Coverless Image Steganography: Review


  • Shler Farhad Khorshid Department of Information Technology, Duhok Polytechnic University, Duhok, Iraq
  • Wafaa Mustafa Abdullah Department of Information Technology Management, Duhok Polytechnic University, Duhok, Iraq and Department of Computer Science, Nawroz University, Duhok, Iraq



Image steganography, coverless, Stego-image, Security


Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem. Unlike traditional techniques, which alter the carrier, a coverless information hiding procedure does not change it. This paper reviews some of the recent works that have been conducted on the topic of coverless image steganography and provides an important insight into how these techniques are performed.


Download data is not yet available.


Abbood, E. A., Neamah, R. M., Abdulkadhm, S. J. I. J. o. E., & Engineering, C. (2018). Text in Image Hiding using Developed LSB and Random Method. 8(4).

Al Hussien, S. S., Mohamed, M. S., & Hafez, E. H. J. I. A. (2021). Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning. 9, 16522-16531.

Bokhari, M. U., & Shallal, Q. M. J. I. J. o. C. A. (2016). A review on symmetric key encryption techniques in cryptography. 147(10).

Bruce, S. (1996). Applied cryptography: protocols, algorithms, and source code in C. In: Wiley.

Chen, X., Qiu, A., Sun, X., Wang, S., Wei, G. J. M. B., & Engineering. (2019). A high-capacity coverless image steganography method based on double-level index and block matching. 16(5), 4708-4722.

Chen, X., Sun, H., Tobe, Y., Zhou, Z., & Sun, X. (2015). Coverless information hiding method based on the Chinese mathematical expression. Paper presented at the International Conference on Cloud Computing and Security.

Chutani, S., Goyal, A. J. M. T., & Applications. (2019). A review of forensic approaches to digital image Steganalysis. 78(13), 18169-18204.

Duan, X., & Song, H. J. a. p. a. (2018). Coverless information hiding based on generative model.

Fridrich, J. (2009). Steganography in digital media: principles, algorithms, and applications: Cambridge University Press.

Ge, H., Huang, M., & Wang, Q. (2011). Steganography and steganalysis based on digital image. Paper presented at the 2011 4th International Congress on Image and Signal Processing.

Govindasamy, V., Sharma, A., & Thanikaiselvan, V. (2020). Coverless Image Steganography using Haar Integer Wavelet Transform. Paper presented at the 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC).

Hussain, M., Wahab, A. W. A., Idris, Y. I. B., Ho, A. T., & Jung, K.-H. J. S. P. I. C. (2018). Image steganography in spatial domain: A survey. 65, 46-66.

Johnson, N. F., & Jajodia, S. J. C. (1998). Exploring steganography: Seeing the unseen. 31(2), 26-34.

Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. J. N. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. 335, 299-326.

Kour, J., Verma, D. J. I. J. o. E. R. i. M., & Technology. (2014). Steganography techniques–A review paper. 3(5), 132-135.

Laishram, D., & Tuithung, T. (2018). A survey on digital image steganography: current trends and challenges. Paper presented at the proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT).

Li, Q., Wang, X., Wang, X., & Shi, Y. J. N. P. L. (2021). CCCIH: Content-consistency Coverless Information Hiding Method Based on Generative Models. 53(6), 4037-4046.

Lin, I.-C., Lin, Y.-B., Wang, C.-M. J. C. S., & Interfaces. (2009). Hiding data in spatial domain images with distortion tolerance. 31(2), 458-464.

Liu, Q., Xiang, X., Qin, J., Tan, Y., Qiu, Y. J. E. J. o. I., & Processing, V. (2020). Coverless image steganography based on DenseNet feature mapping. 2020(1), 1-18.

Liu, Q., Xiang, X., Qin, J., Tan, Y., Tan, J., & Luo, Y. J. K.-B. S. (2020). Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. 192, 105375.

Liu, X., Ma, Z., Guo, X., Hou, J., Schaefer, G., Wang, L., . . . Fang, H. (2020). Camouflage generative adversarial network: Coverless full-image-to-image hiding. Paper presented at the 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

Lou, D.-C., & Sung, C.-H. J. I. T. o. M. (2004). A steganographic scheme for secure communications based on the chaos and Euler theorem. 6(3), 501-509.

Lowe, D. G. J. I. j. o. c. v. (2004). Distinctive image features from scale-invariant keypoints. 60(2), 91-110.

Luo, Y., Qin, J., Xiang, X., Tan, Y., Liu, Q., & Xiang, L. J. J. o. R.-T. I. P. (2020). Coverless real-time image information hiding based on image block matching and dense convolutional network. 17(1), 125-135.

Maitra, I. K. J. J. o. G. R. i. C. S. (2011). Digital steganalysis: Review on recent approaches. 2(1).

OMRAN, N. F., MAHMOUD, N. R., ALI, A. A. J. T. J. o. C., & Education, M. (2022). Securing Messages by Using Coverless Steganography: A Survey. 13(2), 335-345.

Pan, N., Qin, J., Tan, Y., Xiang, X., Hou, G. J. E. J. o. I., & Processing, V. (2020). A video coverless information hiding algorithm based on semantic segmentation. 2020(1), 1-18.

Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G. J. P. o. t. I. (1999). Information hiding-a survey. 87(7), 1062-1078.

Pramanik, S., Singh, R., Ghosh, R. J. I. J. o. E. E., & Science, C. (2019). A new encrypted method in image steganography. 14(3), 1412-1419.

Provos, N., Honeyman, P. J. I. s., & privacy. (2003). Hide and seek: An introduction to steganography. 1(3), 32-44.

Qin, J., Luo, Y., Xiang, X., Tan, Y., & Huang, H. J. I. A. (2019). Coverless image steganography: a survey. 7, 171372-171394.

Qiu, A., Chen, X., Sun, X., Wang, S., Guo, W. J. J. o. I. H., & Protection, P. (2019). Coverless image steganography method based on feature selection. 1(2), 49.

Saha, B., & Sharma, S. J. D. S. J. (2012). Steganographic techniques of data hiding using digital images. 62(1), 11.

Saranya, K., Mohanapriya, R., Udhayan, J. J. I. J. o. S., Engineering, & Research, T. (2014). A review on symmetric key encryption techniques in cryptography. 3(3), 539-544.

Sharda, S., Budhiraja, S. J. I. J. o. E. T., & Engineering, A. (2013). Image steganography: A review. 3(1), 707-710.

Shen, C., Zhang, H., Feng, D., Cao, Z., & Huang, J. J. S. i. C. S. F. I. S. (2007). Survey of information security. 50(3), 273-298.

Stefan, K., & Fabien AP, P. (2000). Information hiding techniques for steganography and digital watermarking. In: Artech House.

Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. J. I. A. (2021). Image steganography: A review of the recent advances.

Swanson, M. D., Kobayashi, M., & Tewfik, A. H. J. P. o. t. I. (1998). Multimedia data-embedding and watermarking technologies. 86(6), 1064-1087.

Tan, Y., Qin, J., Xiang, X., Ma, W., Pan, W., & Xiong, N. N. J. I. A. (2019). A robust watermarking scheme in YCbCr color space based on channel coding. 7, 25026-25036.

Verma, N. (2011). Review of steganography techniques. Paper presented at the Proceedings of the international conference & workshop on emerging trends in technology.

Wang, S.-Z., Zhang, X.-P., & Zhang, W.-M. J. C. j. o. c. (2009). Recent Advances in Image Based Steganalysis Research [J]. 32(7), 1247-1263.

Yang, L., Deng, H., & Dang, X. J. I. A. (2020). A novel coverless information hiding method based on the most significant bit of the cover image. 8, 108579-108591.

Zhang, X., Peng, F., & Long, M. J. I. T. o. M. (2018). Robust coverless image steganography based on DCT and LDA topic classification. 20(12), 3223-3238.

Zheng, S., Wang, L., Ling, B., & Hu, D. (2017). Coverless information hiding based on robust image hashing. Paper presented at the International conference on intelligent computing.

Zhou, Z., Mu, Y., & Wu, Q. J. J. S. C. (2019). Coverless image steganography using partial-duplicate image retrieval. 23(13), 4927-4938.

Zhou, Z., Sun, H., Harit, R., Chen, X., & Sun, X. (2015). Coverless image steganography without embedding. Paper presented at the International Conference on Cloud Computing and Security.

Zou, L., Sun, J., Gao, M., Wan, W., Gupta, B. B. J. M. t., & applications. (2019). A novel coverless information hiding method based on the average pixel value of the sub-images. 78(7), 7965-7980.



How to Cite

Farhad Khorshid, S., & Mustafa Abdullah, W. (2022). Coverless Image Steganography: Review. Academic Journal of Nawroz University, 11(3), 314–326.