coverless information hiding
Recently Published Documents


TOTAL DOCUMENTS

32
(FIVE YEARS 9)

H-INDEX

6
(FIVE YEARS 0)



2021 ◽  
Vol 13 (4) ◽  
pp. 57-70
Author(s):  
Xintao Duan ◽  
Baoxia Li ◽  
Daidou Guo ◽  
Kai Jia ◽  
En Zhang ◽  
...  

Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model. The sender trains the WGAN-GP with a natural image and a secret image. The generated image and secret image are visually identical, and the parameters of generator are saved to form the codebook. The sender uploads the natural image (disguise image) to the cloud disk. The receiver downloads the camouflage image from the cloud disk and obtains the corresponding generator parameter in the codebook and inputs it to the generator. The generator outputs the same image for the secret image, which realized the same results as sending the secret image. The experimental results indicate that the scheme produces high image quality and good security.



2021 ◽  
Vol 13 (4) ◽  
pp. 40-56
Author(s):  
Jiaohua Qin ◽  
Zhuo Zhou ◽  
Yun Tan ◽  
Xuyu Xiang ◽  
Zhibin He

Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent Dirichlet allocation) topic distribution and keyword TF-IDF (term frequency-inverse document frequency). Firstly, the sender and receiver build codebook, including word segmentation, word frequency and TF-IDF features, LDA topic model clustering. The sender then shreds the secret information, converts it into keyword ID through the keywords-index table, and searches the text containing the secret information keywords. Secondly, the searched text is taken as the index tag according to the topic distribution and TF-IDF features. At the same time, random numbers are introduced to control the keyword order of secret information.



2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Yun Tan ◽  
Jiaohua Qin ◽  
Xuyu Xiang ◽  
Chunhu Zhang ◽  
Zhangdong Wang

With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed. For every video in the database, the robust histograms of oriented optical flow (RHOOF) are obtained, and the index database is constructed. The hidden information bits are mapped to the hash sequences of RHOOF, and the corresponding indexes are sent by the sender. At the receiver, through calculating hash sequences of RHOOF from the cover video, the secret information can be extracted successfully. During the whole process, the cover video remains original without any modification and has a strong ability to resist steganalysis. The capacity is investigated and shows good improvement. The robustness performance is prominent against most attacks such as pepper and salt noise, speckle noise, MPEG-4 compression, and motion JPEG 2000 compression. Compared with the existing coverless information hiding schemes based on images, the proposed method not only obtains a good trade-off between hiding information capacity and robustness but also can achieve higher hiding success rate and lower transmission data load, which shows good practicability and feasibility.



2021 ◽  
Vol 553 ◽  
pp. 19-30
Author(s):  
Qi Li ◽  
Xingyuan Wang ◽  
Xiaoyu Wang ◽  
Bin Ma ◽  
Chunpeng Wang ◽  
...  


2021 ◽  
Vol 29 (3) ◽  
pp. 899-914
Author(s):  
Lin Xiang ◽  
Jiaohua Qin ◽  
Xuyu Xiang ◽  
Yun Tan ◽  
Neal N. Xiong


Author(s):  
Zhili Zhou ◽  
Yuecheng Su ◽  
Yulan Zhang ◽  
Zhihua Xia ◽  
Shan Du ◽  
...  


2020 ◽  
Vol 2020 (1) ◽  
Author(s):  
Qiang Liu ◽  
Xuyu Xiang ◽  
Jiaohua Qin ◽  
Yun Tan ◽  
Yao Qiu

Abstract Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-geometric attacks. However, they do not perform well under some geometric attacks. Towards this goal, a CIS algorithm based on DenseNet feature mapping is proposed. Deep learning is introduced to extract high-dimensional CNN features which are mapped into hash sequences. For the sender, a binary tree hash index is built to accelerate index speed of searching hidden information and DenseNet hash sequence, and then, all matched images are sent. For the receiver, the secret information can be recovered successfully by calculating the DenseNet hash sequence of the cover image. During the whole steganography process, the cover images remain unchanged. Experimental results and analysis show that the proposed scheme has better robust compared with the state-of-the-art methods under geometric attacks.



Sign in / Sign up

Export Citation Format

Share Document