Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 Sep 6;19(9):e0308265.
doi: 10.1371/journal.pone.0308265. eCollection 2024.

Image steganography without embedding by carrier secret information for secure communication in networks

Affiliations

Image steganography without embedding by carrier secret information for secure communication in networks

Yangwen Zhang et al. PLoS One. .

Abstract

Steganography, the use of algorithms to embed secret information in a carrier image, is widely used in the field of information transmission, but steganalysis tools built using traditional steganographic algorithms can easily identify them. Steganography without embedding (SWE) can effectively resist detection by steganography analysis tools by mapping noise onto secret information and generating secret images from secret noise. However, most SWE still have problems with the small capacity of steganographic data and the difficulty of extracting the data. Based on the above problems, this paper proposes image steganography without embedding carrier secret information. The objective of this approach is to enhance the capacity of secret information and the accuracy of secret information extraction for the purpose of improving the performance of security network communication. The proposed technique exploits the carrier characteristics to generate the carrier secret tensor, which improves the accuracy of information extraction while ensuring the accuracy of secret information extraction. Furthermore, the Wasserstein distance is employed as a constraint for the discriminator, and weight clipping is introduced to enhance the secret information capacity and extraction accuracy. Experimental results show that the proposed method can improve the data extraction accuracy by 10.03% at the capacity of 2304 bits, which verifies the effectiveness and universality of the method. The research presented here introduces a new intelligent information steganography secure communication model for secure communication in networks, which can improve the information capacity and extraction accuracy of image steganography without embedding.

PubMed Disclaimer

Conflict of interest statement

The authors have declared that no competing interests exist.

Figures

Fig 1
Fig 1
Fig 2
Fig 2
Fig 3
Fig 3
Fig 4
Fig 4
Fig 5
Fig 5
Fig 6
Fig 6

References

    1. Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods. Signal processing. 2010;90(3):727–752. doi: 10.1016/j.sigpro.2009.08.010 - DOI
    1. Subhedar MS, Mankar VH. Current status and key issues in image steganography: A survey. Computer science review. 2014;13:95–113. doi: 10.1016/j.cosrev.2014.09.001 - DOI
    1. Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security. 2009;5(1):187–193.
    1. Sahu AK. A logistic map based blind and fragile watermarking for tamper detection and localization in images. Journal of Ambient Intelligence and Humanized Computing. 2022;13(8):3869–3881. doi: 10.1007/s12652-021-03365-9 - DOI
    1. Meng R, Cui Q, Zhou Z, Li Z, Wu QJ, Sun X. High-capacity steganography using object addition-based cover enhancement for secure communication in networks. IEEE Transactions on Network Science and Engineering. 2021;9(2):848–862. doi: 10.1109/TNSE.2021.3137829 - DOI

MeSH terms

LinkOut - more resources