A review of coverless steganography

被引:8
|
作者
Meng, Laijin [1 ]
Jiang, Xinghao [1 ]
Sun, Tanfeng [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Information hiding; Coverless steganography; Anti-steganalysis; Robustness; Security; DATA HIDING ALGORITHM; ROBUST WATERMARKING; IMAGE; VIDEO; SCHEME; STEGANALYSIS; TRANSFORM; H.264/AVC; SET; CNN;
D O I
10.1016/j.neucom.2023.126945
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the enhancement of people's security awareness, transmitting secret information securely has gradually become a demand for the public. Steganography is a technology of representing secret information within another carrier, aiming at transmitting secret information without causing suspicion. Most of the traditional steganographic algorithms hide secret information by modifying the statistical characteristics, which will leave traces to the carriers. Although these modifications are too tiny to be distinguished by human eyes, they can be detected by steganalysis algorithms. Differently, coverless steganography, also written as steganography without embedding, accomplish the process of information hiding by constructing the relationship between secret information and carriers. Due to no modification to the carriers, all of the steganalysis algorithms are expired. In this paper, more than 90 papers are included to provide a review in coverless steganographic algorithms, covering the major development process of coverless image and video steganographic algorithms. The main contribution of the existing methods is summarized. Besides, the current general issues of capacity, robustness, and security are discussed adequately for both image and video algorithms. Especially, the security of coverless steganography is discussed for the first time from theoretical analysis to actual investigation in this review.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Coverless Image Steganography: A Survey
    Qin, Jiaohua
    Luo, Yuanjing
    Xiang, Xuyu
    Tan, Yun
    Huang, Huajun
    IEEE ACCESS, 2019, 7 : 171372 - 171394
  • [2] Delving into the Methods of Coverless Image Steganography
    Ng, Koi Yee
    Ong, Simying
    Wong, KokSheik
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1763 - 1772
  • [3] Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction
    Zou, Liming
    Li, Jing
    Wan, Wenbo
    Wu, Q. M. Jonathan
    Sun, Jiande
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 5552 - 5564
  • [4] A Robust Coverless Steganography Based on Controllable Semantic Camouflage
    Guo, Yifan
    Chen, Liquan
    Li, Xiao
    Chen, Jiuhao
    Liu, Yinqiang
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 505 - 509
  • [5] Coverless Image Steganography Framework with Increased Payload Capacity
    Zhang, Ying
    Zheng, Lilei
    Lu, Yew Yi
    Thing, Vrizlynn L. L.
    Zimmermann, Roger
    2019 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2019), 2019, : 140 - 147
  • [6] Coverless Image Steganography Based on SIFT and BOF
    Yuan, Chengsheng
    Xia, Zhihua
    Sun, Xingming
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02): : 435 - 442
  • [7] Coverless Steganography Based on Motion Analysis of Video
    Tan, Yun
    Qin, Jiaohua
    Xiang, Xuyu
    Zhang, Chunhu
    Wang, Zhangdong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Coverless image steganography based on image segmentation
    Luo Y.
    Qin J.
    Xiang X.
    Tan Y.
    He Z.
    Xiong N.N.
    Qin, Jiaohua (qinjiaohua@163.com), 1600, Tech Science Press (64): : 1281 - 1295
  • [9] Advancements and challenges in coverless image steganography: A survey
    Xiang, Xuyu
    Tan, Yang
    Qin, Jiaohua
    Tan, Yun
    SIGNAL PROCESSING, 2025, 228
  • [10] Coverless VoIP Steganography Using Hash and Hash
    Deepikaa, S.
    Saravanan, R.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (03) : 102 - 115