A Coverless Image Steganography Based On Robust Image Wavelet Hashing
A Coverless Image Steganography Based On Robust Image Wavelet Hashing
Corresponding Author:
Suhad A. Ali
Department of Computer Science, College of Science for Women, University of Babylon
Hilla, Iraq
Email: [email protected]
1. INTRODUCTION
Secret communication between a sender and a receiver has become very important due to the
extensive usage of multimedia data and advancements in telecommunications such as image, audio and
video. So that Information that is sensitive or confidential cannot be accessed by third parties. Information
hiding is normally accomplished performed using two well-known methods, steganography and watermarks,
both methods directly modify the content of the media file (image, video, and audio) for copyright protection
and covert communication or identification of the sender. There are three basic objectives of covert
communication: the message cannot be seen by anybody else while it is being transmitted; it is not modified
while it is being transmitted; and the sender is who he claims to be. The science of concealing and
transferring hidden information is known as steganography [1], [2]. It is a set of techniques for concealing
information through the use of multimedia data, such as image, text, audio, video, and network [3]-[5].
Beacuse people utilization of images since they are one of the most widely used media, Image steganography
has attracted a lot of interest, steganographic communication has a significant technology in the field of
information security today [6], [7].
Image steganography is a component of data security, where images contain sensitive or secret data,
such that it is not visible and cannot be identified by the human visual system (HVS) [5]. According to the
documentation available, there are two types of steganography techniques for images: image steganography
with data embedding and coverless image steganography. In addition, there are two types of data embedding
methods: spatial domain and frequency domain [8]. Although the human visual system does not detect the
modification in the carrier image induced by data embed, the disadvantage of spatial domain approaches such
as least significant digit (LSD) [5], [9], highly undetectable stego (HUGO) [1], wavelet obtained weights
(WOW) [10], and steganographic universal distortion (S-uniward) [10] are that they are not resistant to
normal image and steganalysis attacks. As a result, frequency domain algorithms such as the discrete fourier
transform (DFT) [11], discrete wavelet transform (DWT) [12], discrete cosine transform (DCT) [13] and
integer wavelet transform (IWT) [14] have been presented that use modified coefficients for data embedding.
These methods are more resistant to image attacks, but they are more computationally complexity, and
the information that can be hidden is limited.
The coverless image steganography framework is a new field of research when compared to
previous methods of image steganography. To hide the data, no changes to the image are required. In other
words, secret information cannot be transported without a carrier, but it can be hidden by creating a carrier
image that is visually identical to the original or by establishing mapping rules between carrier image and secret
information [14]. Finding relevant images that already contain the information of the secret data is one
technique to hide a secret data in coverless image steganography. Stego images are used to communicate
sensitive information and are categorised as such. The biggest issue is locating photos that already contain
the required information [15]. The coverless image steganography strategies can resistance image steganalysis
tools and considerably increase image security since hiding critical or confidential information does not modify
the image and can resist attacks such as contrast change, brightness, noise addition, scaling [16], rotation [17],
JPEG compression [18], brightness and noise addition [19].
Several researches have been done in this domain. The first coverless image steganography method
is based on the spatial domain, where an image can be represented by 8 bits of information, and uses a
hashing algorithm to establish hash sequences equal to a binary bit stream of the secret information. For all
hash sequences, including lookup tables, an inverted index structure is created. The approch is tested against
several image attacks that are common such as JPEG, contrast, and scaling attack [20]. The bag-of-words
(BOW) concept is used for hiding text information. To hide text information in an image, visual words are
recovered to represent text information. To extract visual words from an image set, a BOW model is utilized, and a
mapping connection is established between keywords in text information and visual terms. After then, each image
is separated into many sub-images. For each sub-image, a histogram of visual words is generated, and the borders
with the greatest values in the histogram are chosen as the sub-representation of the image. The mapping relation is
used to find a group of sub-images with visual words related with text data. For secret communication, stego
images are images that include these sub-images. The proposed method has high anti-steganalysis capabilities,
robustness towards known attacks, and security, according to the experimental findings and analysis [21].
A method for coverless image steganography is proposed based on histograms of oriented gradients (HOGS)
and hashing. Previous image steganography methods normally required the use of a cover image in order for the
secret information to be invisibly inserted in it for secret communication. Though using the embedded traces left
in the cover image, steganalysis algorithms were able to sufficiently determine the existence of secret
information. To resist current steganalysis approaches, a coverless image steganography solution is provided
that uses a hashing algorithm based on HOGS. Instead of selecting a cover image for secret information
embedding, the original images with hash sequences matching the secret information are extracted direct from a
huge database and utilized as stego images for secret communication. This method offers good resistance to
existing steganalysis tools, as well as good security and robustness against several attacks such as
resampling, brightness and contrast changes, smoothing, and the inclusion of Gaussian noise [22]. A method
for coverless hiding based on partial duplicates of a specified secret image as stego images. In this approach,
each image in the database is splitting into a number of non-overlapping patches and indexing those images
to use the features collected from these patches. Each of which has one or more patches that are visually
related to the secret image. Then the searching is done for partial duplicates of the secret image in the
database to produce the stego images. In this approach, by utilizing the patches of the stego images, it can be
approximateed retrieving the secret image at the receiver side. This method offers good resistance to existing
steganalysis tools [23]. A coverless image steganography method based on image block matching and dense
convolutional network. This method sends a collection of stego images that share one or more visually blocks
with the secret image given. Hash sequence coorsponding to the secret image is generated based on DCT and
DenseNet. The high-level semantic properties of each related block are extracted using DenseNet.
DCT produces a strong hash sequence with feature sequence, direct current (DC), and location at the same time.
The DCT coefficient and supervised deep learning improve retrieval accuracy and robustness, deep learning
can determine the best carrier for real-time image hiding data requirements, and CNN’s high-level semantic
features are more efficient than low-level features. According to experimental results, this method improves
the retrieval accuracy and capacity [24].
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 6, December 2022: 1317-1325
TELKOMNIKA Telecommun Comput El Control 1319
2. METHOD
In this section, the proposed coverless image method is explained in details. Figure 1 shows the
structure of the proposed method. The proposed method consists of two procedures, namely embedding
propcedure and extracting procedure.
A coverless image steganography based on robust image wavelet hashing (Nadia A. Karim)
1320 ISSN: 1693-6930
ℎ𝑗 = 1; 𝑖𝑓 ℎ𝑗 > ℎ𝑗 + 1
{ 𝑤ℎ𝑒𝑟𝑒 1 < 𝑗 < 8 (1)
ℎ𝑗 = 0; 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 6, December 2022: 1317-1325
TELKOMNIKA Telecommun Comput El Control 1321
2) As illustrated in Figure 7, dividing the secret message into a number of segments of identical length (8 bits).
A coverless image steganography based on robust image wavelet hashing (Nadia A. Karim)
1322 ISSN: 1693-6930
3) Generating hash sequence for each image. For example, image1 has hash equal (01100011) and image2
has hash equal (01101111).
4) Each segment is used as a query; discover the images that have hash sequences that are like as the
segment. For example, the bits of letter c equal to hash of image1 and the bits of letter o equal to hash
image2. So, image1 and image2 will be stego image.
5) Sending image1 and image2 to the receiver.
The extracting procedure is done (in the receiver side) as:
1) Each incoming image’s hash set is created by the same hashing algorithm employed by the sender once
the receiver has obtained all of those images, (as described in the subsection 2.1.2). To extract the secret
data, the receiver generates a new all of their hash sequences of those images according to the ordering
of the received images. So, the result will be as shown in the Figure 8.
2) As illustrated in Figure 9, dividing the recovered secret message into a number of segments of similar
length (8 bits).
3) Transforming the bits into ASCII and transform it to letters as shown in Figure 10.
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 6, December 2022: 1317-1325
TELKOMNIKA Telecommun Comput El Control 1323
Table 2. NC and BER values under different density levels of noise attacks
Attack type Density of noise NC BER
Salt and pepper 0.001 0 1
0.01 0 1
0.02 0 1
0.03 0 1
Speckle noise 0.01 0 1
0.02 0 1
0.001 0 1
Gaussian noise 0.01 0 1
0.02 0 1
0.001 0 1
Poisson noise 0 1
A coverless image steganography based on robust image wavelet hashing (Nadia A. Karim)
1324 ISSN: 1693-6930
4. CONCLUSION
In this paper, a coverless image steganography framework based on efficient image wavelet hashing
is proposed. The embedding process is done without any modification on cover image. It finds the proper
cover images as stego-images that contain information that matches to the secret data because no evidence of
change will be left in the stego images. Moreover, due to the suggested strong hashing method, our approach
can handle image processing processes such as JPEG compression, image rotation, image scaling, and noise.
As a result, the stego images that are formed are robust to signal loss. However, using our technology, only
8-bit info may be hidden in each main image. The goal of future study will be to find techniques to increase
hiding capacity without reducing steganography performance.
ACKNOWLEDGEMENTS
This work was supported by Department of Computer Science, College of Science for Women,
Babylon University, Babylon, Iraq.
REFERENCES
[1] C. F. Osborne, A. Z. Tirkel, and T. E. Hall, “Image and Watermark Registration for Monochrome and Coloured Images,” Digital
Image Computing, Technology, and Applications, pp. 59-64, 1997. [Online]. Available:
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.22.7911&rep=rep1&type=pdf
[2] A. Arya and S. Soni, “A literature review on various recent steganography techniques,” International Journal on Future
Revolution in Computer Science & Communication Engineering, vol. 4, no. 1, pp. 143-149, 2018. [Online]. Available:
http://www.ijfrcsce.org/download/conferences/ICATET_2018/ICATET_2018_Track/1517647667_03-02-2018.pdf
[3] M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan, “A Review on Text Steganography Techniques,” Mathematics, vol. 9,
no. 21, 2021, doi: 10.3390/math9212829.
[4] S. Deepikaa, and R. Saravanan, “VoIP steganography methods, a survey,” Cybernetics and Information Technologies, vol. 19,
pp. 73-87, 2019, doi: 10.2478/cait-2019-0004.
[5] J. Chaharlang, M. Mosleh, and S. R. Heikalabad, “A novel quantum audio steganography–steganalysis approach using LSFQ-based
embedding and QKNN-based classifier,” Circuits, Systems, and Signal Processing, vol. 39, pp. 3925-3957, 2020, doi:
10.1007/s00034-020-01345-6.
[6] A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods,”
Signal Processing, vol. 90, no. 3, pp. 727-752, 2010, doi: 10.1016/j.sigpro.2009.08.010.
[7] A. A. A. E. -Latif, B. A. -E. -Atty, and S. E. V. -Andraca, "A novel image steganography technique based on quantum substitution
boxes," Optics & Laser Technology, vol. 116, pp. 92-102, 2019, doi: 10.1016/j.optlastec.2019.03.005.
[8] Y. Cao, Z. Zhou, Q. M. J. Wu, C. Yuan, and X. Sun, “Coverless information hiding based on the generation of anime characters,”
EURASIP Journal on Image and Video Processing, 2020, doi: 10.1186/s13640-020-00524-4.
[9] V. Holub and J. Fridrich, “Digital image steganography using universal distortion,” in Proceedings of the first ACM workshop on
Information hiding and multimedia security, 2013, pp. 59–68, doi: 10.1145/2482513.2482514.
[10] T. Pevný, T. Filler, and P. Bas, “Using High-Dimensional Image Models to Perform Highly Undetectable Steganography”, Berlin,
Germany: Springer, vol. 6387, pp. 161–177, 2010, doi: 10.1007/978-3-642-16435-4_13.
[11] R. T. McKeon, “Strange Fourier steganography in movies,” 2007 IEEE International Conference on Electro/Information
Technology, 2007, pp. 178–182, doi: 10.1109/EIT.2007.4374540.
[12] P. C. Tay and J. P. Havlicek, “Frequency implementation of discrete wavelet transforms,” 6th IEEE Southwest Symposium on
Image Analysis and Interpretation 2004, 2004, pp. 167-171, doi: 10.1109/IAI.2004.1300967.
[13] T. Rabie and I. Kamel, “On the embedding limits of the discrete cosine transform,” Multimedia Tools and Applications, vol. 75,
pp. 5939-5957, 2016, doi: 10.1007/s11042-015-2557-x.
[14] A. Shaik and V. Thanikaiselvan, “Comparative analysis of integer wavelet transforms in reversible data hiding using threshold
based histogram modification,” Journal of King Saud University - Computer and Information Sciences, vol. 33, pp. 878-889,
2021, doi: 10.1016/j.jksuci.2018.06.001.
[15] S. Zheng, L. Wang, B. Ling, and D. Hu, “Coverless Information Hiding Based on Robust Image Hashing,” ICIC 2017: Intelligent
Computing Methodologies, 2017, vol. 10363, doi: 10.1007/978-3-319-63315-2_47.
[16] A. Shapi’i, R. Sulaiman, M. K. Hasan, A. Y. Kassim, and S. Abdullah, “Scaling Technique for Digital Implant in Medical Images
Using Pixel Density Algorithm,” European Journal of Scientific Research, vol. 47, no. 1, pp. 24-32, 2010. [Online]. Available:
https://www.researchgate.net/publication/242014301_Scaling_Technique_for_Digital_Implant_in_Medical_Images_Using_Pixel
_Density_Algorithm
[17] D. Khovratovich, I. Nikolić, and C. Rechberger, “Rotational Rebound Attacks on Reduced Skein,” International Conference on
the Theory and Application of Cryptology and Information Security, 2010, vol. 6477, pp. 1-19, doi: 10.1007/978-3-642-17373-
8_1.
[18] J. Wu, Y. Liu, Z. Dai, Z. Kang, S. Rahbar, and Y. Jia, “A Coverless Information Hiding Algorithm Based on Grayscale Gradient
Co-occurrence Matrix,” IETE Technical Review, vol. 35, pp. 23-33, 2018, doi: 10.1080/02564602.2018.1531735.
[19] J. Zhou and Z. Wang, “Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network,”
KSII Transactions on Internet and Information Systems, vol. 14, no.4, pp. 1773-1795, 2020, doi: 10.3837/tiis.2020.04.020.
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 6, December 2022: 1317-1325
TELKOMNIKA Telecommun Comput El Control 1325
[20] Z. Zhou, H. Sun, R. Harit, X. Chen, and X. Sun, “Coverless Image Steganography Without Embedding,” International
Conference on Cloud Computing and Security, 2015, vol. 9483, pp. 123-132, doi: 10.1007/978-3-319-27051-7_11.
[21] X. Duan, B. Li, D. Guo, K. Jia, E. Zhang, and C. Qin, “Coverless Information Hiding Based on WGAN-GP Model,” International
Journal of Digital Crime and Forensics, vol. 13, no. 4, pp. 57-70, 2021, doi: 10.4018/IJDCF.20210701.oa5.
[22] Z. Zhou, Q. M. J. Wu, C. -N. Yang, X. Sun, and Z. Pan, “Coverless Image Steganography Using Histograms of Oriented
Gradients-Based Hashing Algorithm,” Journal of Internet Technology, vol. 18, pp. 1177-1184, 2017, doi:
10.6138/JIT.2017.18.5.20160815b.
[23] Z. Zhou, Y. Mu, and Q. M. J. Wu, “Coverless image steganography using partial-duplicate image retrieval,” Soft Computing,
vol. 23, pp. 4927-4938, 2019, doi: 10.1007/s00500-018-3151-8.
[24] Y. Luo, J. Qin, X. Xiang, Y. Tan, Q. Liu, and L. Xiang, “Coverless real-time image information hiding based on image block
matching and dense convolutional network,” Journal of Real-Time Image Processing, vol. 17, pp. 125–135, 2020, doi:
10.1007/s11554-019-00917-3.
[25] M. Hussain, A. W. A. Wahab, Y. I. B. Idris, A. T. S. Ho, and K. -H. Jung, “Image steganography in spatial domain: A survey,”
Signal Processing: Image Communication, vol. 65, pp. 46-66, 2018, doi: 10.1016/j.image.2018.03.012.
BIOGRAPHIES OF AUTHORS
A coverless image steganography based on robust image wavelet hashing (Nadia A. Karim)