Coverless Steganography Based on Low Similarity Feature Selection in DCT Domain

被引:1
|
作者
Tan, Lina [1 ,2 ]
Liu, Jiajun [1 ]
Zhou, Yu [1 ]
Chen, Rongyuan [3 ]
机构
[1] Hunan Univ Technol & Business, Sch Comp Sci, Changsha 410205, Peoples R China
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
[3] Hunan Univ Technol & Business, Sch Resource & Environm, Changsha 410205, Peoples R China
关键词
Coverless; steganography; feature collision; DCTR; JPEG; STEGANALYSIS; IMAGES;
D O I
10.13164/re.2023.0603
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Coverless image steganography typically extracts feature sequences from cover images to map information. Once the extracted features have high similarity, it is challenging to construct a complete mapping sequence set, which places a heavy burden on the underlying storage and computation. In order to improve database utilization while increasing the data-hiding capacity, we propose a coverless steganography model based on low-similarity feature selection in the DCT domain. A mapping algorithm is presented based on an 8000-dimensional feature termed CS-DCTR extracted from each image to convert into binary sequences. The high feature dimension leads to a high capacity, ranging from 8 to 25 bits per image. Furthermore, scrambling is employed for feature mapping before building an inverted index tree, considerably enhancing security against steganalysis. Experimental results show that CS-DCTR features exhibit high diversity, averaging 49.3% complete mapping sequences, which indicates lower similarity among CS-DCTR features. The technique also demonstrates resistance to normal operations and benign attacks. The information extraction accuracy rises to 96.7% on average under typical noise attacks. Moreover, our technique achieves excellent performance in terms of hiding capacity, image utilization, and transmission security.
引用
收藏
页码:603 / 615
页数:13
相关论文
共 50 条
  • [31] Coverless Text Steganography Based on Half Frequency Crossover Rule
    Wu, Ning
    Shang, Poli
    Ma, Weibo
    Yang, Zhongliang
    Liu, Zhenru
    Fan, Jin
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 726 - 729
  • [32] Robust JPEG steganography based on DCT and SVD in nonsubsampled shearlet transform domain
    Xiaofeng Song
    Chunfang Yang
    Kun Han
    Shichang Ding
    Multimedia Tools and Applications, 2022, 81 : 36453 - 36472
  • [33] Zero-steganography using DCT and Spatial domain
    Bilal, Muhammad
    Imtiaz, Sana
    Abdul, Wadood
    Ghouzali, Sanaa
    2013 ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2013,
  • [34] Audio steganography by quantization index modulation in the DCT domain
    Chen, Ming
    Zhang, Ru
    Liu, Fan-Fan
    Niu, Xin-Xin
    Yang, Yi-Xian
    Tongxin Xuebao/Journal on Communication, 2009, 30 (08): : 105 - 111
  • [35] Enhancement using chaos of a Steganography method in DCT domain
    Habib, Milia
    Bakhache, Bassem
    Battikh, Dalia
    El Assad, Safivan
    2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2015, : 204 - 209
  • [36] Coverless Data Hiding in VoIP based on DNA Steganography with Authentication
    Soundararajan, Deepikaa
    Ramakrishnan, Saravanan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (02) : 190 - 198
  • [37] Coverless Image Steganography Based on Jigsaw Puzzle Image Generation
    Saad, Al Hussien Seddik
    Mohamed, M. S.
    Hafez, E. H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2077 - 2091
  • [38] A Coverless Image Steganography Based on a Robust Object Detection Network
    Meng, Laijin
    Jiang, Xinghao
    Xu, Qiang
    Mi, Zhongjie
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VIII, ICIC 2024, 2024, 14869 : 343 - 356
  • [39] An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS
    Liu, Yuling
    Wu, Jiao
    Chen, Xianyi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (04) : 1553 - 1567
  • [40] Robust coverless video steganography based on pose estimation and object tracking
    Li, Nan
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87