Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

被引:159
作者
Zhang, Xiang [1 ]
Peng, Fei [1 ]
Long, Min [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ, Changsha Univ Sci & Technol, Coll Comp & Commun Engn, Changsha 410114, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Coverless image steganography; bag-of-features; latent dirichlet allocation; discrete cosine transform; WATERMARKING; SCHEME; MODULATION; TRANSFORM; SIFT;
D O I
10.1109/TMM.2018.2838334
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to improve the robustness and capability of resisting image steganalysis, a novel coverless image steganography algorithm based on discrete cosine transform and latent dirichlet allocation (LDA) topic classification is proposed. First, latent dirichlet allocation topic model is utilized for classifying the image database. Second, the images belonging to one topic are selected, and 8 x 8 block discrete cosine transform is performed to these images. Then robust feature sequence is generated through the relation between direct current coefficients in the adjacent blocks. Finally, an inverted index which contains the feature sequence, dc, location coordinates, and image path is created. For the purpose of achieving image steganography, the secret information is converted into a binary sequence and partitioned into segments, and the image whose feature sequence equals to the secret information segments is chosen as the cover image according to the index. After that, all cover images are sent to the receiver. In the whole process, no modification is done to the original images. Experimental results and analysis show that the proposed algorithm can resist the detection of existing steganalysis algorithms, and has better robustness against common image processing and better ability to resist steganalysis compared with the existing coverless image steganography algorithms. Meanwhile, it is resistant to geometric attacks to some extent. It has great potential application in secure communication of big data environment.
引用
收藏
页码:3223 / 3238
页数:16
相关论文
共 51 条
[1]   Digital Image Watermarking via Adaptive Logo Texturization [J].
Andalibi, Mehran ;
Chandler, Damon M. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (12) :5060-5073
[2]  
[Anonymous], 2012, IEEE T INF FORENSICS
[3]   SURF: Speeded up robust features [J].
Bay, Herbert ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION - ECCV 2006 , PT 1, PROCEEDINGS, 2006, 3951 :404-417
[4]   Robust and Transparent Color Modulation for Text Data Hiding [J].
Borges, Paulo Vinicius Koerich ;
Mayer, Joceli ;
Izquierdo, Ebroul .
IEEE TRANSACTIONS ON MULTIMEDIA, 2008, 10 (08) :1479-1489
[5]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[6]   Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation [J].
Chen, Wen-Yuan .
APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (01) :432-448
[7]   Coverless Information Hiding Method Based on the Chinese Character Encoding [J].
Chen, Xianyi ;
Chen, Sheng ;
Wu, Yulei .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :313-320
[8]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[9]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[10]   Audio Watermarking Using Spikegram and a Two-Dictionary Approach [J].
Erfani, Yousof ;
Pichevar, Ramin ;
Rouat, Jean .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) :840-852