Image steganography without embedding by carrier secret information for secure communication in networks
- PMID: 39240910
- PMCID: PMC11379290
- DOI: 10.1371/journal.pone.0308265
Image steganography without embedding by carrier secret information for secure communication in networks
Abstract
Steganography, the use of algorithms to embed secret information in a carrier image, is widely used in the field of information transmission, but steganalysis tools built using traditional steganographic algorithms can easily identify them. Steganography without embedding (SWE) can effectively resist detection by steganography analysis tools by mapping noise onto secret information and generating secret images from secret noise. However, most SWE still have problems with the small capacity of steganographic data and the difficulty of extracting the data. Based on the above problems, this paper proposes image steganography without embedding carrier secret information. The objective of this approach is to enhance the capacity of secret information and the accuracy of secret information extraction for the purpose of improving the performance of security network communication. The proposed technique exploits the carrier characteristics to generate the carrier secret tensor, which improves the accuracy of information extraction while ensuring the accuracy of secret information extraction. Furthermore, the Wasserstein distance is employed as a constraint for the discriminator, and weight clipping is introduced to enhance the secret information capacity and extraction accuracy. Experimental results show that the proposed method can improve the data extraction accuracy by 10.03% at the capacity of 2304 bits, which verifies the effectiveness and universality of the method. The research presented here introduces a new intelligent information steganography secure communication model for secure communication in networks, which can improve the information capacity and extraction accuracy of image steganography without embedding.
Copyright: © 2024 Zhang et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Conflict of interest statement
The authors have declared that no competing interests exist.
References
-
- Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal processing. 2010;90(3):727–752. doi: 10.1016/j.sigpro.2009.08.010 - DOI
-
- Subhedar MS, Mankar VH. Current status and key issues in image steganography: A survey. Computer science review. 2014;13:95–113. doi: 10.1016/j.cosrev.2014.09.001 - DOI
-
- Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security. 2009;5(1):187–193.
-
- Sahu AK. A logistic map based blind and fragile watermarking for tamper detection and localization in images. Journal of Ambient Intelligence and Humanized Computing. 2022;13(8):3869–3881. doi: 10.1007/s12652-021-03365-9 - DOI
-
- Meng R, Cui Q, Zhou Z, Li Z, Wu QJ, Sun X. High-capacity steganography using object addition-based cover enhancement for secure communication in networks. IEEE Transactions on Network Science and Engineering. 2021;9(2):848–862. doi: 10.1109/TNSE.2021.3137829 - DOI
MeSH terms
LinkOut - more resources
Full Text Sources