Coverless Information Hiding Algorithm Based on Image Classification

Wu Jianbin, Kang Ziyang, Liu Yiwen, Ge Shuangkui, Wu Jianping


 In order to improve the data embedding capacity and the communication efficiency of coverless information hiding algorithm, addressing the advantages of semi-structured coverless information hiding algorithm,this paper introduces a semi-structured coverless information hiding algorithm based on the behavioral habits of social platforms. The specific idea of the algorithm is to build a one-to-one mapping relationship between icons and secret messages in a small icon library. According to certain principles,some small icons are montaged a picture, the secret information can be expressed by the splicing picture, and the transmission of secret messages is realized by delivering the spliced pictures. In order to improve the recognition rate of small icons and the anti-interference ability of the whole hidden communication system, convolutional neural network is also introduced to train and classify the icons in the icon library, and the interference samples are introduced as training samples set. The experimental results show that the algorithm has good anti-attack ability and the hiding capacity can be improved, and therefore, the algorithm can be used in covert communication.



Keywords:  deep learning,  image classification,  behavioral habits,  steganography,  coverless information hiding

Full Text:



SHEN C X,ZHANG H G,FENG D G. Overview of cyber security[J]. Science In China,2007,37(2):129—150 (In Chinese)

INAS J K,PRASHAN P,VIAL P,et al. Comprehensive survey of image steganography:techniques,evaluations,and trends in future research[J]. Neurocomputing,2018,335:299—326.

ZHOU Z L,SUN H Y,HARIT R,et al. Coverless image steganograph without embedding [C]// International Conference on Cloud Computing and Security. Springer,Cham:Springer,2015:123— 132.

ZHANG X P,QIAN Z X,LI S .Prospect of digital steganographyresearch [J]. Journal of Applied Sciences,2016,34(5):476—484. (In Chinese)

LIU J,YUAN Q,WU G,et al. Review of convolutional neural networks[J].Computer Era,2018,11:19—23.(In Chinese)

KRIZHEVSKY A,SUTSKEVER I,HINTON G E. ImageNet classitions of the ACM,2017,60(6):84—90.

ZEGEDY C,LIU W,JIA Y Q,et al. Going deeper with convolutions.[C]//Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition. Boston,MA:IEEE,2015:1—9.

SIMONYAN K,ZISSERMAN A. Very deep convolutional networks for large-scale image recognition[C]//The Hilton San Diego Resort & Spa. San Diego:ICLR,2015:1—14.

RAN P,WANG L,LI X,et al. Improved Softmax classifier for deep convolution neural networks and its application in face recognition [J]. Journal of Shanghai University (Natural Science),2018,24(3):353—366.(In Chinese)

JIANG A B,WANG W W. Research on optimization of ReLU activation function [J]. Transducer and Microsystem Technologies, 2018,37(2):50—52.(In Chinese)

ZHOU L Y,XIE X Y,LIU Z J,et al. Research on pooling method of convolution neural network [J]. Computer Engineering,2019,45(4):211—216.(In Chinese)

LIU X P,LUAN X,XIE Y X,et al. Transfer learning research and algorithm review[J]. Journal of Changsha University,2018,32(5): 29—36.(In Chinese)

TAN Y L. Principle of image information system[M]. Beijing:Tsinghua University Press,2006:326—335.(In Chinese)

KEKRE H B,SARODE T K,THEPADE S D. Color-texture feature based image retrieval using DCT applied on Kekre's median codebook[J]. International Journal of Imaging & Robotics TM,2009,2(9):54—65.

WANG G P,DUAN M,NIU C Y. Stochastic gradient descent algorithm based on convolution neural network [J].Computer Engineering and Desigh,2018,39(2):442—462.(In Chinese)

WU J B,FEI X X,WANG N F. Zero-steganography algorithm research based on chaotic sequences and image DCT transform[J]. Electronic Measurement Technology,2017,40 (5):174—179.(In Chinese)

BILAL M,IMTIAZ S,ABDUL W,et al. Chaos based Zero - steganography algorithm [J]. Multimedia Tools & Applications, 2014,72(2):1073—1079.

SINGH S,SIDDIQUI T J. A security enhanced robust steganogra原 phy algorithm for data hiding[J]. International Journal of Computer Science Issues,2012,9(3):131—139.

WU J B,LIU Y W,DAI Z Y,et al. A coverless information hiding algorithm based on grayscale gradient co-occurrence matrix[J]. IETE Technical Review,2018,35:23—33.

WU J B,JIA Y K,LIU Y W. Coverless information hiding algorithm based on image coding and stitching[J]. Journal of South China University of Technology (Nature Science Edition),2018,46(5): 32—39.(In Chinese)


  • There are currently no refbacks.