Browse > Article
http://dx.doi.org/10.3837/tiis.2021.03.014

Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance  

Liu, Qiang (College of Computer Science and Information Technology, Central South University of Forestry & Technology)
Xiang, Xuyu (College of Computer Science and Information Technology, Central South University of Forestry & Technology)
Qin, Jiaohua (College of Computer Science and Information Technology, Central South University of Forestry & Technology)
Tan, Yun (College of Computer Science and Information Technology, Central South University of Forestry & Technology)
Zhang, Qin (College of Computer Science and Information Technology, Central South University of Forestry & Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.3, 2021 , pp. 1078-1099 More about this Journal
Abstract
Traditional image steganography hides secret information by embedding, which inevitably leaves modification traces and is easy to be detected by steganography analysis tools. Since coverless steganography can effectively resist steganalysis, it has become a hotspot in information hiding research recently. Most coverless image steganography (CIS) methods are based on mapping rules, which not only exposes the vulnerability to geometric attacks, but also are less secure due to the revelation of mapping rules. To address the above issues, we introduced camouflage images for steganography instead of directly sending stego-image, which further improves the security performance and information hiding ability of steganography scheme. In particular, based on the different sub-features of stego-image and potential camouflage images, we try to find a larger similarity between them so as to achieve the reversible steganography. Specifically, based on the existing CIS mapping algorithm, we first can establish the correlation between stego-image and secret information and then transmit the camouflage images, which are obtained by reversible sub-feature retrieval algorithm. The received camouflage image can be used to reverse retrieve the stego-image in a public image database. Finally, we can use the same mapping rules to restore secret information. Extensive experimental results demonstrate the better robustness and security of the proposed approach in comparison to state-of-art CIS methods, especially in the robustness of geometric attacks.
Keywords
Coverless Image Steganography; Camouflage Image; Sub-Feature; Reversible Retrieve;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Jegou, H. Hedi, and S. Cordelia, "A contextual dissimilarity measure for accurate and efficient image search," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-7, 2007.
2 Z. Zhou, Y. Mu, and Q. Wu, "Coverless image steganography using partial-duplicate image retrieval," Soft Computing, vol. 23, pp. 4972-4938, 2018.
3 Z. Zhou, J. Qin, X. Xiang, Y. Tan, Q. Liu, and N. N. Xiong, "News text topic clustering optimized method based on TF-IDF algorithm on spark," Computer Materials & Continua, vol. 62, no. 1, pp. 217-231, 2020.   DOI
4 X. Zhang, F. Peng, and M. Long, "Robust coverless image steganography based on DCT and LDA topic classification," IEEE Transactions on Multimedia, vol. 99, no. 12, pp. 3223-3238, 2018.
5 T. Pevny, T. Filler, and P. Bas, "Using high-dimensional image models to perform highly undetectable steganography," Lecture Notes in Computer Science, vol. 6837, pp.161-177, 2010.
6 J. Qin, X. Sun, X. Xiang, and C. Niu, "Principal feature selection and fusion method for Image steganalysis," Journal of Electronic Imaging, vol. 18, no. 3, pp. 1-14, 2009.
7 Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, "Coverless image steganography without embedding," in Proc. of International Conference on Cloud Computing and Security, pp. 123-132, 2015.
8 N. Pan, J. Qin, Y. Tan, X. Xiang, and G. Hou, "A video coverless information hiding algorithm based on semantic segmentation," EURASIP Journal on Image and Video Processing, vol. 23, 2020.
9 C. Yuan, Z. Xia, and X. Sun, "Coverless image steganography based on SIFT and BOF," Journal of International and Technology, vol. 18, no. 2, pp. 435-442, 2017.
10 Q. Liu, X. Xiang, J. Qin, Y. Tan, J. Tan, and Y. Luo, "Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping," Knowledge-Based Systems, vol. 192, pp. 105375-105389, 2020.   DOI
11 Y. Luo, J. Qin, X. Xiang, Y. Tan, Q. Liu, and L Xiang, "Coverless real-time image information hiding based on image block matching and dense convolutional network," Journal of Real-Time Image Processing, vol. 17, no. 1, pp. 125-135, 2020.   DOI
12 Y. Luo, J. Qin, X. Xiang, and Y. Tan, "Coverless image steganography based on multi-object recognition," IEEE Transactions on Circuits and Systems for Video Technology, 2020.
13 C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, "Going deeper with convolutions," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 1-9, 2015.
14 J. Qin, Y. Luo, X. Xiang, Y. Tan, and H. Huang, "Coverless image steganography: A survey," IEEE Access, vol. 7, pp. 171372-171394, 2019.   DOI
15 A. Krizhevsky, I. Sutskever, and G. Hinton, "ImageNet classification with deep convolutional neural networks," in Proc. of International Conference on Neural Information Processing Systems, vol. 60, no. 6, pp. 1097-1105, 2012.
16 K. Simonyan and A. Zisserman, "Very deep convolutional networks for large-scale image recognition," Computer Science, 2014.
17 K. He, X. Zhang, S. Ren, and J. Sun, "Deep residual learning for image recognition," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 770-778, 2016.
18 W. Ma, J. Qin, X. Xiang, Y. Tan, Y. Luo, and N. N. Xiong, "Adaptive median filtering algorithm based on divide and conquer and its application in captcha recognition," Computer Materials & Continua, vol. 58, no. 3, pp. 665-677, 2019.   DOI
19 L. Pan, J. Qin, H. Chen, X. Xiang, C. Li, and R. Chen, "Image augmentation-based food recognition with convolutional neural networks," Computer Materials & Continua, vol. 59, no. 1, pp. 297-313, 2019.   DOI
20 L. Xiang, G. Guo, J. Yu, V. S. Sheng, and P. Yang, "A convolutional neural network-based linguistic steganalysis for synonym substitution steganography," Mathematical Biosciences and Engineering, vol. 17, no. 2, pp. 1041-1058, 2020.   DOI
21 J. Wang, J. Qin, X. Xiang, Y. Tan, N. Pan, "Captcha recognition based on deep convolutional neural network," Mathematical Biosciences and Engineering, vol. 16, no, 5, pp. 5851-5861, 2019.   DOI
22 H. Jegou, M. Douze, and C. Schmid, "Hamming embedding and weak geometric consistency for large scale image search," in Proc. of European Conference on Computer Vision, pp. 304-317, 2008.
23 H. Li, J. Qin, X. Xiang, L. Pan, W. Ma, and N. N. Xiong, "An efficient image matching algorithm based on adaptive threshold and ransac," IEEE Access, vol. 6, pp. 66963-66971, 2018.   DOI
24 J. Qin, H. Li, X. Xiang, Y. Tan, W. Pan, W. Ma, and N. N. Xiong, "An encrypted image retrieval method based on harris corner optimization and lsh in cloud computing," IEEE Access, vol. 7, pp. 24626-24633, 2019.   DOI
25 L. Xiang, X. Shen, J. Qin, and W. Hao, "Discrete multi-graph hashing for large-scale visual search," Neural Processing Letters, vol. 49, no. 3, pp.1055-1069, 2019.   DOI
26 Y. Tan, J. Qin, X. Xiang, W. Ma, W. Pan and N. N. Xiong, "A robust watermarking scheme in YCbCr color space based on channel coding," IEEE Access, vol. 7, pp. 25026-25036, 2019.   DOI
27 S. Zheng, L. Wang, B. Ling, and D. Hu, "Coverless information hiding based on robust image hashing," in Proc. of International Conference on Intelligent Computing, pp. 536-547, 2017.
28 F. Li, R. Fergus, and P. Perona, "Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories," in Proc. of 2004 Conference on Computer Vision and Pattern Recognition Workshop, 2004.
29 G. Griffin, A. Holub, and P. Perona, "Caltech-256 object category dataset," CalTech Report, 2007.
30 W. Pan, J. Qin, X. Xiang, Y. Wu, Y. Tan, and L. Xiang, "A smart mobile diagnosis system for citrus diseases based on densely connected convolutional networks," IEEE Access, vol. 7, pp. 87534-87542, 2019.   DOI
31 C. Yang, C. Weng, S. Wang, and H. Sun, "Adaptive data hiding in edge areas of images with spatial lsb domain systems," IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 488-497, 2008.   DOI
32 W. Luo, F, Huang, and J. Huang, "Edge adaptive image steganography based on LSB matching revisited," IEEE Transactions on Information Forensics and Security, vol. 5, no. 2, pp. 201-214, 2010.   DOI
33 X. Zhang and S. Wang, "Steganography using multiple-base notational system and human vision sensitivity," IEEE Signal Processing Letters, vol. 12, no. 1, pp. 67-70, 2005.   DOI
34 V. Holub and J. Fridrich, "Designing steganographic distortion using directional filters," in Proc. of IEEE International Workshop on Information Forensics and Security, pp. 234-239, 2012.
35 D. G. Lowe, "Object recognition from local scale-invariant features," in Proc. of the 7th IEEE International Conference on Computer Vision, vol. 2, pp. 1150-1157, 1999.
36 G. Huang, Z. Liu, L. Maaten, and K. Weinberger, "Densely connected convolutional networks," in Proc. of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2261-2269, 2017.