Advertisement

Coverless image steganography using partial-duplicate image retrieval

  • Zhili Zhou
  • Yan Mu
  • Q. M. Jonathan Wu
Methodologies and Application
  • 102 Downloads

Abstract

Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis possible. In this paper, we propose a novel coverless steganographic approach without any modification for transmitting secret color image. In our approach, instead of modifying a cover image to generate the stego-image, steganography is realized by using a set of proper partial duplicates of a given secret image as stego-images, which are retrieved from a natural image database. More specifically, after dividing each database image into a number of non-overlapping patches and indexing those images based on the features extracted from these patches, we search for the partial duplicates of the secret image in the database to obtain the stego-images, each of which shares one or several visually similar patches with the secret image. At the receiver end, by using the patches of the stego-images, our approach can approximately recover the secret image. Since the stego-images are natural ones without any modification traces, our approach can resist all of the existing steganalysis tools. Experimental results and analysis prove that our approach not only has strong resistance to steganalysis, but also has desirable security and high hiding capability.

Keywords

Coverless steganographic approach Partial-duplicate image retrieval Stego-image Capacity Security 

Notes

Acknowledgements

This work was supported, in part, by the National Natural Science Foundation of China under grant numbers 61602253, U1536206, 61232016, U1405254, 61373132, 61373133, 61502242, 61572258, and 61672294; in part, by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; in part, by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; and in part, by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.

Compliance with ethical standards

Conflicts of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Continua 54(2):197–207Google Scholar
  2. Chang C, Kieu T, Chou Y (2009) Reversible information hiding for VQ indices based on locally adaptive coding. J Vis Commun Image Represent 20:57–64CrossRefGoogle Scholar
  3. Cheddad A, Condell J, Curran K, Kevitt M (2010) Review: ‘Digital image steganography: survey and analysis of current methods’. J Signal Process 90:727–752CrossRefzbMATHGoogle Scholar
  4. Chen W (2007) Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Appl Math Comput 185:432–448MathSciNetzbMATHGoogle Scholar
  5. Chen B, Zhou C, Jeon B, Zheng Y, Wang J (2017a) Quaternion discrete fractional random transform for color image adaptive watermarking. Multimed Tools Appl.  https://doi.org/10.1007/s11042-017-5511-2
  6. Chen X, Chen S, Wu Y (2017b) Coverless information hiding method based on the Chinese character encoding. J Internet Technol 18(2):313–320Google Scholar
  7. Efros A, Freeman W (2001) Image quilting for texture synthesis and transfer. In: Conference on computer graphics and interactive techniques, New York, USA, vol 2001, pp 341–346Google Scholar
  8. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7:868–882CrossRefGoogle Scholar
  9. Hioki H (2002) A data embedding method using BPCS principle with new complexity measures. In: Proceedings of Pacific Rim Workshop on digital steganography, pp. 30–47Google Scholar
  10. Johnson N, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31:26–34CrossRefGoogle Scholar
  11. Kawaguchi E (2005) BPCS-steganography principle and applications. In: Knowledge-based intelligent information and engineering systems, Melbourne, Australia. vol 3684, pp 289–299Google Scholar
  12. Ker A (2004) Improved detection of LSB steganography in grayscale images. Springer, Heidelberg, pp 97–115Google Scholar
  13. Ker A (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12:441–444CrossRefGoogle Scholar
  14. Kieu M, Lai K, Tran T, Le T(2016) A fusion of bag of word model and hierarchical K-Means++ in image retrieval. In: International symposium on integrated uncertainty in knowledge modelling and decision making, Springer, Cham, pp 397–408Google Scholar
  15. Liao X, Qin Z, Ding L (2017a) Data embedding in digital images using critical functions. Sig Process Image Commun 58:146–156CrossRefGoogle Scholar
  16. Liao X, Yin J, Guo S, Li X, Sangaiah A (2017b) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng.  https://doi.org/10.1016/j.compeleceng.2017.08.020
  17. Li Z, Chen X, Pan X, ZX (2009) Lossless data hiding scheme based on adjacent pixel difference. In: International conference on computer engineering and technology. IEEE Computer Society, Washington Vol 1, pp 588–592Google Scholar
  18. Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci Int J 177:3099–3109Google Scholar
  19. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5:201–214CrossRefGoogle Scholar
  20. Mckeon R (2007) Strange Fourier steganography in movies. In: IEEE international conference on electro/information technology, Chicago, USA. vol 2007, pp 178–182Google Scholar
  21. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287CrossRefGoogle Scholar
  22. Sivic J, Zisserman A (2003) Video Google: A text retrieval approach to object matching in videos. Proceedings of the 9th IEEE International Conference on Computer Vision, pp. 1470-1477Google Scholar
  23. Sivic J, Zisserman A (2012) Video Google: a text retrieval approach to object matching in videos. In: IEEE international conference on computer vision, vol 7, pp 1470–1477Google Scholar
  24. Sun H, Grishman R, Wang Y (2017) Active learning based named entity recognition and its application in natural language coverless information hiding. J Internet Technol 18(2):443–451Google Scholar
  25. Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612CrossRefGoogle Scholar
  26. Wang J, Lian S, Shi Y (2017) Hybrid multiplicative multi-watermarking in DWT domain. Multidimension Syst Signal Process 28(2):617–636CrossRefzbMATHGoogle Scholar
  27. Wu K, Wang C (2014) Steganography using reversible texture synthesis. IEEE Trans Image Process 24:130–139MathSciNetGoogle Scholar
  28. Wu K, Wang C (2015) Steganography using reversible texture synthesis. IEEE Trans Image Process 24:130–139MathSciNetCrossRefGoogle Scholar
  29. Wu H, Wu N, Tsai C, Hwang M (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. Proc Vis Image Signal Process 152:611–615CrossRefGoogle Scholar
  30. Xia Z, Li X (2017) Coverless information hiding method based on LSB of the character’s unicode. J Internet Technol 18(6):1353–1360Google Scholar
  31. Xiong L, Xu Z, Shi Y (2017) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimension Syst Signal Process 29(3):1191–1202MathSciNetCrossRefGoogle Scholar
  32. Yin Z, Niu X, Zhang X, Tang J, Luo B (2017b) Reversible data hiding in encrypted AMBTC compressed images. In: Multimedia tools and applications, pp 436–445Google Scholar
  33. Yin Z, Niu X, Zhou Z, Tang J, Luo B (2017a) Improved reversible image authentication scheme. Cogn Comput 8(5):890–899CrossRefGoogle Scholar
  34. Yuan C, Xia Z, Sun X (2016) Coverless image steganography based on SIFT and BOF. J Internet Technol 18:209–216Google Scholar
  35. Zhou Z, Sun X, Chen X, Chang C, Fu Z (2014) A novel signature based on combination of global and local signatures for image copy detection. Secur Commun Netw 7(11):1702–1711CrossRefGoogle Scholar
  36. Zhou Z, Sun H, Harit R, Chen X, Sun X (2015) Coverless image steganography without embedding. In: International conference on cloud computing and security, Nanjing, China, pp 123–132Google Scholar
  37. Zhou Z, Cao Y, Sun X (2016a) Coverless information hiding based on bag-of-words model of image. J Appl Sci 34:527–536Google Scholar
  38. Zhou Z, Wang Y, Wu Q, Yang C, Sun X (2016b) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12:48–63Google Scholar
  39. Zhou Z, Yang C, Chen B, Sun X, Liu Q, Wu Q (2016c) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf Syst E99.D(6):1531–1540Google Scholar
  40. Zhou Z, Wu Q, Yang C, Sun X, Pan Z (2017a) Coverless image steganography based on histograms of oriented gradients-based hashing algorithm. J Internet Technol 18(5):1177–1184Google Scholar
  41. Zhou Z, Wu Q, Huang F, Sun X (2017b) Fast and accurate near-duplicate image elimination for visual sensor networks. Int J Distrib Sens Netw 13(2):1–12CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer and Software and Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science and TechnologyNanjingChina
  2. 2.Department of Electrical and Computer EngineeringUniversity of WindsorWindsorCanada

Personalised recommendations