A Robust joint coverless image steganography scheme based on two independent modules

被引:0
|
作者
Ren, Chang [1 ,2 ]
Wu, Bin [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Key Lab Cyberspace Secur Def, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
CYBERSECURITY | 2024年 / 7卷 / 01期
基金
中国国家自然科学基金;
关键词
Selection-based and generation-based coverless steganography; Generative adversarial network; Steganalysis; Joint steganography; STEGANALYSIS;
D O I
10.1186/s42400-024-00299-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all generation-based steganography methods, however both of which have their limitations. The former is difficult to meet actual communication requirements in terms of communication capacity and completeness due to the limit of the algorithm. Due to the irreversibility of the process of generating secret images from message codeword, the recovery accuracy of the latter is very poor. To this end, this paper designs a robust joint coverless image steganography scheme called Joint Coverless Image Steganography (JoCS). Firstly, this paper proposes the Semantic Factorization Fitting module (SeFF) and the Transform Domain Steganography module (TrDS). The former adds the secret message to the input vector of the low resolution layer in the StyleGAN generator network, which establishs a mapping rule between message codeword and the coarse feature of the generated image, and then the extractor is used to fit the above mapping rule, which has excellent robustness and completeness; the latter encodes the main content area of the image based on the encoder in VQGAN, and then adds secret message to the latent vector of the encoded image, which achieves the steganography in the latent domain of the image. Secondly, we demonstrate the independence between two modules and the advantages of connecting two modules. By using the image generated in the SeFF module as the cover image in the TrDS module, secondary steganography of a single image is achieved, based on which we design the JoCS scheme. The results show that our scheme breaks through the communication capacity limit in the selection-based coverless methods while guaranteeing 100% completeness, excellent image quality and outstanding robustness against various image attacks. Moreover, our scheme exhibits strong security against detection by multiple steganalysis tools and excellent practicality in practical communication. Finally, this paper also discusses the following three points as further elaboration of the scheme: (1) the advantages of the mapping rule in the SeFF module (2) the verification of the independence between the two modules (3) the flexibility of the joint steganography scheme.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] A Robust Coverless Steganography Scheme Using Camouflage Image
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Zhang, Qin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (06) : 4038 - 4051
  • [2] Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction
    Zou, Liming
    Li, Jing
    Wan, Wenbo
    Wu, Q. M. Jonathan
    Sun, Jiande
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 5552 - 5564
  • [3] A Coverless Image Steganography Based on a Robust Object Detection Network
    Meng, Laijin
    Jiang, Xinghao
    Xu, Qiang
    Mi, Zhongjie
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VIII, ICIC 2024, 2024, 14869 : 343 - 356
  • [4] Robust coverless image steganography based on human pose estimation
    Tan, Yang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    KNOWLEDGE-BASED SYSTEMS, 2024, 296
  • [5] A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
    Li, Fan
    Liu, Chenyang
    Dong, Zhenbo
    Sun, Zhibo
    Qian, Weipeng
    Security and Communication Networks, 2024, 2024
  • [6] Robust Coverless Image Steganography Based on DCT and LDA Topic Classification
    Zhang, Xiang
    Peng, Fei
    Long, Min
    IEEE TRANSACTIONS ON MULTIMEDIA, 2018, 20 (12) : 3223 - 3238
  • [7] Coverless image steganography based on image segmentation
    Luo Y.
    Qin J.
    Xiang X.
    Tan Y.
    He Z.
    Xiong N.N.
    Qin, Jiaohua (qinjiaohua@163.com), 1600, Tech Science Press (64): : 1281 - 1295
  • [8] Coverless Image Steganography Based on Image Segmentation
    Luo, Yuanjing
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    He, Zhibin
    Xiong, Neal N.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1281 - 1295
  • [9] A robust coverless image-synthesized video steganography based on asymmetric structure
    Jiao, Yueshuang
    Zhang, Zhenzhen
    Li, Zhenzhen
    Li, Zichen
    Li, Xiaolong
    Liu, Jiaoyun
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 104
  • [10] A Robust Coverless Steganography Based on Controllable Semantic Camouflage
    Guo, Yifan
    Chen, Liquan
    Li, Xiao
    Chen, Jiuhao
    Liu, Yinqiang
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 505 - 509