Coverless Image Steganography Based on SIFT and BOF

被引:108
|
作者
Yuan, Chengsheng [1 ,2 ]
Xia, Zhihua [1 ,2 ]
Sun, Xingming [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 02期
关键词
Coverless image steganography; Protocol of feature; Scale invarient feature transform; Hash sequence; Bag of feature; STEGANALYSIS; ALGORITHM;
D O I
10.6138/JIT.2017.18.2.20160624c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniques provide us with some more secure communication, the modification traces will be detected through using these brand-new steganalysis tools. Thereby, in order to eliminate the influence of modification traces, we propose a novel coverless image steganography scheme based on scale invarient feature transform and bag of feature. Different from conventional steganography, images have already contained the concealing information, so we can transmit natural images, whose features are the same with the secret information, to receivers. Firstly, the robust feature hash sequences are constructed with our protocol of feature. Then, the secret message is converted into bitstreams. Finally, these images with the seceret information are chosen and sent to receivers through using inverted index. Throughout the process, original images are never modified in our scheme, so our method can resist the analysis of existing steganalysis tools. Numerical experiments also indicate that our scheme has a desirable robustness to the common image attacks.
引用
收藏
页码:435 / 442
页数:8
相关论文
共 50 条
  • [1] Coverless image steganography based on image segmentation
    Luo Y.
    Qin J.
    Xiang X.
    Tan Y.
    He Z.
    Xiong N.N.
    Qin, Jiaohua (qinjiaohua@163.com), 1600, Tech Science Press (64): : 1281 - 1295
  • [2] Coverless Image Steganography Based on Image Segmentation
    Luo, Yuanjing
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    He, Zhibin
    Xiong, Neal N.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1281 - 1295
  • [3] Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction
    Zou, Liming
    Li, Jing
    Wan, Wenbo
    Wu, Q. M. Jonathan
    Sun, Jiande
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 5552 - 5564
  • [4] Coverless Image Steganography: A Survey
    Qin, Jiaohua
    Luo, Yuanjing
    Xiang, Xuyu
    Tan, Yun
    Huang, Huajun
    IEEE ACCESS, 2019, 7 : 171372 - 171394
  • [5] Coverless Image Steganography Based on Jigsaw Puzzle Image Generation
    Saad, Al Hussien Seddik
    Mohamed, M. S.
    Hafez, E. H.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (02): : 2077 - 2091
  • [6] Coverless image steganography based on DenseNet feature mapping
    Qiang Liu
    Xuyu Xiang
    Jiaohua Qin
    Yun Tan
    Yao Qiu
    EURASIP Journal on Image and Video Processing, 2020
  • [7] Coverless Image Steganography Based on Generative Adversarial Network
    Qin, Jiaohua
    Wang, Jing
    Tan, Yun
    Huang, Huajun
    Xiang, Xuyu
    He, Zhibin
    MATHEMATICS, 2020, 8 (09)
  • [8] A Novel Coverless Steganography Method Based on Image Hashing
    Huang C.
    Qian Z.-X.
    Zhang X.-P.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2020, 40 (12): : 1302 - 1306and1313
  • [9] Coverless image steganography based on DenseNet feature mapping
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Qiu, Yao
    EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING, 2020, 2020 (01)
  • [10] Delving into the Methods of Coverless Image Steganography
    Ng, Koi Yee
    Ong, Simying
    Wong, KokSheik
    2019 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2019, : 1763 - 1772