2022
DOI: 10.1109/tcsvt.2021.3108772
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Coverless Steganography Scheme Using Camouflage Image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…Most of the steganography methods for uncovered images are based on robust mapping rules. Most steganography methods of this class are based on robust mapping rules [19][20][21]. There are other methods to map the message to the object in the image and extract the message using the target recognition method [22].However, the payload of this method is significantly lower than that of the other two methods.…”
Section: Three Kinds Of Steganography Methodsmentioning
confidence: 99%
“…Most of the steganography methods for uncovered images are based on robust mapping rules. Most steganography methods of this class are based on robust mapping rules [19][20][21]. There are other methods to map the message to the object in the image and extract the message using the target recognition method [22].However, the payload of this method is significantly lower than that of the other two methods.…”
Section: Three Kinds Of Steganography Methodsmentioning
confidence: 99%
“…To enhance resilience against geometric attacks, Luo et al [22] introduced a faster regionbased convolutional neural network (faster-RCNN). In the context of system security, Liu et al [23] proposed an improvement by transmitting disguised images instead of steganographic images to the receiver. Although generativebased coverless steganography developed a lot, some common defects exist in it as follows.…”
Section: Introductionmentioning
confidence: 99%
“…Although these methods are more resistant to typical noise attacks than spatial domain-based ones, they are more vulnerable to geometric attacks. Luo et al [20], therefore, applied deep learning in coverless steganography by utilizing Faster Region-Based Convolutional Neural Networks (Faster Method Advantages Disadvantages [13], [14] Simple functional implementation Small hiding capacity and poor robustness [15] Stronger robustness against rotation & scaling attacks, improved hiding capacity High computational complexity [17] Further increased capacity Limited by molecular structure images of material (MSIM) [18] More robust against noise attacks Fragile to geometric attacks [19] Ability to handle abrupt signals better than the DCT used in [18] Fragile to geometric attacks [20][21][22][23] More robust against geometric attacks Less robust against noise attacks compared to frequency domain-based methods [24,25] Less database load Small hiding capacity, unnatural image generation, low detection accuracy [26] Increased security with styles transfer Low extraction accuracy [7] Higher security and robustness Small hiding capacity Ours Low collision rate of the feature sequences and the minimal burden on the database A slightly lower robustness Tab. 1.…”
Section: Introductionmentioning
confidence: 99%
“…This multi-object identification produces robust binary sequences that increase robustness against geometric attacks. Other deep learningbased coverless steganography exists as well, like [21][22][23]. These techniques are robust to geometric attacks but less tolerant to noise.…”
Section: Introductionmentioning
confidence: 99%