Journal of Applied Sciences ›› 2024, Vol. 42 ›› Issue (3): 469-485.doi: 10.3969/j.issn.0255-8297.2024.03.009
• Digital Media Forensics and Security • Previous Articles Next Articles
YUAN Ziye1, QIU Baolin1, YE Yu1, WEN Wenying1, HUA Dingli1, ZHANG Yushu2
Received:
2023-11-27
Published:
2024-06-06
CLC Number:
YUAN Ziye, QIU Baolin, YE Yu, WEN Wenying, HUA Dingli, ZHANG Yushu. A Robust Coverless Image Steganography Method for Coding Camouflage[J]. Journal of Applied Sciences, 2024, 42(3): 469-485.
[1] 谢艺艺, 张玉书, 赵若宇, 等. 基于CycleGAN的图像隐私保护[J]. 应用科学学报, 2023, 41(2): 228-239. Xie Y Y, Zhang Y S, Zhao R Y, et al. Image privacy protection based on cycle-consistent generative adversarial networks [J]. Journal of Applied Sciences, 2023, 41(2): 228-239.(in Chinese) [2] Wen W Y, Fan J C, Zhang Y S, et al. APCAS: autonomous privacy control and authentication sharing in social networks [J]. IEEE Transactions on Computational Social Systems, 2023, 10(6): 3169-3180. [3] Yang C H, Weng C Y, Wang S J, et al. Adaptive data hiding in edge areas of images with spatial LSB domain systems [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497. [4] Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 201-214. [5] Zhang X P, Wang S Z. Steganography using multiple-base notational system and human vision sensitivity [J]. IEEE Signal Processing Letters, 2005, 12(1): 67-70. [6] Yu M J, Yao H, Qin C, et al. Reversible data hiding in palette images [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(2): 648-660. [7] Qin X H, Li B, Tan S Q, et al. Gradually enhanced adversarial perturbations on color pixel vectors for image steganography [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32(8): 5110-5123. [8] Huang F J, Huang J W, Shi Y Q. New channel selection rule for JPEG steganography [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(4): 1181-1191. [9] Li S, Wang Z, Zhang X, et al. Robust image steganography against general down sampling operations with lossless secret recovery [J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21(1): 340-352. [10] Guan Q X, Liu P, Zhang W M, et al. Double-layered dual-syndrome trellis codes utilizing channel knowledge for robust steganography [J]. IEEE Transactions on Information Forensics and Security, 2023, 18: 501-516. [11] Li F Y, Zeng Y S, Zhang X P, et al. Ensemble stego selection for enhancing image steganography [J]. IEEE Signal Processing Letters, 2022, 29: 702-706. [12] Baluja S. Hiding images within images [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2020, 42(7): 1685-1697. [13] Rehman A U, Rahim R, Nadeem M S, et al. End-to-end trained CNN encoder-decoder networks for image steganography [C]//The European Conference on Computer Vision, 2018: 723-729. [14] Zhang R, Dong S Q, Liu J Y. Invisible steganography via generative adversarial networks [J]. Multimedia Tools and Applications, 2019, 78(7): 8559-8575. [15] 刘明明, 张敏情, 刘佳, 等. 基于生成对抗网络的无载体信息隐藏[J]. 应用科学学报, 2018, 36(2): 371-382. Liu M M, Zhang M Q, Liu J, et al. Coverless information hiding based on generative adversarial networks [J]. Journal of Applied Sciences, 2018, 36(2): 371-382. (in Chinese) [16] Liu M, Song T, Luo W, et al. Adversarial steganography embedding via stego generation and selection [J] IEEE Transactions on Dependable and Secure Computing, 2023, 20(3): 2375-2389. [17] Liu Q, Xiang X Y, Qin J H, et al. Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping [J]. Knowledge-Based Systems, 2020, 192: 105375-105389. [18] Zhou Z L, Mu Y, Wu Q M J, et al. Coverless image steganography using partial-duplicate image retrieval [J]. Soft Computing, 2019, 23(13): 4927-4938. [19] Luo Y J, Qin J H, Xiang X Y, et al. Coverless real-time image information hiding based on image block matching and dense convolutional network [J]. Journal of Real-Time Image Processing, 2020, 17(1): 125-135. [20] Li S, Zhang X P. Toward construction based data hiding: from secrets to fingerprint images [J]. IEEE Transactions on Image Processing: a Publication of the IEEE Signal Processing Society, 2018, 28(3): 1482-1497. [21] Zhou Z L, Su Y C, Li J, et al. Secret-to-image reversible transformation for generative steganography [J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(5): 4118- 4134. [22] Liu X, Ma Z, Ma J, et al. Image disentanglement autoencoder for steganography without embedding [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022: 2293-2302. [23] Zhang X, Peng F, Long M. Robust coverless image steganography based on DCT and LDA topic classification [J]. IEEE Transactions on Multimedia, 2018, 20(12): 3223-3238. [24] 王亚宁, 吴槟. 面向无载体信息隐藏的映射关系智能搜索方法[J]. 信息安全学报, 2020, 5(3): 48-61. Wang Y N, Wu B. An intelligent search method of mapping relation for coverless information hiding [J]. Journal of Cyber Security, 2020, 5(3): 48-61. (in Chinese) [25] Luo Y J, Qin J H, Xiang X Y, et al. Coverless image steganography based on multi-object recognition [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(7): 2779-2791. [26] Chen X Y, Zhang Z T, Qiu A Q, et al. Novel coverless steganography method based on image selection and StarGAN [J]. IEEE Transactions on Network Science and Engineering, 2022, 9(1): 219-230. [27] Cao Y, Zhou Z L, Wu Q M J, et al. Coverless information hiding based on the generation of anime characters [J]. EURASIP Journal on Image and Video Processing, 2020(1): 1-15. [28] Arthur D, Vassilvitskii S. K-means: the advantages of careful seeding [C]//Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2007: 1027-1035. [29] Park T, Zhu J Y, Wang O, et al. Swapping autoencoder for deep image manipulation [C]//Proceedings of the 34th International Conference on Neural Information Processing Systems, 2020: 7198-7211. [30] Yu F, Seff A, Zhang Y D, et al. LSUN: construction of a large-scale image dataset using deep learning with humans in the Loop [DB/OL]. 2015[2023-11-27]. http://arxiv.org/abs/1506.03365. [31] Karras T, Laine S, Aila T. A style-based generator architecture for generative adversarial networks [C]//2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019: 4396-4405. [32] Krizhevsky A, Sutskever I, Hinton G E. ImageNet classification with deep convolutional neural networks [J]. Communications of the ACM, 2017, 60(6): 84-90. [33] Jegou H, Douze M, Schmid C. Hamming embedding and weak geometric consistency for large scale image search [C]//European Conference on Computer Vision, 2008: 304-317. [34] Zhu J R, Kaplan R, Johnson J, et al. Hidden: hiding data with deep networks [C]//European Conference on Computer Vision, 2018: 682-697. [35] Zhang Z, Fu G, Ni R, et al. A generative method for steganography by cover synthesis with auxiliary semantics [J]. Tsinghua Science and Technology, 2020, 25(4): 516-527. [36] Hu D H, Wang L, Jiang W J, et al. A novel image steganography method via deep convolutional generative adversarial networks [J]. IEEE Access, 2018, 6: 38303-38314. [37] Li J, Niu K, Liao L, et al. A generative steganography method based on WGAN-GP [C]//The 6th International Conference: Artificial Intelligence and Security (ICAIS 2020), 2020: 386-397. [38] Yu C, Hu D H, Zheng S L, et al. An improved steganography without embedding based on attention GAN [J]. Peer-to-Peer Networking and Applications, 2021, 14(3): 1446-1457. [39] Karras T, Laine S, Aittala M, et al. Analyzing and improving the image quality of styleGAN [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020: 8110-8119. [40] Zheng S L, Wang L, Ling B, et al. Coverless information hiding based on robust image hashing [C]//The 13th International Conference: Intelligent Computing Methodologies, 2017, 2017: 536-547. [41] 刘钊志, 赵琰. 一种图像块旋转的马赛克拼图伪装隐写[J]. 应用科学学报, 2023, 41(2): 311-325. Liu Z Z, Zhao Y. A mosaic puzzle camouflage steganography with image block rotation [J]. Journal of Applied Sciences, 2023, 41(2): 311-325. (in Chinese) [42] Karim N A, Ali S A, Jawad M J. A coverless image steganography based on robust image wavelet hashing [J]. Telecommunication Computing Electronics and Control, 2022, 20(6): 1317- 1325. [43] Meng L J, Jiang X H, Zhang Z Z, et al. A robust coverless image steganography based on an end-to-end hash generation model [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(7): 3542-3558. |
[1] | MO Mouke, WANG Chuntao, GUO Qingwen, BIAN Shan. A Novel Black-Box Finger-Print Watermarking Algorithm for Deep Classification Neural Network [J]. Journal of Applied Sciences, 2024, 42(3): 486-498. |
[2] | WANG Wenjuan, YAO Heng. Gamma Correction Parameter Estimation Via Histogram Gap Feature [J]. Journal of Applied Sciences, 2024, 42(2): 290-301. |
[3] | FENG Xiaoning, WU Hongyu. Quantum Attacks on Symmetric Cryptosystems [J]. Journal of Applied Sciences, 2024, 42(1): 39-52. |
[4] | WU Guangfu, YANG Zi, HUANG Baozhu. Dynamic Byzantine Fault Tolerance Algorithm Based on Reputation and Clustering [J]. Journal of Applied Sciences, 2023, 41(6): 1046-1057. |
[5] | MA Xue, PAN Heng, YAO Zhongyuan, SI Xueming. Dual Authorization Sharing Scheme of Searchable Electronic Medical Data Based on Consortium Blockchain [J]. Journal of Applied Sciences, 2023, 41(5): 881-895. |
[6] | WENG Ke, QIN Jianhao, SONG Tianran, SHI Hui. Reversible Data Hiding in Encrypted Image Based on Dual-Domain Joint Coding and Secret Sharing [J]. Journal of Applied Sciences, 2023, 41(2): 197-217. |
[7] | LIU Zhaozhi, ZHAO Yan. A Mosaic Puzzle Camouflage Steganography with Image Block Rotation [J]. Journal of Applied Sciences, 2023, 41(2): 311-325. |
[8] | YANG Danling, REN Yanli. Payment Protocol for Outsourcing of Bilinear Pairing Based on Blockchain [J]. Journal of Applied Sciences, 2022, 40(6): 1019-1033. |
[9] | SONG Zhonghao, YAO Heng. Image Rotation Angle Estimation on JPEG Compressed Images via Third-order Differential Prefiltering Operation and Cyclostationarity Analysis [J]. Journal of Applied Sciences, 2022, 40(5): 820-827. |
[10] | ZHU Xuguang, XING Chunxiao, LI Wenqing, HAO Yingting. Evaluation Method of Blockchain Privacy Protection for Full Life Cycle of Transaction Data [J]. Journal of Applied Sciences, 2022, 40(4): 555-566. |
[11] | ZHANG Xuewang, FU Kang, YE Caijin, WANG Kunlan. New Light Node Data Query Method for Medical Blockchains [J]. Journal of Applied Sciences, 2022, 40(4): 600-610. |
[12] | WU Yihan, HUANG Jianhua, SHAO Xinghui, WANG Cheng. Bloom Filter Optimization for Consortium Blockchain [J]. Journal of Applied Sciences, 2022, 40(4): 611-622. |
[13] | LIU Wei, WANG Dong, SHE Wei, PAN Heng, SONG Xuan, TIAN Zhao. An Efficient Query Method for Blockchain Traceability [J]. Journal of Applied Sciences, 2022, 40(4): 623-638. |
[14] | TIAN Zhihong, ZHAO Jindong, LI Shaokai, HOU Yanchen, HAN Shuangzhi, ZHAO Xiangfu. DPoS Consensus Algorithm Based on Node Weight [J]. Journal of Applied Sciences, 2022, 40(4): 639-652. |
[15] | ZHU Ziqiang, YAO Zhongyuan, ZHU Weihua, ZHAO Haihong, PAN Changfeng, SI Xueming. Anonymous and Traceable Data Trading Scheme Based on Blockchain [J]. Journal of Applied Sciences, 2022, 40(4): 653-665. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||