Coverless Image Steganography: Review
Keywords:Image steganography, coverless, Stego-image, Security
Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem. Unlike traditional techniques, which alter the carrier, a coverless information hiding procedure does not change it. This paper reviews some of the recent works that have been conducted on the topic of coverless image steganography and provides an important insight into how these techniques are performed.
Abbood, E. A., Neamah, R. M., Abdulkadhm, S. J. I. J. o. E., & Engineering, C. (2018). Text in Image Hiding using Developed LSB and Random Method. 8(4).
Al Hussien, S. S., Mohamed, M. S., & Hafez, E. H. J. I. A. (2021). Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning. 9, 16522-16531.
Bokhari, M. U., & Shallal, Q. M. J. I. J. o. C. A. (2016). A review on symmetric key encryption techniques in cryptography. 147(10).
Bruce, S. (1996). Applied cryptography: protocols, algorithms, and source code in C. In: Wiley.
Chen, X., Qiu, A., Sun, X., Wang, S., Wei, G. J. M. B., & Engineering. (2019). A high-capacity coverless image steganography method based on double-level index and block matching. 16(5), 4708-4722.
Chen, X., Sun, H., Tobe, Y., Zhou, Z., & Sun, X. (2015). Coverless information hiding method based on the Chinese mathematical expression. Paper presented at the International Conference on Cloud Computing and Security.
Chutani, S., Goyal, A. J. M. T., & Applications. (2019). A review of forensic approaches to digital image Steganalysis. 78(13), 18169-18204.
Duan, X., & Song, H. J. a. p. a. (2018). Coverless information hiding based on generative model.
Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications: Cambridge University Press.
Ge, H., Huang, M., & Wang, Q. (2011). Steganography and steganalysis based on digital image. Paper presented at the 2011 4th International Congress on Image and Signal Processing.
Govindasamy, V., Sharma, A., & Thanikaiselvan, V. (2020). Coverless Image Steganography using Haar Integer Wavelet Transform. Paper presented at the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC).
Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K.-H. J. S. P. I. C. (2018). Image steganography in spatial domain: A survey. 65, 46-66.
Johnson, N. F., & Jajodia, S. J. C. (1998). Exploring steganography: Seeing the unseen. 31(2), 26-34.
Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. J. N. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. 335, 299-326.
Kour, J., Verma, D. J. I. J. o. E. R. i. M., & Technology. (2014). Steganography techniques–A review paper. 3(5), 132-135.
Laishram, D., & Tuithung, T. (2018). A survey on digital image steganography: current trends and challenges. Paper presented at the proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT).
Li, Q., Wang, X., Wang, X., & Shi, Y. J. N. P. L. (2021). CCCIH: Content-consistency Coverless Information Hiding Method Based on Generative Models. 53(6), 4037-4046.
Lin, I.-C., Lin, Y.-B., Wang, C.-M. J. C. S., & Interfaces. (2009). Hiding data in spatial domain images with distortion tolerance. 31(2), 458-464.
Liu, Q., Xiang, X., Qin, J., Tan, Y., Qiu, Y. J. E. J. o. I., & Processing, V. (2020). Coverless image steganography based on DenseNet feature mapping. 2020(1), 1-18.
Liu, Q., Xiang, X., Qin, J., Tan, Y., Tan, J., & Luo, Y. J. K.-B. S. (2020). Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. 192, 105375.
Liu, X., Ma, Z., Guo, X., Hou, J., Schaefer, G., Wang, L., . . . Fang, H. (2020). Camouflage generative adversarial network: Coverless full-image-to-image hiding. Paper presented at the 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
Lou, D.-C., & Sung, C.-H. J. I. T. o. M. (2004). A steganographic scheme for secure communications based on the chaos and Euler theorem. 6(3), 501-509.
Lowe, D. G. J. I. j. o. c. v. (2004). Distinctive image features from scale-invariant keypoints. 60(2), 91-110.
Luo, Y., Qin, J., Xiang, X., Tan, Y., Liu, Q., & Xiang, L. J. J. o. R.-T. I. P. (2020). Coverless real-time image information hiding based on image block matching and dense convolutional network. 17(1), 125-135.
Maitra, I. K. J. J. o. G. R. i. C. S. (2011). Digital steganalysis: Review on recent approaches. 2(1).
OMRAN, N. F., MAHMOUD, N. R., ALI, A. A. J. T. J. o. C., & Education, M. (2022). Securing Messages by Using Coverless Steganography: A Survey. 13(2), 335-345.
Pan, N., Qin, J., Tan, Y., Xiang, X., Hou, G. J. E. J. o. I., & Processing, V. (2020). A video coverless information hiding algorithm based on semantic segmentation. 2020(1), 1-18.
Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G. J. P. o. t. I. (1999). Information hiding-a survey. 87(7), 1062-1078.
Pramanik, S., Singh, R., Ghosh, R. J. I. J. o. E. E., & Science, C. (2019). A new encrypted method in image steganography. 14(3), 1412-1419.
Provos, N., Honeyman, P. J. I. s., & privacy. (2003). Hide and seek: An introduction to steganography. 1(3), 32-44.
Qin, J., Luo, Y., Xiang, X., Tan, Y., & Huang, H. J. I. A. (2019). Coverless image steganography: a survey. 7, 171372-171394.
Qiu, A., Chen, X., Sun, X., Wang, S., Guo, W. J. J. o. I. H., & Protection, P. (2019). Coverless image steganography method based on feature selection. 1(2), 49.
Saha, B., & Sharma, S. J. D. S. J. (2012). Steganographic techniques of data hiding using digital images. 62(1), 11.
Saranya, K., Mohanapriya, R., Udhayan, J. J. I. J. o. S., Engineering, & Research, T. (2014). A review on symmetric key encryption techniques in cryptography. 3(3), 539-544.
Sharda, S., Budhiraja, S. J. I. J. o. E. T., & Engineering, A. (2013). Image steganography: A review. 3(1), 707-710.
Shen, C., Zhang, H., Feng, D., Cao, Z., & Huang, J. J. S. i. C. S. F. I. S. (2007). Survey of information security. 50(3), 273-298.
Stefan, K., & Fabien AP, P. (2000). Information hiding techniques for steganography and digital watermarking. In: Artech House.
Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. J. I. A. (2021). Image steganography: A review of the recent advances.
Swanson, M. D., Kobayashi, M., & Tewfik, A. H. J. P. o. t. I. (1998). Multimedia data-embedding and watermarking technologies. 86(6), 1064-1087.
Tan, Y., Qin, J., Xiang, X., Ma, W., Pan, W., & Xiong, N. N. J. I. A. (2019). A robust watermarking scheme in YCbCr color space based on channel coding. 7, 25026-25036.
Verma, N. (2011). Review of steganography techniques. Paper presented at the Proceedings of the international conference & workshop on emerging trends in technology.
Wang, S.-Z., Zhang, X.-P., & Zhang, W.-M. J. C. j. o. c. (2009). Recent Advances in Image Based Steganalysis Research [J]. 32(7), 1247-1263.
Yang, L., Deng, H., & Dang, X. J. I. A. (2020). A novel coverless information hiding method based on the most significant bit of the cover image. 8, 108579-108591.
Zhang, X., Peng, F., & Long, M. J. I. T. o. M. (2018). Robust coverless image steganography based on DCT and LDA topic classification. 20(12), 3223-3238.
Zheng, S., Wang, L., Ling, B., & Hu, D. (2017). Coverless information hiding based on robust image hashing. Paper presented at the International conference on intelligent computing.
Zhou, Z., Mu, Y., & Wu, Q. J. J. S. C. (2019). Coverless image steganography using partial-duplicate image retrieval. 23(13), 4927-4938.
Zhou, Z., Sun, H., Harit, R., Chen, X., & Sun, X. (2015). Coverless image steganography without embedding. Paper presented at the International Conference on Cloud Computing and Security.
Zou, L., Sun, J., Gao, M., Wan, W., Gupta, B. B. J. M. t., & applications. (2019). A novel coverless information hiding method based on the average pixel value of the sub-images. 78(7), 7965-7980.
How to Cite
Copyright (c) 2022 Academic Journal of Nawroz University
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.