Coverless Image Steganography Based on SIFT and BOF

被引:108
|
作者
Yuan, Chengsheng [1 ,2 ]
Xia, Zhihua [1 ,2 ]
Sun, Xingming [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 02期
关键词
Coverless image steganography; Protocol of feature; Scale invarient feature transform; Hash sequence; Bag of feature; STEGANALYSIS; ALGORITHM;
D O I
10.6138/JIT.2017.18.2.20160624c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniques provide us with some more secure communication, the modification traces will be detected through using these brand-new steganalysis tools. Thereby, in order to eliminate the influence of modification traces, we propose a novel coverless image steganography scheme based on scale invarient feature transform and bag of feature. Different from conventional steganography, images have already contained the concealing information, so we can transmit natural images, whose features are the same with the secret information, to receivers. Firstly, the robust feature hash sequences are constructed with our protocol of feature. Then, the secret message is converted into bitstreams. Finally, these images with the seceret information are chosen and sent to receivers through using inverted index. Throughout the process, original images are never modified in our scheme, so our method can resist the analysis of existing steganalysis tools. Numerical experiments also indicate that our scheme has a desirable robustness to the common image attacks.
引用
收藏
页码:435 / 442
页数:8
相关论文
共 50 条
  • [31] A Robust Coverless Steganography Based on Controllable Semantic Camouflage
    Guo, Yifan
    Chen, Liquan
    Li, Xiao
    Chen, Jiuhao
    Liu, Yinqiang
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 505 - 509
  • [32] A Robust Coverless Image Steganography Based on an End-to-End Hash Generation Model
    Meng, Laijin
    Jiang, Xinghao
    Zhang, Zhenzhen
    Li, Zhaohong
    Sun, Tanfeng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (07) : 3542 - 3558
  • [33] Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm
    Zhou, Zhili
    Wu, Q. M. Jonathan
    Yang, Ching-Nung
    Sun, Xingming
    Pan, Zhaoqing
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05): : 1177 - 1184
  • [34] Coverless image steganography using morphed face recognition based on convolutional neural network
    Yung-Hui Li
    Ching-Chun Chang
    Guo-Dong Su
    Kai-Lin Yang
    Muhammad Saqlain Aslam
    Yanjun Liu
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [35] Coverless image steganography using morphed face recognition based on convolutional neural network
    Li, Yung-Hui
    Chang, Ching-Chun
    Su, Guo-Dong
    Yang, Kai-Lin
    Aslam, Muhammad Saqlain
    Liu, Yanjun
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [36] A coverless steganography method based on generative adversarial network
    Duan, Xintao
    Li, Baoxia
    Guo, Daidou
    Zhang, Zhen
    Ma, Yuanyuan
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [37] A Coverless Plain Text Steganography Based on Character Features
    Wang, Kaixi
    Gao, Quansheng
    IEEE ACCESS, 2019, 7 : 95665 - 95676
  • [38] Coverless Steganography for Face Recognition Based on Diffusion Model
    Guo, Yuan
    Liu, Ziqi
    IEEE ACCESS, 2024, 12 : 148770 - 148782
  • [39] A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography
    Liu, Jiajun
    Tan, Lina
    Zhou, Zhili
    Jiang, Weijin
    Li, Yi
    Chen, Peng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (02): : 3221 - 3240
  • [40] Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages
    Wen, Wenying
    Huang, Haigang
    Qi, Shuren
    Zhang, Yushu
    Fang, Yuming
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (03): : 2951 - 2962