A Coverless Image Steganography Based on a Robust Object Detection Network

被引:0
|
作者
Meng, Laijin [1 ]
Jiang, Xinghao [1 ]
Xu, Qiang [1 ]
Mi, Zhongjie [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Coverless image steganography; Object detection; Geometric attacks;
D O I
10.1007/978-981-97-5603-2_28
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Compared with traditional image steganography algorithms, coverless image steganography has attracted a lot of researchers due to the ability to resist steganalysis algorithms completely. However, most existing methods have yet to be designed specifically to resist geometric attacks. The robustness against geometric attacks could be better. In this paper, a novel coverless image steganography based on a robust object detection network is proposed. First, a mapping dictionary is established for both senders and receivers. Then, a robust object detection network is constructed to detect objects in all images. This object detection network contains two specific-designed operations, denoted as Add Noise and Add Confidence, which improve the robustness by introducing the Gauss noise and the confidence of labels. After that, the index structure is designed to accelerate the speed of searching. Finally, the secret information is divided into fixed-length segments and mapped to the stego-images according to the mapping dictionary to accomplish information hiding and extraction. Experimental results show that the proposed method performs much better in robustness than the state-of-the-art methods.
引用
收藏
页码:343 / 356
页数:14
相关论文
共 50 条
  • [41] A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation
    Peng, Fei
    Chen, Guanfu
    Long, Min
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (09) : 5817 - 5829
  • [42] Coverless Information Hiding Based on Robust Image Hashing
    Zheng, Shuli
    Wang, Liang
    Ling, Baohong
    Hu, Donghui
    INTELLIGENT COMPUTING METHODOLOGIES, ICIC 2017, PT III, 2017, 10363 : 536 - 547
  • [43] A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
    Seddik, Al-Hussien
    Salah, Mohammed
    Behery, Gamal
    El-harby, Ahmed
    Ebada, Ahmed Ismail
    Teng, Sokea
    Nam, Yunyoung
    Abouhawwash, Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03): : 5087 - 5103
  • [44] Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Tan, Junshan
    Luo, Yuanjing
    KNOWLEDGE-BASED SYSTEMS, 2020, 192
  • [45] Coverless image steganography using partial-duplicate image retrieval
    Zhou, Zhili
    Mu, Yan
    Wu, Q. M. Jonathan
    SOFT COMPUTING, 2019, 23 (13) : 4927 - 4938
  • [46] Coverless image steganography using partial-duplicate image retrieval
    Zhili Zhou
    Yan Mu
    Q. M. Jonathan Wu
    Soft Computing, 2019, 23 : 4927 - 4938
  • [47] A robust coverless video steganography based on maximum DC coefficients against video attacks
    Laijin Meng
    Xinghao Jiang
    Zhenzhen Zhang
    Zhaohong Li
    Tanfeng Sun
    Multimedia Tools and Applications, 2024, 83 : 13427 - 13461
  • [48] Coverless image steganography framework using distance local binary pattern and convolutional neural network
    Sandoval-Bravo, Luis A.
    Ponomaryov, Volodymyr, I
    Reyes-Reyes, Rogelio
    Cruz-Ramos, Clara
    REAL-TIME IMAGE PROCESSING AND DEEP LEARNING 2020, 2020, 11401
  • [49] A robust coverless video steganography based on maximum DC coefficients against video attacks
    Meng, Laijin
    Jiang, Xinghao
    Zhang, Zhenzhen
    Li, Zhaohong
    Sun, Tanfeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (05) : 13427 - 13461
  • [50] Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance
    Liu, Qiang
    Xiang, Xuyu
    Qin, Jiaohua
    Tan, Yun
    Zhang, Qin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (03): : 1078 - 1099