Authors
Chengsheng Yuan, Zhihua Xia, Xingming Sun
Publication date
2017/3/1
Journal
網際網路技術學刊
Volume
18
Issue
2
Pages
435-442
Publisher
台灣軟體模擬學會 & Ainosco Press
Description
In order to realize secret communication, conventional steganography techniques can embed the secret message into carrier images by modifying the content and structure of carrier images. Although steganography techniques provide us with some more secure communication, the modification traces will be detected through using these brand-new steganalysis tools. Thereby, in order to eliminate the influence of modification traces, we propose a novel coverless image steganography scheme based on scale invarient feature transform and bag of feature. Different from conventional steganography, images have already contained the concealing information, so we can transmit natural images, whose features are the same with the secret information, to receivers. Firstly, the robust feature hash sequences are constructed with our protocol of feature. Then, the secret message is converted into bitstreams. Finally, these …
Total citations
20172018201920202021202220232024194729171411911
Scholar articles