{"title":"A Universal Framework for Improving the Robustness of Coverless Image Steganography Based on Image Restoration","authors":"Laijin Meng;Fan Li;Xinghao Jiang;Qiang Xu","doi":"10.1109/TCSVT.2024.3454457","DOIUrl":null,"url":null,"abstract":"Compared with traditional modification image steganography, coverless image steganography can resist the detection of steganalysis algorithms relying on no modification to the carriers. Previous works have made great efforts to improve the robustness against image attacks. However, the robustness of resisting geometric attacks performs not that well. After studying the general flow of the coverless image steganography, we find out that the receiver always needs to generate or map the hash sequences directly from the received images, which causes a significantly negative impact for extracting correct secret information because these received images might be attacked. Inspired by this finding, we surprisingly explore a common way to solve the problem by proposing a universal restoration framework for the attacked images. The most important module of the framework, the restoration module, contains two main parts, i.e., the classification sub-module and the attack restoration sub-module. The attacked images at the receiving end are first sent to a classification sub-module to estimate the type of the attack. Then, the corresponding attack restoration sub-module is utilized to repair the attacked images to improve the robustness. Experimental results show that the robustness of the existing coverless image steganography methods have been greatly improved after using the proposed framework without introducing extra security issues.","PeriodicalId":13082,"journal":{"name":"IEEE Transactions on Circuits and Systems for Video Technology","volume":"35 1","pages":"922-937"},"PeriodicalIF":11.1000,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Circuits and Systems for Video Technology","FirstCategoryId":"5","ListUrlMain":"https://ieeexplore.ieee.org/document/10664445/","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
Compared with traditional modification image steganography, coverless image steganography can resist the detection of steganalysis algorithms relying on no modification to the carriers. Previous works have made great efforts to improve the robustness against image attacks. However, the robustness of resisting geometric attacks performs not that well. After studying the general flow of the coverless image steganography, we find out that the receiver always needs to generate or map the hash sequences directly from the received images, which causes a significantly negative impact for extracting correct secret information because these received images might be attacked. Inspired by this finding, we surprisingly explore a common way to solve the problem by proposing a universal restoration framework for the attacked images. The most important module of the framework, the restoration module, contains two main parts, i.e., the classification sub-module and the attack restoration sub-module. The attacked images at the receiving end are first sent to a classification sub-module to estimate the type of the attack. Then, the corresponding attack restoration sub-module is utilized to repair the attacked images to improve the robustness. Experimental results show that the robustness of the existing coverless image steganography methods have been greatly improved after using the proposed framework without introducing extra security issues.
期刊介绍:
The IEEE Transactions on Circuits and Systems for Video Technology (TCSVT) is dedicated to covering all aspects of video technologies from a circuits and systems perspective. We encourage submissions of general, theoretical, and application-oriented papers related to image and video acquisition, representation, presentation, and display. Additionally, we welcome contributions in areas such as processing, filtering, and transforms; analysis and synthesis; learning and understanding; compression, transmission, communication, and networking; as well as storage, retrieval, indexing, and search. Furthermore, papers focusing on hardware and software design and implementation are highly valued. Join us in advancing the field of video technology through innovative research and insights.