • Recently, a new information hiding technology called coverless information steganography (CIS) is proposed, which uses the original natural image as stego image for the transmission of secret information which can resist the detection of image steganalysis algorithm, so it received extensive attention and support. However, it is still a low hidden capacity of the CIS methods up to now. This paper proposes a high-capacity coverless information steganography technology. In which we divide the cover image into several image blocks and every image block can represent one bit secret information which improves the capacity greatly. Then we retrieve the image blocks for replacement from the image block database based on secret information and then synthesize them into stego image. The quality of the stego image is still high because the required image blocks are similar to cover image blocks and they are all from natural images. Moreover, in order to improve the retrieval efficiency, we have established a double-level index structure. The experimental results show that compared with the existing CIS methods, the proposed method has larger capacity and better visual quality.


    加载中


    [1] R. H. Meng, S. G. Rice, J. Wang, et al., A fusion steganographic algorithm based on faster R-CNN, CMC-Comput. Mater. Con., 55 (2018), 1–16.
    [2] Q. K. Nie, X. B. Xu, B. W. Feng, et al., Defining embedding distortion for intra prediction mode-based video steganography, CMC-Comput. Mater. Con., 55 (2018), 59–70.
    [3] X. Y. Chen, H. Y. Sun, Y. Tobe, et al., Coverless information hiding method based on the Chinese mathematical expression, International Conference on Cloud Computing and Security, (2015), 133–143.
    [4] Z. L. Zhou, Y. Mu, C. N. Yang, et al., Coverless multi-keywords information hiding method based on text, IJSIA, 10 (2016), 309–320.
    [5] Z. L. Zhou, Y. Mu, N. S. Zhao, et al., Coverless information hiding method based on Multi-keywords, International Conference on Cloud Computing and Security, (2016), 39–47.
    [6] Z. H. Xia, X. Li and Y. L. Wu, Coverless information hiding based on LSB of the character's unicode, J. Internet Technol., 18 (2017), 1353–1360.
    [7] X. Y. Chen, S. Chen, and Y. L. Wu, Coverless information hiding method based on the Chinese character encoding, J. Internet Technol., 18 (2017), 313–320.
    [8] Y. L. Wu and X. M. Sun, Text coverless information hiding method based on Hybrid Tags, J. Internet Technol., 19 (2018), 649–655.
    [9] X. Y. Chen and S. Chen, Text coverless information hiding based on composition and selection of words, Soft Comput., (2018), 1–8.
    [10] Z. J. Fu and H. Y. Ji, Label model based coverless information hiding method, J. Internet Technol., 19 (2018), 1509–1514.
    [11] Y. L. Wu, X. Y. Chen and X. M. Sun, Coverless steganography based on English texts using binary tags protocol, J. Internet Technol., 19 (2018), 599–606.
    [12] Z. L. Zhou, H. Y. Sun, R. Harit, et al., Coverless image steganography without embedding, International Conference on Cloud Computing and Security, (2015), 123–132.
    [13] S. L. Zheng, L. Wang, B. H. Ling, et al., Coverless information hiding based on robust image hashing, International Conference on Intelligent Computing, (2017), 536–547.
    [14] C. S. Yuan, Z. H. Xia and X. M. Sun, Coverless image steganography based on SIFT and BOF, J. Internet Technol., 18 (2017), 435–442.
    [15] Z. L. Zhou, Y. Mu and Q. M. Wu, Coverless image steganography using partial-duplicate visual retrieval, Soft Comput., (2018), 1–12.
    [16] H. Y. Sun, R. Grishman and Y. C. Wang, Active learning based named entity recognition and its application in natural language coverless information hiding, J. Internet Technol., 18 (2017), 443–451.
    [17] M. M. Liu, M. Q. Zhang, J. Liu, et al., Coverless information hiding based on generative adversarial networks, J. Appl. Sci., 36 (2018), 371–382.
    [18] X. T. Duan and H. X. Song, Coverless information hiding based on generative model, Internaltional Conference on Computer Vision and Pattern Recogintion, (2018).
    [19] X. Zhang, F. Peng and M. Long, Robust coverless image steganography based on DCT and LDA topic classification, IEEE T. Multimedia, 99 (2018), 1.
    [20] Z. L. Zhou, Y. Cao and X. M. Sun, Coverless information hiding based onbag-of-words model of image, J. Appl. Sci., 34 (2016), 527–536.
    [21] Q. Huynh-Thu and M. Ghanbari, Scope of validity of PSNR in image/video quality assessment. Electron. Lett., 44 (2008), 800–801.
    [22] Q. L. Zhou, Y. B. Qiu, L. Li, et al., Steganography using reversible texture synthesis based on seeded region growing and LSB, CMC-Comput. Mater. Con., 55 (2018), 151–163.
    [23] J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, International Workshop on Information Hiding, (2004), 67–81.
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4724) PDF downloads(699) Cited by(0)

Article outline

Figures and Tables

Figures(8)  /  Tables(4)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog