Abstract
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the most significant bit of the cover image (CIHMSB), has been developed. This uses the most significant bit value in the cover image by calculating the average intensity value on the fragment and mapping it with a predefined sequence. As a result, CIHMBS is resistant to attack threats such as additive Gaussian white noise (AGWN), salt-and-pepper noise attacks, low-pass filtering attacks, and Joint Photographic Experts Group (JPEG) compression attacks. However, it only has a limited hiding capacity. This paper proposes a coverless information-hiding method based on the lowest and highest values of the fragment (CIHLHF) of the cover image. According to the experimental results, the hiding capacity of CIHLHF is twice that of CIHMSB.
Funder
Ministry of Science and Technology
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference35 articles.
1. Image Steganography: A Review of the Recent Advances;Subramanian;IEEE Access,2021
2. Investigation on Works and Military Applications of Artificial Intelligence;Wang;IEEE Access,2020
3. High Capacity Reversible Data Hiding Scheme with Low Distortion Based on Central Prediction;Ren;Int. J. Netw. Secur.,2022
4. Research on Coverless Image Steganography;Anggriani;Int. J. Netw. Secur.,2022
5. Financial Cybercrime: A Comprehensive Survey of Deep Learning Approaches to Tackle the Evolving Financial Crime Landscape;Nicholls;IEEE Access,2021
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献