4.6 Article

Coverless Image Steganography: A Survey

Journal

IEEE ACCESS
Volume 7, Issue -, Pages 171372-171394

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2019.2955452

Keywords

Steganography; coverless image steganography; information hiding; information security

Funding

  1. National Natural Science Foundation of China [61772561]
  2. Key Research and Development Plan of Hunan Province [2018NK2012]
  3. Science Research Projects of Hunan Provincial Education Department [18A174]
  4. Degree and Postgraduate Education Reform Project of Hunan Province [209]
  5. Postgraduate Education and Teaching Reform Project of Central South Forestry University [2019JG013]

Ask authors/readers for more resources

With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of information security recently. Different from the traditional image steganography, coverless image steganography does not need to employ the designated cover image for embedding the secret data but directly transfers secret information through its own properties such as pixel brightness value, color, texture, edge, contour and high-level semantics. Therefore, it radically resist the detection of steganalysis tools and significantly improves the security of the image. Its basic idea is to analyze the attributes of the image and map them to the secret information according to certain rules based on the characteristics of the attributes. This paper includes more than 50 key contributions to provide a comprehensive survey in this field, covers the main aspects of coverless image steganography research: the fundamental frameworks, preprocessing, feature extraction, generation of hash sequence and mapping relationships. The existing methods are evaluated and the prospect of future work is also summarized.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available