Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping

Q Liu, X Xiang, J Qin, Y Tan, J Tan, Y Luo - Knowledge-Based Systems, 2020 - Elsevier
Recently, researches have shown that coverless image steganography can resist the
existing steganalysis tools effectively. On this basis, a novel coverless image steganography …

Novel coverless steganography method based on image selection and StarGAN

X Chen, Z Zhang, A Qiu, Z Xia… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the development of steganalysis technology keeps progressing, the traditional image
steganography has confronted some security bottleneck, as the secret embedding method …

Robust coverless image steganography based on DCT and LDA topic classification

X Zhang, F Peng, M Long - IEEE Transactions on Multimedia, 2018 - ieeexplore.ieee.org
In order to improve the robustness and capability of resisting image steganalysis, a novel
coverless image steganography algorithm based on discrete cosine transform and latent …

Coverless image steganography based on generative adversarial network

J Qin, J Wang, Y Tan, H Huang, X Xiang, Z He - Mathematics, 2020 - mdpi.com
Traditional image steganography needs to modify or be embedded into the cover image for
transmitting secret messages. However, the distortion of the cover image can be easily …

Coverless image steganography: a survey

J Qin, Y Luo, X Xiang, Y Tan, H Huang - IEEE access, 2019 - ieeexplore.ieee.org
With the digitalization of information, a lot of multimedia data are under attack, information
security has become a key issue of public concern. Image steganography, aiming at using …

Coverless image steganography without embedding

Z Zhou, H Sun, R Harit, X Chen, X Sun - Cloud Computing and Security …, 2015 - Springer
The traditional image steganography technologies designate a cover image and embed
secret data into it to form the stego-image. However, the modification traces caused by the …

Coverless information hiding based on robust image hashing

S Zheng, L Wang, B Ling, D Hu - … , ICIC 2017, Liverpool, UK, August 7-10 …, 2017 - Springer
Traditional image steganography modifies the content of the image more or less, it is hard to
resist the detection of image steganalysis tools. New kind of steganography methods …

Coverless image steganography based on multi-object recognition

Y Luo, J Qin, X Xiang, Y Tan - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
Most of the existing coverless steganography approaches have poor robustness to
geometric attacks, because these approaches use features of the entire image to map …

Coverless image steganography using partial-duplicate image retrieval

Z Zhou, Y Mu, QMJ Wu - Soft Computing, 2019 - Springer
Most of the existing image steganographic approaches embed the secret information
imperceptibly into a cover image by slightly modifying its content. However, the modification …

A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network

X Duan, D Guo, N Liu, B Li, M Gou, C Qin - IEEE Access, 2020 - ieeexplore.ieee.org
Image steganography is a technology that hides sensitive information into an image. The
traditional image steganography method tends to securely embed secret information in the …