A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix

ABSTRACT In this paper, a coverless information hiding algorithm is introduced. In which, the grayscale gradient co-occurrence matrix is used to encode images and the mapping relationship between the images and the random numbers is used to express the payload information. There are three steps for this algorithm. Firstly, the grayscale gradient co-occurrence matrix of cover image is calculated, in accordance with which a descriptor is introduced. Secondly, the descriptor is quantized into a binary sequence to construct a mapping relationship between the cover image and the binary random numbers. Finally, the binary secret information sequence is divided into many segments, and the correct images corresponding to those segments are selected from the image database according to the mapping relationship. Moreover, the secret information is encrypted by Turbo encoder to improve the security. The experimental results show that the proposed algorithm has a good tolerance towards JPEG compression attack and low-pass filter attack. This promising algorithm which can be applied into remote sensing satellites leads an applied value in covert communication with high-security.

[1]  Sanaa Ghouzali,et al.  Chaos based Zero-steganography algorithm , 2013, Multimedia Tools and Applications.

[2]  Donghui Hu,et al.  Coverless Information Hiding Based on Robust Image Hashing , 2017, ICIC.

[3]  Christian Schlegel,et al.  Trellis and turbo coding , 2004 .

[4]  Hideki Noda,et al.  High-performance JPEG steganography using quantization index modulation in DCT domain , 2006, Pattern Recognit. Lett..

[5]  Shiguo Lian,et al.  Hybrid multiplicative multi-watermarking in DWT domain , 2017, Multidimens. Syst. Signal Process..

[6]  Xingming Sun,et al.  Coverless Information Hiding Method Based on the Chinese Mathematical Expression , 2015, ICCCS.

[7]  Bhupendra Gupta,et al.  A tool supported approach for brightness preserving contrast enhancement and mass segmentation of mammogram images using histogram modified grey relational analysis , 2017, Multidimens. Syst. Signal Process..

[8]  Xingming Sun,et al.  Coverless Information Hiding Based on the Molecular Structure Images of Material , 2018 .

[9]  Xingming Sun,et al.  Dynamic Content Selection Framework Applied to Coverless Information Hiding , 2018 .

[10]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[11]  C. E. Veni Madhavan,et al.  Steganography based Information Security , 2002 .

[12]  Weiming Zhang,et al.  Steganalysis of HUGO steganography based on parameter recognition of syndrome-trellis-codes , 2016, Multimedia Tools and Applications.

[13]  Di Bai,et al.  A satellite communication zero steganography algorithm , 2016, Multimedia Tools and Applications.

[14]  Tanveer J. Siddiqui,et al.  A Security Enhanced Robust Steganography Algorithm for Data Hiding , 2012 .

[15]  Nasir D. Memon,et al.  Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[16]  Chengsheng Yuan,et al.  Coverless Image Steganography Based on SIFT and BOF , 2017 .

[17]  Shiguo Lian,et al.  Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics , 2017, Multimedia Tools and Applications.

[18]  Kouichi Sakurai,et al.  A Zero-Watermarking-Like Steganography and Potential Applications , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[19]  Mehdi Hussain,et al.  Recursive Information Hiding Scheme Through LSB, PVD Shift, and MPE , 2018 .

[20]  Chin-Chen Chang,et al.  A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.

[21]  Ioannis Pitas,et al.  Circularly symmetric watermark embedding in 2-D DFT domain , 2001, IEEE Trans. Image Process..

[22]  Fei Peng,et al.  Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.

[23]  Xiangyang Luo,et al.  Selection of Rich Model Steganalysis Features Based on Decision Rough Set $\alpha$ -Positive Region Reduction , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Caixia Deng,et al.  An edge detection approach of image fusion based on improved Sobel operator , 2011, 2011 4th International Congress on Image and Signal Processing.

[25]  Zhou Quan Data hiding transmission method against compression for satellite image based on chaos and slant transform , 2013 .

[26]  S. Hemalatha,et al.  A Secure Color Image Steganography In Transform Domain , 2013, ArXiv.

[27]  Xingming Sun,et al.  Coverless Image Steganography Without Embedding , 2015, ICCCS.

[28]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[29]  Zhou Quan Information Hiding of Satellite Remote Image Based on Image Complexity Classification , 2010 .

[30]  Xintao Duan,et al.  Coverless Steganography for Digital Images Based on a Generative Model , 2018 .

[31]  Ahmet M. Eskicioglu,et al.  Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.