Coverless Image Steganography Based on Image Segmentation

被引:13
|
作者
Luo, Yuanjing [1 ]
Qin, Jiaohua [1 ]
Xiang, Xuyu [1 ]
Tan, Yun [1 ]
He, Zhibin [1 ]
Xiong, Neal N. [2 ]
机构
[1] Cent South Univ Forestry & Technol, Coll Comp Sci & Informat Technol, Changsha 410114, Peoples R China
[2] Northeastern State Univ, Dept Math & Comp Sci, Tahlequah, OK 74464 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2020年 / 64卷 / 02期
基金
中国国家自然科学基金;
关键词
Coverless steganography; semantic feature; image segmentation; Mask RCNN; ResNet;
D O I
10.32604/cmc.2020.010867
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To resist the risk of the stego-image being maliciously altered during transmission, we propose a coverless image steganography method based on image segmentation. Most existing coverless steganography methods are based on whole feature mapping, which has poor robustness when facing geometric attacks, because the contents in the image are easy to lost. To solve this problem, we use ResNet to extract semantic features, and segment the object areas from the image through Mask RCNN for information hiding. These selected object areas have ethical structural integrity and are not located in the visual center of the image, reducing the information loss of malicious attacks. Then, these object areas will be binarized to generate hash sequences for information mapping. In transmission, only a set of stego-images unrelated to the secret information are transmitted, so it can fundamentally resist steganalysis. At the same time, since both Mask RCNN and ResNet have excellent robustness, pre-training the model through supervised learning can achieve good performance. The robust hash algorithm can also resist attacks during transmission. Although image segmentation will reduce the capacity, multiple object areas can be extracted from an image to ensure the capacity to a certain extent. Experimental results show that compared with other coverless image steganography methods, our method is more robust when facing geometric attacks.
引用
收藏
页码:1281 / 1295
页数:15
相关论文
共 50 条
  • [1] Coverless image steganography based on image segmentation
    Luo Y.
    Qin J.
    Xiang X.
    Tan Y.
    He Z.
    Xiong N.N.
    Qin, Jiaohua (qinjiaohua@163.com), 1600, Tech Science Press (64): : 1281 - 1295
  • [2] Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction
    Zou, Liming
    Li, Jing
    Wan, Wenbo
    Wu, Q. M. Jonathan
    Sun, Jiande
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 5552 - 5564
  • [3] Coverless Image Steganography Based on Jigsaw Puzzle Image Generation
    Saad, Al Hussien Seddik
    Mohamed, M. S.
    Hafez, E. H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2077 - 2091
  • [4] Coverless Image Steganography Based on SIFT and BOF
    Yuan, Chengsheng
    Xia, Zhihua
    Sun, Xingming
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02): : 435 - 442
  • [5] Coverless Image Steganography: A Survey
    Qin, Jiaohua
    Luo, Yuanjing
    Xiang, Xuyu
    Tan, Yun
    Huang, Huajun
    IEEE ACCESS, 2019, 7 : 171372 - 171394
  • [6] Coverless image steganography based on DenseNet feature mapping
    Qiang Liu
    Xuyu Xiang
    Jiaohua Qin
    Yun Tan
    Yao Qiu
    EURASIP Journal on Image and Video Processing, 2020
  • [7] Coverless Image Steganography Based on Generative Adversarial Network
    Qin, Jiaohua
    Wang, Jing
    Tan, Yun
    Huang, Huajun
    Xiang, Xuyu
    He, Zhibin
    MATHEMATICS, 2020, 8 (09)
  • [8] A Novel Coverless Steganography Method Based on Image Hashing
    Huang C.
    Qian Z.-X.
    Zhang X.-P.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2020, 40 (12): : 1302 - 1306and1313
  • [9] Coverless image steganography based on DenseNet feature mapping
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Qiu, Yao
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [10] Delving into the Methods of Coverless Image Steganography
    Ng, Koi Yee
    Ong, Simying
    Wong, KokSheik
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1763 - 1772