Coverless information hiding based on Generative Model
نویسندگان
چکیده
A new coverless image information hiding method based on generative model is proposed, we feed the secret image to the generative model database, and generate a meaning-normal and independent image different from the secret image, then, the generated image is transmitted to the receiver and is fed to the generative model database to generate another image visually the same as the secret image. So we only need to transmit the meaning-normal image which is not related to the secret image, and we can achieve the same effect as the transmission of the secret image. This is the first time to propose the coverless image information hiding method based on generative model, compared with the traditional image steganography, the transmitted image does not embed any information of the secret image in this method, therefore, can effectively resist steganalysis tools. Experimental results show that our method has high capacity, safety and reliability.
منابع مشابه
Coverless Information Hiding Based on Generative adversarial networks
Traditional image steganography modifies the content of the image more or less, it is hard to resist the detection of image steganalysis tools. To address this problem, a novel method named generative coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is re...
متن کاملCoverless Multi-keywords Information Hiding Method Based on Text
As a new information hiding method, coverless information hiding has become a hot issue in the field of information security. The existing coverless information hiding method can hide only one Chinese character in each natural text. However, the problem of the method is that the hiding capacity is too small. To address this problem, a new method named coverless multi-keywords information hiding...
متن کاملCoverless Text Information Hiding Method Using the Frequent Words Hash
The attackers may discover the existence of the secret information or even get it by analyzing the cover’s statistical characteristics, changes of which often occur due to the embedding. In this paper, a novel coverless text information hiding method was proposed. By using the words rank map and the frequent words hash, normal texts containing the secret information could be retrieved from the ...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملGenerative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks
The distortion in steganography comes from the modification or recoding on the cover image during the embedding process. The changes of the cover always leave the steganalyzer with possibility of discriminating. Therefore, we propose to use a cover to send out secret messages without any modification by training the cover image to generate the secret messages. To ensure the security of such a g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1802.03528 شماره
صفحات -
تاریخ انتشار 2018