Skip to main content

2015 | OriginalPaper | Buchkapitel

Coverless Image Steganography Without Embedding

verfasst von : Zhili Zhou, Huiyu Sun, Rohan Harit, Xianyi Chen, Xingming Sun

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The traditional image steganography technologies designate a cover image and embed secret data into it to form the stego-image. However, the modification traces caused by the embedding will be left in the cover image, which makes successful steganalysis possible. To fundamentally address this issue, this paper proposes a novel image steganography framework, called as coverless image steganography, which does not need to employ the designated cover image for embedding the secret data. In this framework, a series of appropriate original images which already contain the secret data are directly chosen from a constructed database, and these original images can be regarded as the stego-images. Firstly, a number of images are collected to construct the database, and these images are indexed according to their hash sequence generated by a robust hashing algorithm. Then, the secret data is transformed to a bit string and divided into a number of segments. To implement the information hiding, the images of which the hash sequences are the same as the segments are chosen from the database as the stego-images. Experimental results show that the proposed coverless image steganography framework can resist the existing steganalysis tools, and have desirable robustness to the typical image attacks such as rescaling, luminance change, and noise adding.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)MATHCrossRef Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Sig. Process. 90(3), 727–752 (2010)MATHCrossRef
2.
Zurück zum Zitat Wu, H.C., Wu, N., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Proceedings-Vision Image and Signal Processing, vol. 152, pp. 611–615 (2005) Wu, H.C., Wu, N., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: Proceedings-Vision Image and Signal Processing, vol. 152, pp. 611–615 (2005)
3.
Zurück zum Zitat Mielikainen, J.: LSB matching revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)CrossRef Mielikainen, J.: LSB matching revisited. IEEE Sig. Process. Lett. 13(5), 285–287 (2006)CrossRef
4.
Zurück zum Zitat Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. 31(2), 26–34 (1998)CrossRef Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. 31(2), 26–34 (1998)CrossRef
5.
Zurück zum Zitat Li, Z., Chen, X., Pan, X., Zheng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: Proceedings of the International Conference on Computer Engineering and Technology, pp. 588–592 (2009) Li, Z., Chen, X., Pan, X., Zheng, X.: Lossless data hiding scheme based on adjacent pixel difference. In: Proceedings of the International Conference on Computer Engineering and Technology, pp. 588–592 (2009)
6.
Zurück zum Zitat Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177(15), 3099–3109 (2007)CrossRef Li, X., Wang, J.: A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177(15), 3099–3109 (2007)CrossRef
7.
Zurück zum Zitat McKeon, R.T.: Strange Fourier steganography in movies. In: Proceedings of the IEEE International Conference on Electrio/information Technology (EIT), pp. 178–182 (2007) McKeon, R.T.: Strange Fourier steganography in movies. In: Proceedings of the IEEE International Conference on Electrio/information Technology (EIT), pp. 178–182 (2007)
8.
Zurück zum Zitat Chen, W.Y.: Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Appl. Math. Comput. 185(1), 432–448 (2007)MATHMathSciNetCrossRef Chen, W.Y.: Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Appl. Math. Comput. 185(1), 432–448 (2007)MATHMathSciNetCrossRef
9.
Zurück zum Zitat Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible information hiding for VQ indices based on locally adaptive coding. J. Vis. Commun. Image Represent. 20(1), 57–64 (2009)CrossRef Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible information hiding for VQ indices based on locally adaptive coding. J. Vis. Commun. Image Represent. 20(1), 57–64 (2009)CrossRef
10.
Zurück zum Zitat Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)MathSciNetCrossRef Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)MathSciNetCrossRef
11.
Zurück zum Zitat Kawaguchi, E.: BPCS-steganography – principle and applications. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3684, pp. 289–299. Springer, Heidelberg (2005)CrossRef Kawaguchi, E.: BPCS-steganography – principle and applications. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3684, pp. 289–299. Springer, Heidelberg (2005)CrossRef
12.
Zurück zum Zitat Hioki, H.: A data embedding method using BPCS principle with new complexity measures. In: Proceedings of Pacific Rim Workshop on Digital Steganography, pp. 30–47 (2002) Hioki, H.: A data embedding method using BPCS principle with new complexity measures. In: Proceedings of Pacific Rim Workshop on Digital Steganography, pp. 30–47 (2002)
13.
Zurück zum Zitat Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)CrossRef Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 97–115. Springer, Heidelberg (2004)CrossRef
14.
Zurück zum Zitat Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Sig. Process. Lett. 12(6), 441–444 (2005)CrossRef Ker, A.: Steganalysis of LSB matching in grayscale images. IEEE Sig. Process. Lett. 12(6), 441–444 (2005)CrossRef
15.
Zurück zum Zitat Xia, Z.H., Wang, X.H., Sun, X.M., Liu, Q.S., Xiong, N.X.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. (2014). doi:10.1007/s11042-014-2381-8 Xia, Z.H., Wang, X.H., Sun, X.M., Liu, Q.S., Xiong, N.X.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. (2014). doi:10.​1007/​s11042-014-2381-8
16.
Zurück zum Zitat Xia, Z.H., Wang, X.H., Sun, X.M., Wang, B.W.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)CrossRef Xia, Z.H., Wang, X.H., Sun, X.M., Wang, B.W.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)CrossRef
17.
Zurück zum Zitat Petitcolas, F.: Watermarking schemes evaluation. IEEE Sig. Process. Mag. 17(5), 58–64 (2000)CrossRef Petitcolas, F.: Watermarking schemes evaluation. IEEE Sig. Process. Mag. 17(5), 58–64 (2000)CrossRef
Metadaten
Titel
Coverless Image Steganography Without Embedding
verfasst von
Zhili Zhou
Huiyu Sun
Rohan Harit
Xianyi Chen
Xingming Sun
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-27051-7_11