Special Issue: Information Security of Multimedia

Cover Selection Steganography Scheme Based on Image-to-Image Translation

Expand
  • College of Cryptographic Engineering, Engineering University of PAP, Xi'an 710086, China

Received date: 2019-07-27

  Revised date: 2019-07-30

  Online published: 2019-10-18

Abstract

To address the security risk in steganography algorithms using cover selection, an image-to-image translation steganography scheme based on cover selection is proposed. In the proposed scheme, the sender first selects the stego images from image libraries by the method of cover selection, then inputs the stego images into the cross-domain transformation model to get cross-domain images and transmits them to the receiver. Whereas the receiver receives the cross-domain images, and inputs them into the cross-domain transformation model to obtain stego images, then reversely converts them into secret information according to the mapping relation library. Experimental results show that the proposed method has significantly improvement in terms of capacity, anti-detection, and security.

Cite this article

LI Zonghan, LIU Jia, KE Yan, ZHANG Minqing, LUO Peng . Cover Selection Steganography Scheme Based on Image-to-Image Translation[J]. Journal of Applied Sciences, 2019 , 37(5) : 733 -743 . DOI: 10.3969/j.issn.0255-8297.2019.05.014

References

[1] Fridrich J. Steganography in digital media:principles, algorithms, and applications[M]. New York:Cambridge University Press, 2009.
[2] Luo W, Huang F, Huang J. Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):201-214.
[3] Filler T, Judas J, Fridrich J. Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):920-935.
[4] Qian Y, Dong J, Wang W, et al. Deep learning for steganalysis via convolutional neural networks[J]. The International Society for Optical Engineering, 2015, 9409:94090J-94090J-10.
[5] 阮书涵,秦正才. 一种基于GIF图像的无载体隐蔽通信方法[J]. 通信技术, 2017, 50(7):1506-1510. Ran S H, Qin Z C. Coverless covert communication based on GIF Ⅱmage[J]. Communications Technology, 2017, 50(7):1506-1510. (in Chinese)
[6] 周志立,曹燚,孙星明. 基于图像Bag-of-Words模型的无载体信息隐藏[J]. 应用科学学报,2016, 34(5):527-536. Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on Bag-of-Words model of image[J]. Journal of Applied Sciences, 2016, 34(5):527-536.(in Chinese)
[7] Ke Y, Zhang M, Liu J, et al. Generative steganography with Kerckhoffs' principle based on generative adversarial networks[DB/OL]. 2017[2017-11-25]. arXiv:1711.04916.
[8] Liu J, Zhou T, Zhang Z, et al. Digital gardan grille:a modern approach for information hiding[DB/OL]. 2018[2018-03-21]. arXiv:1803.09219.
[9] Liu J, Ke Y, Lei Y, et al. Generative steganography by sampling[J]. IEEE Access, 2019, 7:118586-118597.
[10] Liu M M, Zhang M Q, Liu J, et al. Coverless information hiding based on generative adversarial networks[DB/OL]. 2017[2017-12-29]. arXiv:1712.06951.
[11] Hu D H, Wang L, Jing W J, et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018:1-12.
[12] Yi Z, Zhang H, Tan P, et al. DualGAN:unsupervised dual learning for image-to-image translation[DB/OL]. 2017[2017-05-25]. arXiv:1704.02510.
[13] Zhu J Y, Park T, Isola P, et al. Unpaired image-to-image translation using cycle-consistent adversarial networks[C]//IEEE International Conference on Computer Vision, 2017:2242-2251.
[14] Kim T, Cha M, Kim H, et al. Learning to discover cross-domain relations with generative adversarial networks[J]. 한국지능정보시스템학회 학술대회논문집, 2017, 50(7):1506-1510
[15] Johnson J, Alahi A, Li F F. Perceptual losses for real-time style transfer and super-resolution[DB/OL]. 2016[2016-10-16]. arXiv:1603.08155.
[16] Luan F J, Paris S, Shechtman E, et al. Deep photo style transfer[C]//IEEE Conference on Computer Vision and Pattern Recognition, 2017:6997-7005.
[17] Goodfellow I J, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets[C]//International Conference on Neural Information Processing Systems, 2014, 2:2672-2680.
[18] Zhou Z, Sun H, Harit R, et al. Coverless image steganography without embedding[C]//International Conference on Cloud Computing and Security. Springer, 2015, 9483:123-132.
[19] Zheng S L, Wang L, Ling B H, et al. Coverless information hiding based on robust image hashing[C]//Intelligent Computing Methodologies:13th International Conference, 2017:536-547.
[20] Otori H, Kuriyama S. Texture synthesis for mobile data communications[J]. IEEE Computer Graphics and Applications, 2009, 29(6):74-81.
[21] Xu J, Mao X, Jin X, et al. Hidden message in a deformation-based texture[J]. The Visual Computer, 2015, 31(12):1653-1669.
[22] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions on Image Processing, 2014, 24(1):130-139.
[23] Ke Y, Liu J, Zhang M Q, et al. Steganography security:principle and practice[J]. IEEE Access, 2018(6):73009-73022.
Outlines

/