Coverless Information Hiding Based on WGAN-GP Model

Coverless Information Hiding Based on WGAN-GP Model

Xintao Duan, Baoxia Li, Daidou Guo, Kai Jia, En Zhang, Chuan Qin
Copyright: © 2021 |Pages: 14
DOI: 10.4018/IJDCF.20210701.oa5
Article PDF Download
Open access articles are freely available for download

Abstract

Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model. The sender trains the WGAN-GP with a natural image and a secret image. The generated image and secret image are visually identical, and the parameters of generator are saved to form the codebook. The sender uploads the natural image (disguise image) to the cloud disk. The receiver downloads the camouflage image from the cloud disk and obtains the corresponding generator parameter in the codebook and inputs it to the generator. The generator outputs the same image for the secret image, which realized the same results as sending the secret image. The experimental results indicate that the scheme produces high image quality and good security.
Article Preview
Top

Introduction

Network communication and information technology have developed rapidly in the era of increasing net-workization. Cloud computing has provided enough space for individuals and enterprised to store multimedia data(Khan et al., 2018). Users can use the cloud to store and share data. There are two ways to prevent image information from leaking: encryption and information hiding (Guo et al., 2011). Encryption technology of image is to ensure the security of images, which uses digital image matrix features to change pixels according to the transformation rules of images in space or transform domain to achieve encrypted values (Liu et al., 2013; Wang et al., 2005; Samidha & Agrawal, 2013; Hemalatha et al., 2013). However, it will cause image distortion and make the image into a form of noise or texture, which may cause suspicion of the attacker and increase the possibility of information leakage, loss and tampering (Dang & Chau, 2000). The significant information was embed into the carrier by modifying the carrier data (e.g. digital image, video, audio, etc.) to realize the hiding of the important information. The procedure of information hiding avoids the attention of attackers (Sakkara & Somashekar, 2012; Zhou & Chen, 2006; Zhang et al., 2003). Moreover, digital image contains a number of information, and it is the most widely used as an ideal information hiding carrier and it is the most widely used as an ideal information hiding carrier (Liang&Wang, 2007; Qian&Xu, 2018; Qian & Zhang, 2016; Wang & Zhang, 2002; Ren&Sui, 2002). Technology of the classical image information hiding constitutes of spatial domain information hiding and transforms domain information hiding. The methods of the spatial domain information hiding include Least Significant Bit (LSB)(Chan & Cheng, 2004), Adaptive Least Significant Bit (Yang&Weng, 2008), Pixels Value Differencing (PVD)(Wu&Tsai, 2003), S-UNIWARD(Holub&Fridrich, 2014), and WOW (Holub & Fridrich, 2012) etc. The methods of the transform domain include Discrete Fourier Transform (Chaumont & Puech, 2006), Discrete Cosine Transform (Cox&Kilian, 1996), and Discrete Wavelet Transform (Lin&Horng, 2008) information hiding and so on. All of these methods embed secret information according to certain rules through modifying the vector, and consequentially leave modified marks on the vector. Therefore, the information hiding methods mentioned above are difficult to resist detection of various steganalysis methods. The principles of typical information hiding have been shown in Figure 1.

Figure 1.

Typical model of information hiding

IJDCF.20210701.oa5.f01

Objective to effectively resist the test of steganalysis methods, Zhou et al. used the new conception of coverless information hiding, and compared with the classic information hiding method, the coverless information hiding doesn’t need to encode the significant information into the carrier (Zhou&Cao, 2016). In (Zhou&Cao, 2016), the bag-of-words model is used to extract the visual keywords of the image. To indicate information that needs to be hidden, this realizes the hiding of the text information in the image. The method wouldn’t the modify the carrier. However, a large number of codebook needs to be built, which has large storage overhead and small hiding capacity. In (Zhang&Qian, 2016), the structural information hiding is proposed, but the object library that synthesizes the dense carrier needs to be segmented from a large number of normal image libraries, so the method is inefficient. This paper proposed coverless information hiding based on WGAN-GP model. The scheme doesn’t change cover image and can be effectively prevented from being detected by the steganography analysis tool. The work mainly includes the following points.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing