Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping

被引:107
作者
Liu, Qiang [1 ]
Xiang, Xuyu [1 ]
Qin, Jiaohua [1 ]
Tan, Yun [1 ]
Tan, Junshan [1 ]
Luo, Yuanjing [1 ]
机构
[1] Cent South Univ Forestry & Technol, Coll Comp Sci & Informat Technol, Changsha 410004, Peoples R China
基金
中国国家自然科学基金;
关键词
Coverless image steganography; Deep learning; DenseNet convolutional neural network; Image retrieval; Discrete wavelet transform; OPTIMIZATION; WATERMARKING; SIFT;
D O I
10.1016/j.knosys.2019.105375
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, researches have shown that coverless image steganography can resist the existing steganalysis tools effectively. On this basis, a novel coverless image steganography algorithm based on image retrieval of DenseNet features and DWT sequence mapping is proposed in this paper. Firstly, DenseNet convolutional neural network model in deep learning is used to extract the features of image datasets. Supervised learning is adopted to retrieve the image, and the retrieval results can be used as the information carrier. Secondly, the selected images are divided into 4 X 4 sub-blocks for block discrete wavelet transform. Then the DWT coefficient are calculated based on the low-frequency components after block transformation, and the coefficients between blocks are scanned according to the Zigzag scan, such that the robust feature sequences are generated. Finally, the secret information is divided into segments with the same length as the feature sequence, and an inverted index is established with feature sequence, the position of blocks, DWT coefficient and image path. The image with the same feature sequence as the secret information segment is selected through index as the carriers. The experimental results and analysis show that this method has better robust and security performance resisting most image attacks compared with the state-of-the-art methods. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:15
相关论文
共 44 条
[1]  
[Anonymous], 2018, SOFT COMPUT
[2]  
[Anonymous], 2015, 3 INT C LEARN REPR
[3]  
[Anonymous], DIGIT IMAG COMPUT TE
[4]  
[Anonymous], MULTIMEDIA TOOLS APP
[5]  
[Anonymous], INT C INF COMM TECHN
[6]  
[Anonymous], INT C CLOUD COMP SEC
[7]   Coverless Information Hiding Method Based on the Chinese Character Encoding [J].
Chen, Xianyi ;
Chen, Sheng ;
Wu, Yulei .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :313-320
[8]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[9]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[10]  
Donahue J, 2014, PR MACH LEARN RES, V32