A review of coverless steganography

被引:8
|
作者
Meng, Laijin [1 ]
Jiang, Xinghao [1 ]
Sun, Tanfeng [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Information hiding; Coverless steganography; Anti-steganalysis; Robustness; Security; DATA HIDING ALGORITHM; ROBUST WATERMARKING; IMAGE; VIDEO; SCHEME; STEGANALYSIS; TRANSFORM; H.264/AVC; SET; CNN;
D O I
10.1016/j.neucom.2023.126945
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the enhancement of people's security awareness, transmitting secret information securely has gradually become a demand for the public. Steganography is a technology of representing secret information within another carrier, aiming at transmitting secret information without causing suspicion. Most of the traditional steganographic algorithms hide secret information by modifying the statistical characteristics, which will leave traces to the carriers. Although these modifications are too tiny to be distinguished by human eyes, they can be detected by steganalysis algorithms. Differently, coverless steganography, also written as steganography without embedding, accomplish the process of information hiding by constructing the relationship between secret information and carriers. Due to no modification to the carriers, all of the steganalysis algorithms are expired. In this paper, more than 90 papers are included to provide a review in coverless steganographic algorithms, covering the major development process of coverless image and video steganographic algorithms. The main contribution of the existing methods is summarized. Besides, the current general issues of capacity, robustness, and security are discussed adequately for both image and video algorithms. Especially, the security of coverless steganography is discussed for the first time from theoretical analysis to actual investigation in this review.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] A Robust Coverless Steganography Scheme Using Camouflage Image
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Zhang, Qin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (06) : 4038 - 4051
  • [22] Coverless Steganography for Digital Images Based on a Generative Model
    Duan, Xintao
    Song, Haoxian
    Qin, Chuan
    Khan, Muhammad Khurram
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (03): : 483 - 493
  • [23] Coverless Video Steganography Based on Audio and Frame Features
    Zhang, Chunhu
    Tan, Yun
    Qin, Jiaohua
    Xiang, Xuyu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [24] A Coverless Audio Steganography Based on Generative Adversarial Networks
    Li, Jing
    Wang, Kaixi
    Jia, Xiaozhu
    ELECTRONICS, 2023, 12 (05)
  • [25] Coverless Text Steganography Based on Half Frequency Crossover Rule
    Wu, Ning
    Shang, Poli
    Ma, Weibo
    Yang, Zhongliang
    Liu, Zhenru
    Fan, Jin
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 726 - 729
  • [26] Robust coverless video steganography based on pose estimation and object tracking
    Li, Nan
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87
  • [27] Coverless Data Hiding in VoIP based on DNA Steganography with Authentication
    Soundararajan, Deepikaa
    Ramakrishnan, Saravanan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (02) : 190 - 198
  • [28] Novel Coverless Steganography Method Based on Image Selection and StarGAN
    Chen, Xianyi
    Zhang, Zhentian
    Qiu, Anqi
    Xia, Zhihua
    Xiong, Neal N.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (01): : 219 - 230
  • [29] Coverless Image Steganography Based on Jigsaw Puzzle Image Generation
    Saad, Al Hussien Seddik
    Mohamed, M. S.
    Hafez, E. H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2077 - 2091
  • [30] A Coverless Image Steganography Based on a Robust Object Detection Network
    Meng, Laijin
    Jiang, Xinghao
    Xu, Qiang
    Mi, Zhongjie
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VIII, ICIC 2024, 2024, 14869 : 343 - 356