2019
DOI: 10.1109/access.2019.2955452
|View full text |Cite
|
Sign up to set email alerts
|

Coverless Image Steganography: A Survey

Abstract: With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of information security recently. Different from the traditional image steganography, coverless image steganography does not need to employ the designated cover image for embedding the secret data but directly transfe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 86 publications
(28 citation statements)
references
References 43 publications
0
28
0
Order By: Relevance
“…Coverless information hiding technology can not mean it does not need carriers. Compared with traditional information hiding technology, it is directly driven by "secret information" to "generate/obtain" stego carriers [21]. [22] proposed a coverless information hiding method based on the image bag-of-words (BOW) model [23].…”
Section: Related Workmentioning
confidence: 99%
“…Coverless information hiding technology can not mean it does not need carriers. Compared with traditional information hiding technology, it is directly driven by "secret information" to "generate/obtain" stego carriers [21]. [22] proposed a coverless information hiding method based on the image bag-of-words (BOW) model [23].…”
Section: Related Workmentioning
confidence: 99%
“…As can be seen from Table 2, our capacity, which is maintained at an appropriate level and obtained by robustness experiments in Section 4.2, is consistent with PIX-CIS and BOF-CIS. HASH-CIS has the maximum capacity, but it requires at least 2 18 images which is not realistic. DWT-CIS is consistent with DCT-CIS, and they both can adjust the capacity according to the situation.…”
Section: Analysis Of Capacitymentioning
confidence: 99%
“…[16], Liu et al [17] use a preselection scheme based on DenseNet feature selected images and robust hash sequence generated by DWT transform, which effectively improves robustness and security. Then, Qin et al [18] publish a survey of coverless information hiding to summarize the existing methods of CIS. Meanwhile, Zhou et al [19] used a set of appropriate similar blocks of a given secret image as steganographic images to transmit the hidden image.…”
Section: Introductionmentioning
confidence: 99%
“…As for information hiding, this paper proposes a novel coverless information hiding technology [26], named the Top Three Most Significant Bit plan (TTMSB) information hiding method. It uses double keys to map the secret information with the top three bits of the cover image fragment average pixel, so as to realize the secret information hiding.…”
Section: A Data Classificationmentioning
confidence: 99%