Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping

Abstract Recently, researches have shown that coverless image steganography can resist the existing steganalysis tools effectively. On this basis, a novel coverless image steganography algorithm based on image retrieval of DenseNet features and DWT sequence mapping is proposed in this paper. Firstly, DenseNet convolutional neural network model in deep learning is used to extract the features of image datasets. Supervised learning is adopted to retrieve the image, and the retrieval results can be used as the information carrier. Secondly, the selected images are divided into 4 × 4 sub-blocks for block discrete wavelet transform. Then the D W T coefficient are calculated based on the low-frequency components after block transformation, and the coefficients between blocks are scanned according to the Zigzag scan, such that the robust feature sequences are generated. Finally, the secret information is divided into segments with the same length as the feature sequence, and an inverted index is established with feature sequence, the position of blocks, D W T coefficient and image path. The image with the same feature sequence as the secret information segment is selected through index as the carriers. The experimental results and analysis show that this method has better robust and security performance resisting most image attacks compared with the state-of-the-art methods.

[1]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[2]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[3]  N. K. Pareek,et al.  Comparative Study of DCT and DWT Techniques of Digital Image Watermarking , 2017 .

[4]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[5]  Guo-Shiang Lin,et al.  A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm , 2010, IEEE Transactions on Multimedia.

[6]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[7]  Xingming Sun,et al.  Coverless Information Hiding Method Based on the Chinese Mathematical Expression , 2015, ICCCS.

[8]  Xuyu Xiang,et al.  Coverless Image Steganography: A Survey , 2019, IEEE Access.

[9]  Fei Peng,et al.  Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.

[10]  Yan Ke,et al.  PCA-SIFT: a more distinctive representation for local image descriptors , 2004, CVPR 2004.

[11]  Jing Wang,et al.  CAPTCHA recognition based on deep convolutional neural network. , 2019, Mathematical biosciences and engineering : MBE.

[12]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[13]  Hao Li,et al.  An Efficient Image Matching Algorithm Based on Adaptive Threshold and RANSAC , 2018, IEEE Access.

[14]  Yulei Wu,et al.  Coverless Information Hiding Method Based on the Chinese Character Encoding , 2017 .

[15]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[16]  Zhenfu Cao,et al.  Survey of information security , 2007, Science in China Series F: Information Sciences.

[17]  X G Xia,et al.  Wavelet transform based watermark for digital images. , 1998, Optics express.

[18]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[19]  Xian-Ting Zeng,et al.  Lossless Data Hiding Scheme Based on Adjacent Pixel Difference , 2009, 2009 International Conference on Computer Engineering and Technology.

[20]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for images, audio and video , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[21]  Q. M. Jonathan Wu,et al.  Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.

[22]  Xuyu Xiang,et al.  Coverless real-time image information hiding based on image block matching and dense convolutional network , 2019, Journal of Real-Time Image Processing.

[23]  Chuan Qin,et al.  Reversible data hiding with differential compression in encrypted image , 2018, Multimedia Tools and Applications.

[24]  Der-Chyuan Lou,et al.  A steganographic scheme for secure communications based on the chaos and euler Theorem , 2004, IEEE Transactions on Multimedia.

[25]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[26]  Qi Tian,et al.  Robust ImageGraph: Rank-Level Feature Fusion for Image Search , 2017, IEEE Transactions on Image Processing.

[27]  Hamido Fujita,et al.  Word Sense Disambiguation: A comprehensive knowledge exploitation framework , 2020, Knowl. Based Syst..

[28]  Hao Li,et al.  An Encrypted Image Retrieval Method Based on Harris Corner Optimization and LSH in Cloud Computing , 2019, IEEE Access.

[29]  Jiaohua Qin,et al.  Discrete Multi-graph Hashing for Large-Scale Visual Search , 2018, Neural Processing Letters.

[30]  Xingming Sun,et al.  Coverless Image Steganography Without Embedding , 2015, ICCCS.

[31]  Chengsheng Yuan,et al.  Coverless Image Steganography Based on SIFT and BOF , 2017 .

[32]  Xuyu Xiang,et al.  A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding , 2019, IEEE Access.