Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

被引:5
|
作者
Saad, Al Hussien Seddik [1 ]
Mohamed, M. S. [2 ,3 ]
Hafez, E. H. [4 ]
机构
[1] Minia Univ, Fac Sci, Dept Comp Sci, Al Minya 61519, Egypt
[2] Taif Univ, Coll Sci, Dept Math, At Taif 21944, Saudi Arabia
[3] Al Azher Univ, Fac Sci, Dept Math, Nasr City 11884, Egypt
[4] Helwan Univ, Fac Sci, Dept Math, Cairo, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 67卷 / 02期
关键词
Coverless information hiding; Jigsaw puzzle image; image steganography; data hiding; SELECTION;
D O I
10.32604/cmc.2021.015329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels, creating the stego image. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. A coverless data hiding concept is proposed to solve this issue. Coverless does not mean that cover is not required, or the payload can be transmitted without a cover. Instead, the payload is embedded by cover generation or a secret message mapping between the cover file and the payload. In this paper, a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message. Firstly, the image is divided into equal rows then further divided into equal columns, creating blocks (i.e., sub-images). Then, according to secret message bits and a proposed mapping function, each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image. After that, the generated jigsaw puzzle image is sent to the receiver. Experimental results and analysis show a good performance in the hiding capacity, security, and robustness compared with existing coverless image steganography methods.
引用
收藏
页码:2077 / 2091
页数:15
相关论文
共 50 条
  • [31] A Robust joint coverless image steganography scheme based on two independent modules
    Ren, Chang
    Wu, Bin
    CYBERSECURITY, 2024, 7 (01):
  • [32] Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Tan, Junshan
    Luo, Yuanjing
    KNOWLEDGE-BASED SYSTEMS, 2020, 192
  • [33] A robust coverless image-synthesized video steganography based on asymmetric structure
    Jiao, Yueshuang
    Zhang, Zhenzhen
    Li, Zhenzhen
    Li, Zichen
    Li, Xiaolong
    Liu, Jiaoyun
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 104
  • [34] Message Drives Image: A Coverless Image Steganography Framework Using Multi-Domain Image Translation
    Xue, Rui
    Wang, Yaning
    2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [35] An image processing approach for jigsaw puzzle assembly
    Ni Fei
    Fu Zhuang
    Liu Renqiang
    Cao Qixin
    Zhao Yanzheng
    ASSEMBLY AUTOMATION, 2007, 27 (01) : 25 - 30
  • [36] High capacity coverless image steganography method based on geometrically robust and chaotic encrypted image moment feature
    Liu, Xiyao
    Fang, Yaokun
    He, Feiyi
    Li, Zhaoying
    Zhang, Yayun
    Zeng, Xiongfei
    2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 1455 - 1460
  • [37] Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm
    Zhou, Zhili
    Wu, Q. M. Jonathan
    Yang, Ching-Nung
    Sun, Xingming
    Pan, Zhaoqing
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (05): : 1177 - 1184
  • [38] Coverless image steganography using morphed face recognition based on convolutional neural network
    Li, Yung-Hui
    Chang, Ching-Chun
    Su, Guo-Dong
    Yang, Kai-Lin
    Aslam, Muhammad Saqlain
    Liu, Yanjun
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [39] Coverless image steganography using morphed face recognition based on convolutional neural network
    Yung-Hui Li
    Ching-Chun Chang
    Guo-Dong Su
    Kai-Lin Yang
    Muhammad Saqlain Aslam
    Yanjun Liu
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [40] Image steganography with N-puzzle encryption
    Mukherjee, Srilekha
    Sanyal, Goutam
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (39-40) : 29951 - 29975