Coverless Image Steganography Based on SIFT and BOF

被引:108
|
作者
Yuan, Chengsheng [1 ,2 ]
Xia, Zhihua [1 ,2 ]
Sun, Xingming [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2017年 / 18卷 / 02期
关键词
Coverless image steganography; Protocol of feature; Scale invarient feature transform; Hash sequence; Bag of feature; STEGANALYSIS; ALGORITHM;
D O I
10.6138/JIT.2017.18.2.20160624c
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniques provide us with some more secure communication, the modification traces will be detected through using these brand-new steganalysis tools. Thereby, in order to eliminate the influence of modification traces, we propose a novel coverless image steganography scheme based on scale invarient feature transform and bag of feature. Different from conventional steganography, images have already contained the concealing information, so we can transmit natural images, whose features are the same with the secret information, to receivers. Firstly, the robust feature hash sequences are constructed with our protocol of feature. Then, the secret message is converted into bitstreams. Finally, these images with the seceret information are chosen and sent to receivers through using inverted index. Throughout the process, original images are never modified in our scheme, so our method can resist the analysis of existing steganalysis tools. Numerical experiments also indicate that our scheme has a desirable robustness to the common image attacks.
引用
收藏
页码:435 / 442
页数:8
相关论文
共 50 条
  • [21] Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning
    Saad, Al Hussien S.
    Mohamed, M. S.
    Hafez, Eslam H.
    IEEE ACCESS, 2021, 9 : 16522 - 16531
  • [22] A Robust Coverless Steganography Scheme Using Camouflage Image
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Zhang, Qin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (06) : 4038 - 4051
  • [23] A Robust joint coverless image steganography scheme based on two independent modules
    Ren, Chang
    Wu, Bin
    CYBERSECURITY, 2024, 7 (01):
  • [24] A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
    Seddik, Al-Hussien
    Salah, Mohammed
    Behery, Gamal
    El-harby, Ahmed
    Ebada, Ahmed Ismail
    Teng, Sokea
    Nam, Yunyoung
    Abouhawwash, Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 5087 - 5103
  • [25] Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Tan, Junshan
    Luo, Yuanjing
    KNOWLEDGE-BASED SYSTEMS, 2020, 192
  • [26] A robust coverless image-synthesized video steganography based on asymmetric structure
    Jiao, Yueshuang
    Zhang, Zhenzhen
    Li, Zhenzhen
    Li, Zichen
    Li, Xiaolong
    Liu, Jiaoyun
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 104
  • [27] Coverless image steganography using partial-duplicate image retrieval
    Zhou, Zhili
    Mu, Yan
    Wu, Q. M. Jonathan
    SOFT COMPUTING, 2019, 23 (13) : 4927 - 4938
  • [28] Coverless image steganography using partial-duplicate image retrieval
    Zhili Zhou
    Yan Mu
    Q. M. Jonathan Wu
    Soft Computing, 2019, 23 : 4927 - 4938
  • [29] Coverless Steganography Based on Motion Analysis of Video
    Tan, Yun
    Qin, Jiaohua
    Xiang, Xuyu
    Zhang, Chunhu
    Wang, Zhangdong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [30] A review of coverless steganography
    Meng, Laijin
    Jiang, Xinghao
    Sun, Tanfeng
    NEUROCOMPUTING, 2024, 566