Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

被引:5
|
作者
Saad, Al Hussien Seddik [1 ]
Mohamed, M. S. [2 ,3 ]
Hafez, E. H. [4 ]
机构
[1] Minia Univ, Fac Sci, Dept Comp Sci, Al Minya 61519, Egypt
[2] Taif Univ, Coll Sci, Dept Math, At Taif 21944, Saudi Arabia
[3] Al Azher Univ, Fac Sci, Dept Math, Nasr City 11884, Egypt
[4] Helwan Univ, Fac Sci, Dept Math, Cairo, Egypt
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2021年 / 67卷 / 02期
关键词
Coverless information hiding; Jigsaw puzzle image; image steganography; data hiding; SELECTION;
D O I
10.32604/cmc.2021.015329
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels, creating the stego image. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. A coverless data hiding concept is proposed to solve this issue. Coverless does not mean that cover is not required, or the payload can be transmitted without a cover. Instead, the payload is embedded by cover generation or a secret message mapping between the cover file and the payload. In this paper, a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message. Firstly, the image is divided into equal rows then further divided into equal columns, creating blocks (i.e., sub-images). Then, according to secret message bits and a proposed mapping function, each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image. After that, the generated jigsaw puzzle image is sent to the receiver. Experimental results and analysis show a good performance in the hiding capacity, security, and robustness compared with existing coverless image steganography methods.
引用
收藏
页码:2077 / 2091
页数:15
相关论文
共 50 条
  • [41] Joint Coverless Steganography and Image Transformation for Covert Communication of Secret Messages
    Wen, Wenying
    Huang, Haigang
    Qi, Shuren
    Zhang, Yushu
    Fang, Yuming
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (03): : 2951 - 2962
  • [42] Image steganography with N-puzzle encryption
    Srilekha Mukherjee
    Goutam Sanyal
    Multimedia Tools and Applications, 2020, 79 : 29951 - 29975
  • [43] Jigsaw-puzzle vector quantization for image compression
    Yeh, CH
    OPTICAL ENGINEERING, 2004, 43 (02) : 363 - 370
  • [44] A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography
    Liu, Jiajun
    Tan, Lina
    Zhou, Zhili
    Jiang, Weijin
    Li, Yi
    Chen, Peng
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (02): : 3221 - 3240
  • [45] Moiré pattern generation-based image steganography
    Qin, Tiewei
    Feng, Bingwen
    Chen, Bing
    Peng, Zecheng
    Xia, Zhihua
    Lu, Wei
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 82
  • [46] IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography
    Zhang, Chunying
    Gao, Xinkai
    Liu, Xiaoxiao
    Hou, Wei
    Yang, Guanghui
    Xue, Tao
    Wang, Liya
    Liu, Lu
    ELECTRONICS, 2023, 12 (13)
  • [47] RELABEL, SCRAMBLE, SYNTHESIZE:A NOVEL COVERLESS STEGANOGRAPHY APPROACH VIA COLLAGE IMAGE
    Ng, Koi Yee
    Ong, Simying
    Loh, Yuen Peng
    Chan, Chee Seng
    2021 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2021, : 1877 - 1882
  • [48] CSST-Net: an arbitrary image style transfer network of coverless steganography
    Shanqing Zhang
    Shengqi Su
    Li Li
    Jianfeng Lu
    Qili Zhou
    Chin-Chen Chang
    The Visual Computer, 2022, 38 : 2125 - 2137
  • [49] CSST-Net: an arbitrary image style transfer network of coverless steganography
    Zhang, Shanqing
    Su, Shengqi
    Li, Li
    Lu, Jianfeng
    Zhou, Qili
    Chang, Chin-Chen
    VISUAL COMPUTER, 2022, 38 (06): : 2125 - 2137
  • [50] Jigsaw Puzzle Image Retrieval via Pairwise Compatibility Measurement
    Jin, Sou-Young
    Lee, Suwon
    Azis, Nur Aziza
    Choi, Ho-Jin
    2014 INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP), 2014, : 123 - 127