Skip to main content
Log in

Coverless image steganography using partial-duplicate image retrieval

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis possible. In this paper, we propose a novel coverless steganographic approach without any modification for transmitting secret color image. In our approach, instead of modifying a cover image to generate the stego-image, steganography is realized by using a set of proper partial duplicates of a given secret image as stego-images, which are retrieved from a natural image database. More specifically, after dividing each database image into a number of non-overlapping patches and indexing those images based on the features extracted from these patches, we search for the partial duplicates of the secret image in the database to obtain the stego-images, each of which shares one or several visually similar patches with the secret image. At the receiver end, by using the patches of the stego-images, our approach can approximately recover the secret image. Since the stego-images are natural ones without any modification traces, our approach can resist all of the existing steganalysis tools. Experimental results and analysis prove that our approach not only has strong resistance to steganalysis, but also has desirable security and high hiding capability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Continua 54(2):197–207

    Google Scholar 

  • Chang C, Kieu T, Chou Y (2009) Reversible information hiding for VQ indices based on locally adaptive coding. J Vis Commun Image Represent 20:57–64

    Article  Google Scholar 

  • Cheddad A, Condell J, Curran K, Kevitt M (2010) Review: ‘Digital image steganography: survey and analysis of current methods’. J Signal Process 90:727–752

    Article  MATH  Google Scholar 

  • Chen W (2007) Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation. Appl Math Comput 185:432–448

    MathSciNet  MATH  Google Scholar 

  • Chen B, Zhou C, Jeon B, Zheng Y, Wang J (2017a) Quaternion discrete fractional random transform for color image adaptive watermarking. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5511-2

  • Chen X, Chen S, Wu Y (2017b) Coverless information hiding method based on the Chinese character encoding. J Internet Technol 18(2):313–320

    Google Scholar 

  • Efros A, Freeman W (2001) Image quilting for texture synthesis and transfer. In: Conference on computer graphics and interactive techniques, New York, USA, vol 2001, pp 341–346

  • Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7:868–882

    Article  Google Scholar 

  • Hioki H (2002) A data embedding method using BPCS principle with new complexity measures. In: Proceedings of Pacific Rim Workshop on digital steganography, pp. 30–47

  • Johnson N, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31:26–34

    Article  Google Scholar 

  • Kawaguchi E (2005) BPCS-steganography principle and applications. In: Knowledge-based intelligent information and engineering systems, Melbourne, Australia. vol 3684, pp 289–299

  • Ker A (2004) Improved detection of LSB steganography in grayscale images. Springer, Heidelberg, pp 97–115

    Google Scholar 

  • Ker A (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12:441–444

    Article  Google Scholar 

  • Kieu M, Lai K, Tran T, Le T(2016) A fusion of bag of word model and hierarchical K-Means++ in image retrieval. In: International symposium on integrated uncertainty in knowledge modelling and decision making, Springer, Cham, pp 397–408

  • Liao X, Qin Z, Ding L (2017a) Data embedding in digital images using critical functions. Sig Process Image Commun 58:146–156

    Article  Google Scholar 

  • Liao X, Yin J, Guo S, Li X, Sangaiah A (2017b) Medical JPEG image steganography based on preserving inter-block dependencies. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2017.08.020

  • Li Z, Chen X, Pan X, ZX (2009) Lossless data hiding scheme based on adjacent pixel difference. In: International conference on computer engineering and technology. IEEE Computer Society, Washington Vol 1, pp 588–592

  • Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci Int J 177:3099–3109

    Google Scholar 

  • Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5:201–214

    Article  Google Scholar 

  • Mckeon R (2007) Strange Fourier steganography in movies. In: IEEE international conference on electro/information technology, Chicago, USA. vol 2007, pp 178–182

  • Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13:285–287

    Article  Google Scholar 

  • Sivic J, Zisserman A (2003) Video Google: A text retrieval approach to object matching in videos. Proceedings of the 9th IEEE International Conference on Computer Vision, pp. 1470-1477

  • Sivic J, Zisserman A (2012) Video Google: a text retrieval approach to object matching in videos. In: IEEE international conference on computer vision, vol 7, pp 1470–1477

  • Sun H, Grishman R, Wang Y (2017) Active learning based named entity recognition and its application in natural language coverless information hiding. J Internet Technol 18(2):443–451

    Google Scholar 

  • Wang Z, Bovik A, Sheikh H, Simoncelli E (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  • Wang J, Lian S, Shi Y (2017) Hybrid multiplicative multi-watermarking in DWT domain. Multidimension Syst Signal Process 28(2):617–636

    Article  MATH  Google Scholar 

  • Wu K, Wang C (2014) Steganography using reversible texture synthesis. IEEE Trans Image Process 24:130–139

    MathSciNet  MATH  Google Scholar 

  • Wu K, Wang C (2015) Steganography using reversible texture synthesis. IEEE Trans Image Process 24:130–139

    Article  MathSciNet  MATH  Google Scholar 

  • Wu H, Wu N, Tsai C, Hwang M (2005) Image steganographic scheme based on pixel-value differencing and LSB replacement methods. Proc Vis Image Signal Process 152:611–615

    Article  Google Scholar 

  • Xia Z, Li X (2017) Coverless information hiding method based on LSB of the character’s unicode. J Internet Technol 18(6):1353–1360

    Google Scholar 

  • Xiong L, Xu Z, Shi Y (2017) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimension Syst Signal Process 29(3):1191–1202

    Article  MathSciNet  Google Scholar 

  • Yin Z, Niu X, Zhang X, Tang J, Luo B (2017b) Reversible data hiding in encrypted AMBTC compressed images. In: Multimedia tools and applications, pp 436–445

  • Yin Z, Niu X, Zhou Z, Tang J, Luo B (2017a) Improved reversible image authentication scheme. Cogn Comput 8(5):890–899

    Article  Google Scholar 

  • Yuan C, Xia Z, Sun X (2016) Coverless image steganography based on SIFT and BOF. J Internet Technol 18:209–216

    Google Scholar 

  • Zhou Z, Sun X, Chen X, Chang C, Fu Z (2014) A novel signature based on combination of global and local signatures for image copy detection. Secur Commun Netw 7(11):1702–1711

    Article  Google Scholar 

  • Zhou Z, Sun H, Harit R, Chen X, Sun X (2015) Coverless image steganography without embedding. In: International conference on cloud computing and security, Nanjing, China, pp 123–132

  • Zhou Z, Cao Y, Sun X (2016a) Coverless information hiding based on bag-of-words model of image. J Appl Sci 34:527–536

    Google Scholar 

  • Zhou Z, Wang Y, Wu Q, Yang C, Sun X (2016b) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12:48–63

  • Zhou Z, Yang C, Chen B, Sun X, Liu Q, Wu Q (2016c) Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans Inf Syst E99.D(6):1531–1540

  • Zhou Z, Wu Q, Yang C, Sun X, Pan Z (2017a) Coverless image steganography based on histograms of oriented gradients-based hashing algorithm. J Internet Technol 18(5):1177–1184

    Google Scholar 

  • Zhou Z, Wu Q, Huang F, Sun X (2017b) Fast and accurate near-duplicate image elimination for visual sensor networks. Int J Distrib Sens Netw 13(2):1–12

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported, in part, by the National Natural Science Foundation of China under grant numbers 61602253, U1536206, 61232016, U1405254, 61373132, 61373133, 61502242, 61572258, and 61672294; in part, by the Jiangsu Basic Research Programs-Natural Science Foundation under grant numbers BK20150925 and BK20151530; in part, by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund; and in part, by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Q. M. Jonathan Wu.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, Z., Mu, Y. & Wu, Q.M.J. Coverless image steganography using partial-duplicate image retrieval. Soft Comput 23, 4927–4938 (2019). https://doi.org/10.1007/s00500-018-3151-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3151-8

Keywords

Navigation