Table of Content

Open Access

ARTICLE

Coverless Steganography for Digital Images Based on a Generative Model

Xintao Duan1,*, Haoxian Song1, Chuan Qin2, Muhammad Khurram Khan3
1 Henan Normal University, Xinxiang, Henan 453007, China.
2 University of Shanghai for Science and Technology, Shanghai 200093, China.
3 Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh, Saudi Arabia.
* Corresponding Author: Xintao Duan. Email: .

Computers, Materials & Continua 2018, 55(3), 483-493. https://doi.org/ 10.3970/cmc.2018.01798

Abstract

In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the secret image. The generated image is then transmitted to the receiver and fed to the generative model database to generate another image visually the same as the secret image. Thus, we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the transmission of the secret image. This is the first time to propose the coverless image information steganographic scheme based on generative model, compared with the traditional image steganography. The transmitted image is not embedded with any information of the secret image in this method, therefore, can effectively resist steganalysis tools. Experimental results show that our scheme has high capacity, security and reliability.

Keywords

Generative model, coverless image steganography, steganalysis, steganographic capacity, security.

Cite This Article

. , "Coverless steganography for digital images based on a generative model," Computers, Materials & Continua, vol. 55, no.3, pp. 483–493, 2018.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1834

    View

  • 909

    Download

  • 0

    Like

Related articles

Share Link

WeChat scan