Abstract
Coverless information hiding realizes the hiding of secret messages without modifying the carrier, so being able to resist steganalysis algorithms. Many existing hiding methods, however, still face the dilemma of low hiding capacity (i.e., the volume of hidden messages by a single carrier is bounded), which places some restrictions on the application of the methods. To alleviate this problem, in this paper, we explore an effective coverless information hiding method that can deliver more messages through a cover image. A key step of our method is to construct a visual dictionary based on the bag-of-words model. Utilizing the visual dictionary, one participant can generate a binary coding matrix corresponding to the cover image, and then convert the secret messages, based on the matrix, into a coordinate sequence. To enhance the security, the coordinate sequence is encrypted and the ciphertext is transmitted to another participant together with the cover image. Some experiments are implemented to verify the effectiveness of our method, the results and analysis show that our method performs well in terms of undetectability, hiding capacity, and robustness. Compared with other coverless information hiding methods, our method does not need to construct and maintain a large-scale image library and can deliver more messages by only one single image. These characteristics demonstrate that our method has certain application value, and it also broadens the research ideas of coverless information hiding methods.
Similar content being viewed by others
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Code Availability
The code used to support the findings of this study is available from the corresponding author upon request.
Notes
The Caltech101 dataset is available at http://www.vision.caltech.edu/Image_Datasets/Caltech101/.
The holiday dataset is available at http://lear.inrialpes.fr/~jegou/data.php#holidays.
References
Abdulsattar FS (2021) Towards a high capacity coverless information hiding approach. Multimed Tools Applic 80(12):18821–18837
Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: Proceedings of the international conference on machine learning. PMLR, pp 214–223
Cao Y, Zhou Z, Wu QM, Yuan C, Sun X (2020) Coverless information hiding based on the generation of anime characters. EURASIP J Image Vid Process 2020(1):1–15
Chen X, Sun H, Tobe Y, Zhou Z, Sun X (2015) Coverless information hiding method based on the chinese mathematical expression. In: Proceedings of the international conference on cloud computing and security. Springer, pp 133–143
Dong T, Li X, Yao H, Qin C (2021) Robust coverless information hiding based on image classification. J Appl Sci 39(6):893–905
Duan X, Song H (2018) Coverless information hiding based on generative model. arXiv:1802.03528
Duan X, Li B, Guo D, Zhang Z, Ma Y (2020) A coverless steganography method based on generative adversarial network. EURASIP J Image Vid Process 2020(1):1–10
Fei-Fei L, Fergus R, Perona P (2004) Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories. In: Proceedings of the 2004 conference on computer vision and pattern recognition workshop. IEEE, pp 178–178
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. Advances in Neural Information Processing Systems, 27
Hartigan J A, Wong M A (1979) Algorithm as 136: a k-means clustering algorithm. J R Stat Soc Series C (Appl Stat) 28(1):100–108
Jegou H, Douze M, Schmid C (2008) Hamming embedding and weak geometric consistency for large scale image search. In: Proceedings of the European conference on computer vision. Springer, pp 304–317
Kadhim I J, Premaratne P, Vial P J, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299–326
Li Q, Wang X, Wang X, Shi Y (2021) Cccih: content-consistency coverless information hiding method based on generative models. Neural Process Lett 53(6):4037–4046
Liu Q, Xiang X, Qin J, Tan Y, Qiu Y (2020) Coverless image steganography based on densenet feature mapping. EURASIP J Image Vid Process 2020(1):1–18
Lowe D G (2004) Distinctive image features from scale-invariant keypoints. Int J Comput Vis 60(2):91–110
Luo Y, Qin J, Xiang X, Tan Y, Liu Q, Xiang L (2020) Coverless real-time image information hiding based on image block matching and dense convolutional network. J Real-Time Image Proc 17(1):125–135
Muhuri P K, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257
Sahu A K, Swain G (2019) A novel n-rightmost bit replacement image steganography technique. 3D Res 10(1):1–18
Sahu A K, Swain G (2020) Reversible image steganography using dual-layer lsb matching. Sens Imag 21(1):1–21
Yang J, Jiang Y-G, Hauptmann A G, Ngo C-W (2007) Evaluating bag-of-visual-words representations in scene classification. In: Proceedings of the international workshop on workshop on multimedia information retrieval, pp 197–206
Yang L, Deng H, Dang X (2020) A novel coverless information hiding method based on the most significant bit of the cover image. IEEE Access 8:108579–108591
Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on sift and bof. J Internet Technol 18(2):435–442
Zhang X, Peng F, Lin Z, Long M (2020) A coverless image information hiding algorithm based on fractal theory. Int J Bifur Chaos 30(04):2050062
Zheng W, Wang K, Wang F-Y (2020) Gan-based key secret-sharing scheme in blockchain. IEEE Trans Cybern 51(1):393–404
Zhou Z, Sun H, Harit R, Chen X, Sun X (2015) Coverless image steganography without embedding. In: Proceedings of the international conference on cloud computing and security. Springer, pp 123–132
Zou L, Sun J, Gao M, Wan W, Gupta B B (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Applic 78(7):7965–7980
Funding
This article is funded by the National Natural Science Foundation of China (62262062).
Author information
Authors and Affiliations
Contributions
1. Conceptualization and methodology: Hailun Liu, Chunyu Zhang, Zhaojie Wang.
2. Validation: Hailun Liu, Chunyu Zhang, Zhaojie Wang.
3. Capacity and undetectability analysis: Peidong Gou, Liying Shan, Zewei Lu.
4. Robustness analysis: Hailun Liu, Chunyu Zhang, Chenfei Guo.
5. Writing-original draft preparation: Hailun Liu, Zhaojie Wang.
6. Writing-review and editing: Hailun Liu, Chunyu Zhang, Zhaojie Wang.
Corresponding author
Ethics declarations
Ethics approval
Approval
Consent for publication
All authors consent for publication.
Consent to participate
All authors consent to participate.
Conflict of Interests
The authors declare no conflict of interest/competing interests.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, H., Zhang, C., Wang, Z. et al. To deliver more information in coverless information hiding. Multimed Tools Appl 83, 7215–7229 (2024). https://doi.org/10.1007/s11042-023-15263-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15263-7