Abstract
To address the challenge that the current coverless image steganography (CIS) method requires more cover images and more information, a coverless image steganography method based on feature matrix map** is proposed. In this paper, the low-frequency component of the Discrete Wavelet Transform (DWT) is used as the image eigenvalue, and a robust feature sequence is obtained by comparing the size of the main and minor diagonal blocks with the eigenvalues of other blocks. This paper proposes a feature matrix map** rule to obtain the map** matrix of the cover image and the secret information through the feature matrix map**. The transmission of secret information is achieved through the cover image and the map** matrix, which solves the problem of large transmission overhead and the need for more cover images and additional information. Experimental results show that this scheme has certain advantages in terms of the number of mapped images and additional information required, and has better security against most image attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kadhim, I.J., Premaratne, P., Vial, P.J.: Adaptive image steganography based on edge detection over dual-tree complex wavelet transform. In: Huang, D.-S., Gromiha, M.M., Han, K., Hussain, A. (eds.) ICIC 2018. LNCS (LNAI), vol. 10956, pp. 544–550. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-95957-3_57
Joseph, P., Vishnukumar, S.: A study on steganographic techniques. In: Global Conference on Communication Technologies, GCCT 2015, pp. 206–210. IEEE (2015)
Khare, P., Singh, J., Tiwari, M.: Digital image steganography. J. EngRes. Stud. 2, 101–104 (2011)
Huang, F., Huang, J., Shi, Y.Q.: New channel selection rule for JPEG steganography. IEEE Trans. Inf. Forensics Security. 7, 1181–1191 (2012)
Zhiwei, K., **g, L., Yigang, H.: Steganography based on wavelet transform and modulus function. J. Syst Eng. Electrons. 18, 628–632 (2007)
McKeon, R.T.: Strange Fourier steganography in movies. In: Proceedings of the ICEIT, DeKalb, Illinois, USA, IEEE, pp. 178–182 (2007)
Chen, X., Sun, H., Tobe, Y., Zhou, Z., Sun, X.: Coverless information hiding method based on the Chinese mathematical expression. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 133–143. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_12
Otori, H., Kuriyama, S.: Data-embeddable texture synthesis. In: Proceedings of the International Symposium on Smart Graphics, Kyoto, Japan, pp. 146–157 (2007)
Xu, J., Mao, X., **, X., et al.: Hidden message in a deformation-based texture. Vis. Comput. 31, 1653–1669 (2015)
Qin, J., Wang, J., Tan, Y., Huang, H., **ang, X., He, Z.: Coverless image steganography based on generative adversarial network. Mathematics 8, 1394 (2020)
Patwari, B., Nandi, U., Ghosal, S.K.: Image steganography based on difference of Gaussians edge detection. Multimed. Tools Appl. 1–21 (2023)
Zhou, Z., Sun, H., Harit, R., Chen, X., Sun, X.: Coverless image steganography without embedding. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds.) ICCCS 2015. LNCS, vol. 9483, pp. 123–132. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27051-7_11
Zhang, X., Peng, F., Long, M.: Robust coverless image steganography based on DCT and LDA topic classification. IEEE Trans. Multimedia 20, 3223–3238 (2018)
Kadhim, I.J., Premaratne, P., Vial, P.J.: High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform - ScienceDirect. Cogn. Syst. Res. 60, 20–32 (2020)
Liu, Q., et al.: Coverless steganography based on image retrieval of DenseNet features and DWT sequence map**. Knowl.-Based Syst. 192, 105375 (2019)
Yang, L., Deng, H., Dang, X.: A novel coverless information hiding method based on the most ppSignificant bit of the cover image. IEEE Access. 8, 108579–108591 (2020)
Liu, X., Li, Z., Ma, J., Zhang, W., Zhang, J., Ding, Y.: Robust coverless steganography using limited map** images. J. King Saud Univ. - Comput. Inf. Sci. 34, 4472–4482 (2022)
Jegou, H., Douze, M., Schmid, C.: Hamming embedding and weak geometric consistency for large scale image search. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008. LNCS, vol. 5302, pp. 304–317. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88682-2_24
Yuan, C., **a, Z., Sun, X.: Coverless image steganography based on SIFT and BOF. J. Internet Technol. 18, 435–442 (2017)
Zhou, Z., Cao, Y., Wang, M., et al.: Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access 7, 179891–179897 (2019)
Zou, L., Sun, J., Gao, M., et al.: A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed. Tools Appl. 78, 7965–7980 (2019)
Chen, X., Zhang, Z., Qiu, A., **a, Z., **ong, N.N.: A novel coverless steganography method based on image selection and StarGAN. IEEE Trans. Netw. Sci. Eng. 9, 219–230 (2022)
Kulkarni, T., Debnath, S., Kumar, J., et al.: DCT based robust coverless information hiding scheme with high capacity. In: 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, pp. 358--364 (2023)
Luo, Y., Qin, J., **ang, X., Tan, Y.: Coverless image steganography based on multi-object recognition. IEEE Trans. Circ. Syst. Video Technol. 31, 2779–2791 (2021)
Li, Q.i., Wang, X., Wang, X., Ma, B., Wang, C., Shi, Y.: An encrypted coverless information hiding method based on generative models. Inf. Sci. 553, 19--30 (2021)
**e, G., Ren, J., Marshall, S., et al.: A novel gradient-guided post-processing method for adaptive image steganography. Sig. Process. 203, 108813 (2023)
Dong, T., et al.: Robust coverless information hiding based on image classification (in Chinese). J. Appl. Sci.39, 893–905 (2021)
Zhou, Z., et al.: Generative steganography method based on auto-generation of contours (in Chinese). J. Commun.42, 144–154 (2021)
Zhang, Z., Ni, J., Yao, Y., Gong, L., Wang, Y., Wu, G.: Text coverless information hiding method based on synonyms expansion and label delivery mechanism (in Chinese). J. Commun. 42, 173–183 (2021)
Wang, Y., Wu, B.: An intelligent search method of map** relation for coverless information hiding (in Chinese). J. Cyber Secur.5, 48–61 (2020)
Acknowledgments
This work is supported by the Key technologies and systems for password on-demand services in the cloud environment (2017YFB0801803); "High-precision" Discipline Construction Project in Bei**g Universities (20210093Z0401); Fundamental Research Funds for the Central Universities (Grant Number: 328202244).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, L., Yang, C., Chen, J. (2023). A Coverless Image Steganography Method Based on Feature Matrix Map**. In: Yongtian, W., Lifang, W. (eds) Image and Graphics Technologies and Applications. IGTA 2023. Communications in Computer and Information Science, vol 1910. Springer, Singapore. https://doi.org/10.1007/978-981-99-7549-5_34
Download citation
DOI: https://doi.org/10.1007/978-981-99-7549-5_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7548-8
Online ISBN: 978-981-99-7549-5
eBook Packages: Computer ScienceComputer Science (R0)