Coverless Image Steganography Based on SIFT and BOF

被引:108
|
作者
Yuan, Chengsheng [1 ,2 ]
Xia, Zhihua [1 ,2 ]
Sun, Xingming [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 02期
关键词
Coverless image steganography; Protocol of feature; Scale invarient feature transform; Hash sequence; Bag of feature; STEGANALYSIS; ALGORITHM;
D O I
10.6138/JIT.2017.18.2.20160624c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniques provide us with some more secure communication, the modification traces will be detected through using these brand-new steganalysis tools. Thereby, in order to eliminate the influence of modification traces, we propose a novel coverless image steganography scheme based on scale invarient feature transform and bag of feature. Different from conventional steganography, images have already contained the concealing information, so we can transmit natural images, whose features are the same with the secret information, to receivers. Firstly, the robust feature hash sequences are constructed with our protocol of feature. Then, the secret message is converted into bitstreams. Finally, these images with the seceret information are chosen and sent to receivers through using inverted index. Throughout the process, original images are never modified in our scheme, so our method can resist the analysis of existing steganalysis tools. Numerical experiments also indicate that our scheme has a desirable robustness to the common image attacks.
引用
收藏
页码:435 / 442
页数:8
相关论文
共 50 条
  • [41] A coverless steganography method based on generative adversarial network
    Xintao Duan
    Baoxia Li
    Daidou Guo
    Zhen Zhang
    Yuanyuan Ma
    EURASIP Journal on Image and Video Processing, 2020
  • [42] Coverless Steganography for Digital Images Based on a Generative Model
    Duan, Xintao
    Song, Haoxian
    Qin, Chuan
    Khan, Muhammad Khurram
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (03): : 483 - 493
  • [43] Coverless Video Steganography Based on Audio and Frame Features
    Zhang, Chunhu
    Tan, Yun
    Qin, Jiaohua
    Xiang, Xuyu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [44] A Coverless Audio Steganography Based on Generative Adversarial Networks
    Li, Jing
    Wang, Kaixi
    Jia, Xiaozhu
    ELECTRONICS, 2023, 12 (05)
  • [45] A novel large capacity coverless image steganography method based on hybrid framework of image generation-mapping
    Li, Zhe
    Zhang, Qiuyu
    Li, Xiaopeng
    MULTIMEDIA SYSTEMS, 2024, 30 (06)
  • [46] High capacity coverless image steganography method based on geometrically robust and chaotic encrypted image moment feature
    Liu, Xiyao
    Fang, Yaokun
    He, Feiyi
    Li, Zhaoying
    Zhang, Yayun
    Zeng, Xiongfei
    2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 1455 - 1460
  • [47] Coverless Text Steganography Based on Half Frequency Crossover Rule
    Wu, Ning
    Shang, Poli
    Ma, Weibo
    Yang, Zhongliang
    Liu, Zhenru
    Fan, Jin
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 726 - 729
  • [48] Message Drives Image: A Coverless Image Steganography Framework Using Multi-Domain Image Translation
    Xue, Rui
    Wang, Yaning
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [49] IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography
    Zhang, Chunying
    Gao, Xinkai
    Liu, Xiaoxiao
    Hou, Wei
    Yang, Guanghui
    Xue, Tao
    Wang, Liya
    Liu, Lu
    ELECTRONICS, 2023, 12 (13)
  • [50] Robust coverless image steganography based on DenseUNet with multi-scale feature fusion and attention mechanism
    Li, Xiaopeng
    Zhang, Qiuyu
    Li, Zhe
    SIGNAL IMAGE AND VIDEO PROCESSING, 2024, 18 (11) : 8251 - 8266