A review of coverless steganography

被引:8
|
作者
Meng, Laijin [1 ]
Jiang, Xinghao [1 ]
Sun, Tanfeng [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Information hiding; Coverless steganography; Anti-steganalysis; Robustness; Security; DATA HIDING ALGORITHM; ROBUST WATERMARKING; IMAGE; VIDEO; SCHEME; STEGANALYSIS; TRANSFORM; H.264/AVC; SET; CNN;
D O I
10.1016/j.neucom.2023.126945
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the enhancement of people's security awareness, transmitting secret information securely has gradually become a demand for the public. Steganography is a technology of representing secret information within another carrier, aiming at transmitting secret information without causing suspicion. Most of the traditional steganographic algorithms hide secret information by modifying the statistical characteristics, which will leave traces to the carriers. Although these modifications are too tiny to be distinguished by human eyes, they can be detected by steganalysis algorithms. Differently, coverless steganography, also written as steganography without embedding, accomplish the process of information hiding by constructing the relationship between secret information and carriers. Due to no modification to the carriers, all of the steganalysis algorithms are expired. In this paper, more than 90 papers are included to provide a review in coverless steganographic algorithms, covering the major development process of coverless image and video steganographic algorithms. The main contribution of the existing methods is summarized. Besides, the current general issues of capacity, robustness, and security are discussed adequately for both image and video algorithms. Especially, the security of coverless steganography is discussed for the first time from theoretical analysis to actual investigation in this review.
引用
收藏
页数:22
相关论文
共 50 条
  • [31] An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS
    Liu, Yuling
    Wu, Jiao
    Chen, Xianyi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (04) : 1553 - 1567
  • [32] Coverless Image Steganography Based on Multi-Object Recognition
    Luo, Yuanjing
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (07) : 2779 - 2791
  • [33] A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures
    Wang, Kaixi
    Yu, Xiangmei
    Zou, Ziyi
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (06)
  • [34] Privacy Protection for Medical Images Based on DenseNet and Coverless Steganography
    Tan, Yun
    Qin, Jiaohua
    Tang, Hao
    Xiang, Xuyu
    Tan, Ling
    Xiong, Neal N.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (03): : 1797 - 1817
  • [35] Robust coverless image steganography based on human pose estimation
    Tan, Yang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    KNOWLEDGE-BASED SYSTEMS, 2024, 296
  • [36] Coverless Steganography Based on Low Similarity Feature Selection in DCT Domain
    Tan, Lina
    Liu, Jiajun
    Zhou, Yu
    Chen, Rongyuan
    RADIOENGINEERING, 2023, 32 (04) : 603 - 615
  • [37] Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping
    Li, Runze
    Qin, Jiaohua
    Tan, Yun
    Xiong, Neal N.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 1571 - 1583
  • [38] Coverless image steganography using partial-duplicate image retrieval
    Zhou, Zhili
    Mu, Yan
    Wu, Q. M. Jonathan
    SOFT COMPUTING, 2019, 23 (13) : 4927 - 4938
  • [39] A Robust Coverless Video Steganography Based on the Similarity of Inter-Frames
    Meng, Laijin
    Jiang, Xinghao
    Sun, Tanfeng
    Zhao, Zeyu
    Xu, Qiang
    IEEE TRANSACTIONS ON MULTIMEDIA, 2024, 26 : 5996 - 6011
  • [40] Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages
    Wen, Wenying
    Huang, Haigang
    Qi, Shuren
    Zhang, Yushu
    Fang, Yuming
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (03): : 2951 - 2962