Coverless Image Steganography: A Survey

With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of information security recently. Different from the traditional image steganography, coverless image steganography does not need to employ the designated cover image for embedding the secret data but directly transfers secret information through its own properties such as pixel brightness value, color, texture, edge, contour and high-level semantics. Therefore, it radically resist the detection of steganalysis tools and significantly improves the security of the image. Its basic idea is to analyze the attributes of the image and map them to the secret information according to certain rules based on the characteristics of the attributes. This paper includes more than 50 key contributions to provide a comprehensive survey in this field, covers the main aspects of coverless image steganography research: the fundamental frameworks, pre-processing, feature extraction, generation of hash sequence and mapping relationships. The existing methods are evaluated and the prospect of future work is also summarized.

[1]  Jessica J. Fridrich,et al.  Random Projections of Residuals for Digital Image Steganalysis , 2013, IEEE Transactions on Information Forensics and Security.

[2]  Jing Long,et al.  A New Robust Dual Intellectual Property Watermarking Algorithm Based on Field Programmable Gate Array , 2015 .

[3]  Xuyu Xiang,et al.  A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding , 2019, IEEE Access.

[4]  Donghui Hu,et al.  Coverless Information Hiding Based on Robust Image Hashing , 2017, ICIC.

[5]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[6]  Jing Dong,et al.  Deep learning for steganalysis via convolutional neural networks , 2015, Electronic Imaging.

[7]  Xingming Sun,et al.  Encoding multiple contextual clues for partial-duplicate image retrieval , 2017, Pattern Recognit. Lett..

[8]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[9]  Peyman Ayubi,et al.  An integer wavelet transform image steganography method based on 3D sine chaotic map , 2018, Multim. Tools Appl..

[10]  R.T. McKeon,et al.  Strange fourier steganography in movies , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[11]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[12]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[13]  Min Gao,et al.  A novel coverless information hiding method based on the average pixel value of the sub-images , 2018, Multimedia Tools and Applications.

[14]  Yi Long,et al.  Coverless Information Hiding Method Based on Web Text , 2019, IEEE Access.

[15]  Chong-Wah Ngo,et al.  Evaluating bag-of-visual-words representations in scene classification , 2007, MIR '07.

[16]  Peyman Ayubi,et al.  A new transform domain steganography based on modified logistic chaotic map for color images , 2017, J. Inf. Secur. Appl..

[17]  Mo Chen,et al.  JPEG-Phase-Aware Convolutional Neural Network for Steganalysis of JPEG Images , 2017, IH&MMSec.

[18]  Fei Peng,et al.  Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.

[19]  M. C. Hanumantharaju,et al.  Novel high-speed reconfigurable FPGA architectures for EMD-based image steganography , 2019, Multimedia Tools and Applications.

[20]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[21]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[22]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[23]  Xintao Duan,et al.  Coverless information hiding based on Generative Model , 2018, ArXiv.

[24]  Jia Liu,et al.  Coverless Information Hiding Based on Generative adversarial networks , 2017, ArXiv.

[25]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[26]  Bill Triggs,et al.  Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[27]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[28]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[29]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[30]  Wen-Yuan Chen,et al.  Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..

[31]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[32]  Jessica J. Fridrich,et al.  Selection-channel-aware rich model for Steganalysis of digital images , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[33]  Q. M. Jonathan Wu,et al.  Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.

[34]  Léon Bottou,et al.  Wasserstein GAN , 2017, ArXiv.

[35]  Matthijs C. Dorst Distinctive Image Features from Scale-Invariant Keypoints , 2011 .

[36]  Jiangqun Ni,et al.  Deep Learning Hierarchical Representations for Image Steganalysis , 2017, IEEE Transactions on Information Forensics and Security.

[37]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[38]  Xingming Sun,et al.  Coverless Image Steganography Using Histograms of Oriented Gradients-Based Hashing Algorithm , 2017 .

[39]  Xuyu Xiang,et al.  Coverless real-time image information hiding based on image block matching and dense convolutional network , 2019, Journal of Real-Time Image Processing.

[40]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[41]  Xingming Sun,et al.  Coverless Image Steganography Without Embedding , 2015, ICCCS.

[42]  Bin Li,et al.  A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.

[43]  Jessica J. Fridrich,et al.  Digital image steganography using universal distortion , 2013, IH&MMSec '13.

[44]  Evgeny Burnaev,et al.  Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.

[45]  Wang Shuo Recent Advances in Image-Based Steganalysis Research , 2009 .

[46]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[47]  Sanaa Ghouzali,et al.  Zero-steganography using DCT and spatial domain , 2013, 2013 ACS International Conference on Computer Systems and Applications (AICCSA).