Coverless Image Steganography: A Survey

With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of...

Full description

Bibliographic Details
Main Authors: Jiaohua Qin, Yuanjing Luo, Xuyu Xiang, Yun Tan, Huajun Huang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8911367/
_version_ 1818347886159593472
author Jiaohua Qin
Yuanjing Luo
Xuyu Xiang
Yun Tan
Huajun Huang
author_facet Jiaohua Qin
Yuanjing Luo
Xuyu Xiang
Yun Tan
Huajun Huang
author_sort Jiaohua Qin
collection DOAJ
description With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of information security recently. Different from the traditional image steganography, coverless image steganography does not need to employ the designated cover image for embedding the secret data but directly transfers secret information through its own properties such as pixel brightness value, color, texture, edge, contour and high-level semantics. Therefore, it radically resist the detection of steganalysis tools and significantly improves the security of the image. Its basic idea is to analyze the attributes of the image and map them to the secret information according to certain rules based on the characteristics of the attributes. This paper includes more than 50 key contributions to provide a comprehensive survey in this field, covers the main aspects of coverless image steganography research: the fundamental frameworks, pre-processing, feature extraction, generation of hash sequence and mapping relationships. The existing methods are evaluated and the prospect of future work is also summarized.
first_indexed 2024-12-13T17:41:17Z
format Article
id doaj.art-030aff569de74b438f9323f1ac377693
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T17:41:17Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-030aff569de74b438f9323f1ac3776932022-12-21T23:36:44ZengIEEEIEEE Access2169-35362019-01-01717137217139410.1109/ACCESS.2019.29554528911367Coverless Image Steganography: A SurveyJiaohua Qin0https://orcid.org/0000-0002-7549-7731Yuanjing Luo1https://orcid.org/0000-0001-9924-1100Xuyu Xiang2https://orcid.org/0000-0002-2778-7531Yun Tan3https://orcid.org/0000-0002-9855-8234Huajun Huang4https://orcid.org/0000-0002-0334-6600College of Computer Science and Information Technology, Central South University of Forestry and Technology, Changsha, ChinaCollege of Computer Science and Information Technology, Central South University of Forestry and Technology, Changsha, ChinaCollege of Computer Science and Information Technology, Central South University of Forestry and Technology, Changsha, ChinaCollege of Computer Science and Information Technology, Central South University of Forestry and Technology, Changsha, ChinaSchool of Information Technology and Management, Hunan University of Finance and Economics, Changsha, ChinaWith the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of information security recently. Different from the traditional image steganography, coverless image steganography does not need to employ the designated cover image for embedding the secret data but directly transfers secret information through its own properties such as pixel brightness value, color, texture, edge, contour and high-level semantics. Therefore, it radically resist the detection of steganalysis tools and significantly improves the security of the image. Its basic idea is to analyze the attributes of the image and map them to the secret information according to certain rules based on the characteristics of the attributes. This paper includes more than 50 key contributions to provide a comprehensive survey in this field, covers the main aspects of coverless image steganography research: the fundamental frameworks, pre-processing, feature extraction, generation of hash sequence and mapping relationships. The existing methods are evaluated and the prospect of future work is also summarized.https://ieeexplore.ieee.org/document/8911367/Steganographycoverless image steganographyinformation hidinginformation security
spellingShingle Jiaohua Qin
Yuanjing Luo
Xuyu Xiang
Yun Tan
Huajun Huang
Coverless Image Steganography: A Survey
IEEE Access
Steganography
coverless image steganography
information hiding
information security
title Coverless Image Steganography: A Survey
title_full Coverless Image Steganography: A Survey
title_fullStr Coverless Image Steganography: A Survey
title_full_unstemmed Coverless Image Steganography: A Survey
title_short Coverless Image Steganography: A Survey
title_sort coverless image steganography a survey
topic Steganography
coverless image steganography
information hiding
information security
url https://ieeexplore.ieee.org/document/8911367/
work_keys_str_mv AT jiaohuaqin coverlessimagesteganographyasurvey
AT yuanjingluo coverlessimagesteganographyasurvey
AT xuyuxiang coverlessimagesteganographyasurvey
AT yuntan coverlessimagesteganographyasurvey
AT huajunhuang coverlessimagesteganographyasurvey