Dynamic Content Selection Framework Applied to Coverless Information Hiding

被引:21
作者
Cao, Yi [1 ,2 ]
Zhou, Zhili [1 ,2 ,3 ]
Yang, Ching-Nung [4 ]
Sun, Xingming [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON, Canada
[4] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Shoufeng Township, Hualien County, Taiwan
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 04期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Dynamic content selection framework; Coverless information hiding; Bag of Words (BOW); Visual words; Approximate replacement; EFFICIENT; IMAGES;
D O I
10.3966/160792642018081904020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional information hiding (IH) methods usually modify the carrier in accordance with certain rules to embed secret information. In this way, it is inevitable to leave some modification traces on the carrier, so that these methods are difficult to effectively resist the detection of various types of steganalysis algorithms. In order to fundamentally resist steganalysis, recently, a novel information hiding technique, called coverless information hiding (CIH), has been proposed to hide secret information into natural carrier without modification. In this paper, we propose a dynamic content selection framework (DCSF) for CIH to hide secret text information into natural images. To realize the CIH, the proposed framework dynamically selects images to represent the secret information via the mapping relationships constructed between the inherent features of the images and the secret information. More specifically, after constructing the mapping relationships by using a function of the values of local features, we choose multiple blocks from a natural image to represent the corresponding secret fragments. Moreover, to improve the security, we use a random label sequence to decide which blocks of the image will be chosen for the representation. In addition, since the required images may not be found in the image database, the approximate matching algorithm based on synonym and homonym is also proposed to find the images to approximately represent the secret information. Experimental results and analysis show that the proposed framework has good performance in anti-steganalysis and capacity.
引用
收藏
页码:1179 / 1186
页数:8
相关论文
共 27 条
[21]   Coverless Image Steganography Based on SIFT and BOF [J].
Yuan, Chengsheng ;
Xia, Zhihua ;
Sun, Xingming .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :435-442
[22]   Coverless Text Information Hiding Method Based on the Rank Map [J].
Zhang, Jianjun ;
Wang, Lucai ;
Lin, Haijun .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :427-434
[23]   Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm [J].
Zhou, Zhili ;
Wu, Q. M. Jonathan ;
Yang, Ching-Nung ;
Sun, Xingming ;
Pan, Zhaoqing .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05) :1177-1184
[24]   Fast and accurate near-duplicate image elimination for visual sensor networks [J].
Zhou, Zhili ;
Wu, Q. M. Jonathan ;
Huang, Fang ;
Sun, Xingming .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (02)
[25]   Coverless Multi-keywords Information Hiding Method Based on Text [J].
Zhou, Zhili ;
Mu, Yan ;
Yang, Ching-Nung ;
Zhao, Ningsheng .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09) :309-320
[26]   Effective and Efficient Global Context Verification for Image Copy Detection [J].
Zhou, Zhili ;
Wang, Yunlong ;
Wu, Q. M. Jonathan ;
Yang, Ching-Nung ;
Sun, Xingming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (01) :48-63
[27]   Effective and Efficient Image Copy Detection with Resistance to Arbitrary Rotation [J].
Zhou, Zhili ;
Yang, Ching-Nung ;
Chen, Beijing ;
Sun, Xingming ;
Liu, Qi ;
Wu, Q. M. Jonathan .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (06) :1531-1540