Coverless Steganography for Digital Images Based on a Generative Model

被引:34
作者
Duan, Xintao [1 ]
Song, Haoxian [1 ]
Qin, Chuan [2 ]
Khan, Muhammad Khurram [3 ]
机构
[1] Henan Normal Univ, Xinxiang 453007, Henan, Peoples R China
[2] Univ Shanghai Sci & Technol, Shanghai 200093, Peoples R China
[3] King Saud Univ, CoEIA, Riyadh, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2018年 / 55卷 / 03期
基金
中国国家自然科学基金;
关键词
Generative model; coverless image steganography; steganalysis; steganographic capacity; security; WATERMARKING; LSB;
D O I
10.3970/cmc.2018.01798
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the secret image. The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image. Thus, we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the transmission of the secret image. This is the first time to propose the coverless image information steganographic scheme based on generative model, compared with the traditional image steganography. The transmitted image is not embedded with any information of the secret image in this method, therefore, can effectively resist steganalysis tools. Experimental results show that our scheme has high capacity, security and reliability.
引用
收藏
页码:483 / 493
页数:11
相关论文
共 31 条
[1]  
[Anonymous], 2013, PMLR
[2]  
[Anonymous], 2013, P 27 ANN C NEUR INF, DOI DOI 10.48550/ARXIV.1305.6663
[3]  
[Anonymous], 1986, Information processing in dynamical systems: Foundations of harmony theory
[4]  
Arjovsky M., 2017, PRINCIPLED METHODS T
[5]  
Arjovsky M, 2017, PR MACH LEARN RES, V70
[6]  
Bengio Y, 2014, PR MACH LEARN RES, V32, P226
[7]   Coverless Information Hiding Method Based on the Chinese Character Encoding [J].
Chen, Xianyi ;
Chen, Sheng ;
Wu, Yulei .
JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (02) :313-320
[8]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[9]  
Glorot X., 2011, 14 INT C ART INT STA, P315
[10]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144