Partial-duplicate image retrieval based on HSV colour space for coverless information hiding

被引:0
作者
Zhao N. [1 ]
Zhou Z. [1 ,2 ]
Liao L. [1 ]
机构
[1] School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing
[2] Jiangsu Engineering Centre of Network Monitoring and School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing
来源
International Journal of Computational Science and Engineering | 2019年 / 19卷 / 01期
关键词
Coverless image steganography; HSV; Image retrieval; Information hiding; Partial-duplicate image;
D O I
10.1504/IJCSE.2019.099675
中图分类号
学科分类号
摘要
In conventional image steganography approaches, modification traces will be left in the designated cover images. Consequently, the secret information could be possibly detected by steganalysis tools. In this paper, a coverless image steganography approach based on partial-duplicate image retrieval is proposed to hide images without modification. First, we divide equally any given query or database image into a set of image blocks. Then, for a given query image, we search for its partial-duplicate images in a large-scale database according to the similarity between the HSV colour features of image blocks. Finally, these retrieved partial-duplicate images are used to represent and hide the secret image. Moreover, we propose an encryption algorithm based on chaotic maps to ensure the security of our approach. Both the theoretical analysis and experimental results demonstrate that the proposed coverless image steganography approach has good security, high robustness and strong resistance to the existing steganalysis tools. Copyright © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:15 / 24
页数:9
相关论文
共 61 条
  • [1] Bender W., Gruhl D., Morimoto N., Lu A., Techniques for data hiding, IBM Systems Journal, 35, 3-4, pp. 313-336, (1995)
  • [2] Chang C.C., Kieu T.D., Chou Y.C., Reversible information hiding for VQ indices based on locally adaptive coding, Journal of Visual Communication and Image Representation, 20, 1, pp. 57-64, (2009)
  • [3] Chaves-Gonzalez J.M., Vega-Rodriguez M.A., Gomez-Pulido J.A., Sanchez-Perez J.M., Detecting skin in face recognition systems: A colour spaces study, Digital Signal Processing, 20, 3, pp. 806-823, (2010)
  • [4] Cheddad A., Condell J., Curran K., Mc Kevitt P., Review: Digital image steganography: Survey and analysis of current methods, Signal Processing, 90, 3, pp. 727-752, (2010)
  • [5] Chen P.Y., Lin H.J., A DWT based approach for image steganography, International Journal of Applied Science and Engineering, 4, 3, pp. 275-290, (2010)
  • [6] Chen W.Y., Color image steganography scheme using set partitioning in hierarchical trees coding, digital fourier transform and adaptive phase modulation, Applied Mathematics and Computation, 185, 1, pp. 432-448, (2007)
  • [7] Chen X., Sun H., Tobe Y., Zhou Z., Sun X., Coverless information hiding method based on the Chinese mathematical expression, International Conference on Cloud Computing and Security, 18, (2015)
  • [8] Chen X., Sun X., Sun H., Zhou Z., Zhang J., Reversible watermarking method based on asymmetric-histogram shifting of prediction errors, Journal of Systems and Software, 86, 10, pp. 2620-2626, (2013)
  • [9] Cox I.J., Kilian J., Leighton F.T., Shamoon T., Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing a Publication of the IEEE Signal Processing Society, 6, 12, (1997)
  • [10] De-He X.U., Zhu C.Q., Wang Q.S., A construction of digital watermarking model for the vector geospatial data based on magnitude and phase of DFT, Journal of Beijing University of Posts and Telecommunications, 34, 5, pp. 25-28, (2011)