Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 34, Issue 3 (2023)
  4. A Robust and High-Capacity Coverless Inf ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory
Volume 34, Issue 3 (2023), pp. 449–464
Kurnia Anggriani   Shu-Fen Chiou   Nan-I Wu   Min-Shiang Hwang  

Authors

 
Placeholder
https://doi.org/10.15388/23-INFOR521
Pub. online: 15 June 2023      Type: Research Article      Open accessOpen Access

Received
1 January 2023
Accepted
1 May 2023
Published
15 June 2023

Abstract

Many confidential multimedia, such as personal privacy, commercial, and military secrets, are transmitted on the Internet. To prevent this confidential multimedia from being eavesdropped on by illegal users, information-hiding technology is a leading research topic nowadays. One of the important research topics of information-hiding technology is coverless information hiding, which utilizes the unchanged property of its multimedia carrier to hide secret information. In this paper, we propose two schemes that employ the average pixel value of an image. The first is an extension of the Coverless Information Hiding Based on the Most Significant Bit (CIHMSB) scheme, referred to as E-CIHMSB. In the E-CIHMSB, we build an extended matrix containing the image fragment’s average pixel value. The second scheme is a combination theory-based CIHMSB, referred to as CB-CIHMSB. In the CB-CIHMSB, we construct the combined matrix. E-CIHMSB and CB-CIHMSB embed the secret bits by changing the most significant bits of the chosen pixel in the matrix. Experimental results show that our schemes achieved higher hiding capacity than previous related schemes. Moreover, the proposed scheme is more robust against steganalysis tools and image quality attacks such as Additive Gaussian White Noise (AWGN), Salt & Pepper noise, low-pass filtering attacks, and JPEG compression attacks than CIHMSB.

References

 
Anggriani, K., Wu, N.-I., Hwang, M.-S. (2023a). Research on coverless image steganography. International Journal of Network Security, 25(1), 25–31. https://doi.org/10.6633/IJNS.202301_25(1).03.
 
Anggriani, K., Chiou, S.-F., Wu, N.-I., Hwang, M.-S. (2023b). A high-capacity coverless information hiding based on the lowest and highest image fragments. Electronics, 12, 395. https://doi.org/10.3390/electronics12020395.
 
Chen, X., Zhang, Z., Qiu, A., Xia, Z., Xiong, N.N. (2022). Novel coverless steganography method based on image selection and StarGAN. IEEE Transactions on Network Science and Engineering, 9(1), 219–230. https://doi.org/10.1109/TNSE.2020.3041529.
 
Cogranne, R., Giboulot, Q., Bas, P. (2022). Efficient steganography in JPEG images by minimizing performance of optimal detector. IEEE Transactions on Information Forensics and Security, 17, 1328–1343. https://doi.org/10.1109/TIFS.2021.3111713.
 
Coleti, T.A., Luiz, P., Corrêa, P., Vilela, L., Filgueiras, L., Morandini, M. (2020). TR-model. A metadata profile application for personal data transparency. IEEE Access, 8, 75184–75209. https://doi.org/10.1109/ACCESS.2020.2988566.
 
Iwaya, L.H., Ahmad, A., Babar, M.A. (2020). Security and privacy for mHealth and uHealth systems: a systematic mapping study. IEEE Access, 8, 150081–150112. https://doi.org/10.1109/ACCESS.2020.3015962.
 
Liang, Y., Quan, D., Wang, F., Jia, X., Li, M., Li, T. (2020). Financial big data analysis and early warning platform: a case study. IEEE Access, 8, 36515–36526. https://doi.org/10.1109/ACCESS.2020.2969039.
 
Liu, Q., Xiang, X., Qin, J., Tan, Y., Zhang, Q. (2022). A robust coverless steganography scheme using camouflage image. IEEE Transactions on Circuits and Systems for Video Technology, 32(6), 4038–4051. https://doi.org/10.1109/TCSVT.2021.3108772.
 
Liu, X., Li, Z., Ma, J., Zhang, W., Zhang, J., Ding, Y. (2022). Robust coverless steganography using limited mapping images. Journal of King Saud University – Computer and Information Sciences, 34(7), 4472–4482. https://doi.org/10.1016/j.jksuci.2022.05.012.
 
Liu, Y., Ni, J., Zhang, W., Huang, J. (2022). A novel video steganographic scheme incorporating the consistency degree of motion vectors. IEEE Transactions on Circuits and Systems for Video Technology, 32(7), 4905–4910. https://doi.org/10.1109/TCSVT.2021.3135384.
 
Long, Y., Liu, Y., Zhang, Y., Ba, X., Qin, J. (2019). Coverless information hiding method based on web text. IEEE Access, 7, 31926–31933. https://doi.org/10.1109/ACCESS.2019.2901260.
 
Luo, Y., Qin, J., Xiang, X., Tan, Y. (2021). Coverless image steganography based on multi-object recognition. IEEE Transactions on Circuits and Systems for Video Technology, 31(7), 2779–2791. https://doi.org/10.1109/TCSVT.2020.3033945.
 
Mahmoud, M.M., Elshoush, H.T. (2022). Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography—an innovative approach. IEEE Access, 10, 29954–29971. https://doi.org/10.1109/ACCESS.2022.3155146.
 
Mstafa, R.J., Younis, Y.M., Hussein, H.I., Atto, M. (2020). A new video steganography scheme based on Shi-Tomasi corner detector. IEEE Access, 8, 161825–161837. https://doi.org/10.1109/ACCESS.2020.3021356.
 
Oh, H., Park, S., Lee, G.M., Heo, H., Choi, J.K. (2019). Personal data trading scheme for data brokers in IoT data marketplaces. IEEE Access, 7, 40120–40132. https://doi.org/10.1109/ACCESS.2019.2904248.
 
Peng, F., Chen, G., Long, M. (2022). A robust coverless steganography based on generative adversarial networks and gradient descent approximation. IEEE Transactions on Circuits and Systems for Video Technology, 32(9), 5817–5829. https://doi.org/10.1109/TCSVT.2022.3161419.
 
Qin, J., Luo, Y., Xiang, X., Tan, Y., Huang, H. (2019). Coverless image steganography: a survey. IEEE Access, 7, 171372–171394. https://doi.org/10.1109/ACCESS.2019.2955452.
 
Saad, A.H.S., Mohamed, M.S., Hafez, E.H. (2021). Coverless image steganography based on optical mark recognition and machine learning. IEEE Access, 9, 16522–16531. https://doi.org/10.1109/ACCESS.2021.3050737.
 
Stillman, R.B., Defiore, C.R. (1980). Computer security and networking protocols: technical issues in military data communications networks. IEEE Transactions on Communications, 28(9), 1472–1477. https://doi.org/10.1109/TCOM.1980.1094838.
 
Wang, K., Gao, Q. (2019). A coverless plain text steganography based on character features. IEEE Access, 7, 95665–95676. https://doi.org/10.1109/ACCESS.2019.2929123.
 
Wang, J., Jia, X., Kang, X., Shi, Y.-Q. (2019). A cover selection HEVC video steganography based on intra prediction mode. IEEE Access, 7, 119393–119402. https://doi.org/10.1109/ACCESS.2019.2936614.
 
Yang, L., Deng, H., Dang, X. (2020). A novel coverless information hiding method based on the most significant bit of the cover image. IEEE Access, 8, 108579–108591. https://doi.org/10.1109/ACCESS.2020.3000993.
 
Yi, X., Yang, K., Zhao, X., Member, S., Wang, Y., Yu, H. (2019). AHCM: adaptive Huffman code mapping for audio steganography based on psychoacoustic model. IEEE Transactions on Information Forensics and Security, 14(8), 2217–2231. https://doi.org/10.1109/TIFS.2019.2895200.
 
Zhang, X., Peng, F., Long, M. (2018). Robust coverless image steganography based on DCT and LDA topic classification. IEEE Transactions on Multimedia, 20(12), 3223–3238. https://doi.org/10.1109/TMM.2018.2838334.
 
Zhou, Z., Cao, Y., Wang, M., Fan, E., Wu, Q.M.J. (2019). Faster-RCNN based robust coverless information hiding system in cloud environment. IEEE Access, 7, 179891–179897. https://doi.org/10.1109/ACCESS.2019.2955990.
 
Zhou, Z., Su, Y., Zhang, Y., Xia, Z., Du, S., Gupta, B.B., Qi, L. (2022). Coverless information hiding based on probability graph learning for secure communication in IoT environment. IEEE Internet of Things Journal, 9(12), 9332–9341. https://doi.org/10.1109/JIOT.2021.3103779.

Biographies

Anggriani Kurnia

K. Anggriani received her BS degree in informatics from University of Bengkulu, Indonesia, in 2011, and the MS degree in informatics from Bandung Institute of Technology, Indonesia, in 2014. She is a lecturer at the Department of Information System, Engineering Faculty, University of Bengkulu, Indonesia. Currently, she is pursuing her PhD degree in Asia University, Taiwan. Her current research interests include steganography and image processing.

Chiou Shu-Fen

S.-F. Chiou received the BBA degree in information management from National Taichung Institute of Technology, Taichung, Taiwan, ROC, in 2004. She studied for a MS degree in computer science and engineering at the National Chung Hsing University for one year, and then started to pursue her PhD degree. She received her PhD in computer science and engineering from National Chung Hsing University in 2012. She is currently an assistant professor in the Department of Information Management, National Taichung University of Science and Technology. Her current research interests include information security, network security, data hiding, text mining and big data analysis.

Wu Nan-I

N.-I Wu received his PhD from the Institute of Computer Science and Engineering, Nation Chung Hsing University (NCHU), Taichung, Taiwan 2009. From 2010 to 2011, he was a post-doctoral research fellow at the Academia Sinica Institute of Information Science. He was an assistant professor at the Department of Animation and Game Design, TOKO University (Taiwan), during 2011–2018, and an associate professor during 2018–2019. He was an associate professor at the Department of Digital Multimedia, Lee-Ming Institute of Technology (Taiwan) during 2019–2023. Now he is an associate professor at the Department of Information Management, Lunghwa University of Science and Technology (Taiwan) since 2023 and also the director of the eSports Training Centre since 2020. His current research interests include game design, eSports training/management, multimedia processing, multimedia security, data hiding, and privacy-preserving. He published over ten international journal papers (SCI) and conference papers.

Hwang Min-Shiang
mshwang@asia.edu.tw

N.-I Wu received his PhD from the Institute of Computer Science and Engineering, Nation Chung Hsing University (NCHU), Taichung, Taiwan 2009. From 2010 to 2011, he was a post-doctoral research fellow at the Academia Sinica Institute of Information Science. He was an assistant professor at the Department of Animation and Game Design, TOKO University (Taiwan), during 2011–2018, and an associate professor during 2018–2019. He was an associate professor at the Department of Digital Multimedia, Lee-Ming Institute of Technology (Taiwan) during 2019–2023. Now he is an associate professor at the Department of Information Management, Lunghwa University of Science and Technology (Taiwan) since 2023 and also the director of the eSports Training Centre since 2020. His current research interests include game design, eSports training/management, multimedia processing, multimedia security, data hiding, and privacy-preserving. He published over ten international journal papers (SCI) and conference papers.


Full article Related articles Cited by PDF XML
Full article Related articles Cited by PDF XML

Copyright
© 2023 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
coverless information hiding image data hiding image steganography most significant bit

Metrics
since January 2020
513

Article info
views

227

Full article
views

321

PDF
downloads

64

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy