Robust Coverless Image Steganography based on DCT and LDA Topic Classification

 

 

Abstract

 

In order to improve the robustness and capability of resisting image steganalysis, a novel coverless image steganography algorithm based on Discrete Cosine Transform and Latent Dirichlet Allocation topic classification is proposed. Firstly, LDA topic model is utilized for classifying the image database. Secondly, the images belong to one topic are selected, and 8×8 block DCT transform is performed to these images. Then robust feature sequence is generated through the relation between Direct Current coefficients in the adjacent blocks. Finally, an inverted index which contains the feature sequence, dc, location coordinates and image path is created. For the purpose of achieving image steganography, the secret information is converted into a binary sequence and partitioned into segments, and the image whose feature sequence equals to the secret information segments is chosen as the cover image according to the index. After that, all cover images are sent to the receiver. In the whole process, no modification is done to the original images. Experimental results and analysis show that the proposed algorithm can resist the detection of existing steganalysis algorithms, and has better robustness against common image processing and better ability to resist subjective detection compared with the existing coverless image steganography algorithms. Meanwhile, it is resistant to geometric attacks to some extent. It has great potential application in secure communication of big data environment.

 

 

Existing System

 

The existing coverless image steganography algorithms can be classified into two categories according to different steganography principles: coverless image steganography based on texture synthesis and coverless image steganography based on mapping rules. I) Coverless Image Steganography Based on Texture Synthesis ii)Coverless Image Steganography Based on Mapping Rules

 

Proposed System

 

From the above analysis, the existing coverless image steganography algorithms based on the mapping rules all extract feature sequence in spatial domain, and the robustness is limited. Meanwhile, one image can only hide a fixed length of secret information segment. Furthermore, random selection of cover images may lead to security issues. In order to solve the fore-mentioned problems in the coverless image steganography based on mapping rules, a coverless image steganography algorithm based on transform domain and topic classification is proposed in this paper

 

CONCLUSIONS

 

A coverless image steganography scheme based on DCT transform is proposed in this paper. The secret information is hidden through the mapping rules, and the cover images are not modified in the steganography process. It can effectively resist the detection of the existing steganalysis algorithms. Meanwhile, LDA topic model is exploited to enhance the capability of resisting detection from subjective vision. Furthermore, the feature sequence is generated based on DC coefficients, which is helpful to improve the robustness, and the search efficiency is optimized by constructing an inverted index. Experimental results and analysis show that the proposed algorithm can achieve good performance in subjective and objective detection resistance on testing database, and it is robust against most image processing attacks, and geometric attacks. The future work will be focused on the improvement of capacity with less side information, along with robustness against rotation and the content loss attacks.

 

REFERENCES

 

[1] Zhang X. “Reversible data hiding with optimal value transfer,” IEEE Trans. Multimedia, vol. 15, no. 2, pp. 316-325, Feb. 2013.

 

[2] Lou D C, Sung C H. “A steganographic scheme for secure communications based on the chaos and Euler theorem,” IEEE Trans. Multimedia, vol. 6, no. 3, pp. 501-509, Mar. 2004.

[3] Zhang W, Wang H, Hou D, et al. “Reversible data hiding in encrypted images by reversible image transformation,” IEEE Trans. Multimedia, vol. 18, no. 8, pp. 1469-1479, Oct. 2016.

[4] Borges P V K, Mayer J, Izquierdo E. “Robust and transparent color modulation for text data hiding,” IEEE Trans. Multimedia, vol. 10, no. 8, pp. 1479-1489, Oct. 2008.

[5] Erfani Y, Pichevar R, Rouat J. “Audio Watermarking Using Spikegram and a Two-Dictionary Approach,” IEEE Trans. Inf. Forensics and Security, vol. 12, no. 4, pp. 840-852, Apr. 2017.

[6] Stütz T, Autrusseau F, Uhl A. “Non-blind structure-preserving substitution watermarking of H. 264/CAVLC inter-frames” IEEE Trans. Multimedia, vol. 16, no. 5, pp. 1337-1349, May. 2014.

[7] Liu S C, Tsai W H. “Line-based cubism-like image—A new type of art image and its application to lossless data hiding,” IEEE Trans. Inf. Forensics and Security, vol. 7, no. 5, pp. 1448-1458, May. 2012.

[8] Khare P, Singh J, “Tiwari M. Digital image steganography,” J. Eng Res.and Stud., vol. 2, no. 3, pp. 101-104, Mar. 2011.

[9] Luo W, Huang F, Huang J. “Edge adaptive image steganography based on LSB matching revisited,” IEEE Trans. Inf. Forensics and Security, vol. 5, no. 2, pp. 1448-1458, Feb. 2010..

[10] Wu H C, Wu N I, Tsai C S, et al. “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” Proc. Inst. Elect. Eng., Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, May. 2005.

[11] Wu D C, Tsai W H. “A steganographic method for images by pixel-value differencing,” Pattern Recogn. Lett., vol. 24, no. 9, pp. 1613-1626, Sep. 2003.

[12] Li Z, Chen X, Pan X, et al. “Lossless data hiding scheme based on adjacent pixel difference,” in Proc. ICCET, Singapore, 2009, pp. 588- 592.

[13] Zhang X, Wang S. “Steganography using multiple-base notational system and human vision sensitivity,” IEEE Signal Process. Lett., vol. 12, no. 1, pp. 67-70, Jan. 2005.

[14] Chen B, Wornell G W. “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, Apr. 2001.

[15] Huang F, Huang J, Shi Y Q. “New channel selection rule for JPEG steganography,” IEEE Trans. Inf. Forensics and Security, vol. 7, no. 4, pp. 1181-1191, Apr. 2012.

[16] Lin G S, Chang Y T, Lie W N. “A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm,” IEEE Trans. Multimedia, vol. 12, no. 5, pp. 345-357, May. 2010.

[17] Zhiwei K, Jing L, Yigang H. “Steganography based on wavelet transform and modulus function,” J. Syst Eng. And Electrons., vol. 18, no. 3, pp. 628-632, Mar. 2007.

[18] Hsieh M S, Tseng D C, Huang Y H. “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. Ind Electrons., vol. 48, no. 5, pp. 875-882, May. 2001.

[19] Lin W H, Horng S J, Kao T W, et al. “An efficient watermarking method based on significant difference of wavelet coefficient quantization,” IEEE Trans. Multimedia, vol. 10, no. 5, pp. 746-757, May. 2008.

[20] McKeon R T. “Strange fourier steganography in movies,” in Proc. ICEIT, DeKalb, Illinois, USA, 2007, pp. 178-182.

[21] Chen W Y. “Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation,” Appl. Math. Comput., vol. 185, no. 1, pp. 432-448, Jan. 2007.

[22] Otori H, Kuriyama S. “Data-embeddable texture synthesis,” in Proc. Int. Symp. Smart Graph, Kyoto, Japan, 2007, pp. 146–157.

[23] Otori H, Kuriyama S. “Texture synthesis for mobile data communications,” IEEE Comput. Graphics Appl., vol. 29, no. 6, pp. 74- 81, Jun. 2009.

[24] Wu K C, Wang C M. “Steganography using reversible texture synthesis,” IEEE Trans. on Image Process., vol. 24, no. 1, pp. 130-139, Jan. 2015.

[25] Xu J, Mao X, Jin X, et al. “Hidden message in a deformation-based texture,” Vis. Comput., vol. 31, no. 12, pp. 1653-1669, Dec. 2015.

[26] Lu S, Jaffer A, Jin X, et al. “Mathematical marbling,” IEEE Comput. Graphics and Appl., vol. 32, no. 6, pp. 26-35, Jun. 2012.