Coverless image steganography based on DenseNet feature mapping

被引:22
作者
Liu, Qiang [1 ]
Xiang, Xuyu [1 ,2 ]
Qin, Jiaohua [1 ]
Tan, Yun [1 ]
Qiu, Yao [1 ]
机构
[1] Cent South Univ Forestry & Technol, Coll Comp Sci & Informat Technol, Changsha 410004, Peoples R China
[2] Hunan Univ Finance & Econ, Coll Informat Technol & Management, Changsha 410205, Peoples R China
基金
中国国家自然科学基金;
关键词
Coverless image steganography; Deep learning; DenseNet convolutional neural network; CNN features; RECOGNITION; ALGORITHM; SYSTEM;
D O I
10.1186/s13640-020-00521-7
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-geometric attacks. However, they do not perform well under some geometric attacks. Towards this goal, a CIS algorithm based on DenseNet feature mapping is proposed. Deep learning is introduced to extract high-dimensional CNN features which are mapped into hash sequences. For the sender, a binary tree hash index is built to accelerate index speed of searching hidden information and DenseNet hash sequence, and then, all matched images are sent. For the receiver, the secret information can be recovered successfully by calculating the DenseNet hash sequence of the cover image. During the whole steganography process, the cover images remain unchanged. Experimental results and analysis show that the proposed scheme has better robust compared with the state-of-the-art methods under geometric attacks.
引用
收藏
页数:18
相关论文
共 37 条
[1]  
[Anonymous], 2017, ACM, DOI [DOI 10.2165/00129785-200404040-00005, DOI 10.1145/3065386]
[2]  
Griffin G., 2007, CALTECH 256 OBJECT C
[3]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[4]  
Holub V, 2012, IEEE INT WORKS INFOR, P234, DOI 10.1109/WIFS.2012.6412655
[5]   Densely Connected Convolutional Networks [J].
Huang, Gao ;
Liu, Zhuang ;
van der Maaten, Laurens ;
Weinberger, Kilian Q. .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :2261-2269
[6]  
Jegou H, 2008, LECT NOTES COMPUT SC, V5302, P304, DOI 10.1007/978-3-540-88682-2_24
[7]   Learning generative visual models from few training examples: An incremental Bayesian approach tested on 101 object categories [J].
Li Fei-Fei ;
Fergus, Rob ;
Perona, Pietro .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2007, 106 (01) :59-70
[8]   An Efficient Image Matching Algorithm Based on Adaptive Threshold and RANSAC [J].
Li, Hao ;
Qin, Jiaohua ;
Xiang, Xuyu ;
Pan, Lili ;
Ma, Wentao ;
Xiong, Neal N. .
IEEE ACCESS, 2018, 6 :66963-66971
[9]   Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping [J].
Liu, Qiang ;
Xiang, Xuyu ;
Qin, Jiaohua ;
Tan, Yun ;
Tan, Junshan ;
Luo, Yuanjing .
KNOWLEDGE-BASED SYSTEMS, 2020, 192
[10]   Edge Adaptive Image Steganography Based on LSB Matching Revisited [J].
Luo, Weiqi ;
Huang, Fangjun ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) :201-214