A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography

Jiajun Liu,Lina Tan,Zhili Zhou,Yi Li,Peng Chen
2024-01-22
Abstract:Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. There exists an issue that the number of images stored in the database grows exponentially as the steganographic capacity rises. The need for a high steganographic capacity makes it challenging to build an image database. To improve the image library utilization and anti-attack capability of the steganography system, we present an efficient coverless scheme based on dynamically matched substrings. YOLO is employed for selecting optimal objects, and a mapping dictionary is established between these objects and scrambling factors. With the aid of this dictionary, each image is effectively assigned to a specific scrambling factor, which is used to scramble the receiver's sequence key. To achieve sufficient steganography capability based on a limited image library, all substrings of the scrambled sequences hold the potential to hide data. After completing the secret information matching, the ideal number of stego images will be obtained from the database. According to experimental results, this technology outperforms most previous works on data load, transmission security, and hiding capacity. Under typical geometric attacks, it can recover 79.85\% of secret information on average. Furthermore, only approximately 200 random images are needed to meet a capacity of 19 bits per image.
Cryptography and Security
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? This paper aims to solve some key problems in coverless steganography, specifically including: 1. **Exponential growth of the image database**: - Many existing coverless steganography methods, while increasing the steganographic capacity, lead to an exponential growth in the number of images stored in the database. This makes it very difficult to build and maintain an efficient and large - scale image database. - Formula representation: Assume the steganographic capacity is \(C\), as \(C\) increases, the number of images \(N\) grows exponentially, that is, \(N = e^{kC}\), where \(k\) is a constant. 2. **The need for high steganographic capacity**: - Higher steganographic capacity needs to be achieved to meet the requirements in practical applications. However, traditional methods often require more image resources when increasing the steganographic capacity, which places higher demands on the scale of the database. 3. **Improvement of anti - attack ability**: - Improve the anti - attack ability of the system, especially when facing geometric attacks and noise attacks, to ensure the security and integrity of the secret information. 4. **Efficient steganography with a limited image library**: - Achieve efficient steganography in a limited image library, reduce the dependence on a large number of image resources, and at the same time maintain high steganographic capacity and security. ### Solutions To address the above challenges, the author proposes an efficient coverless steganography model based on dynamic matching substrings, with the following main contributions: 1. **Use YOLO for object detection**: - Utilize YOLO - v5 for object detection, select the optimal object, and establish a mapping dictionary between object labels and scrambling factors. This helps to improve the accuracy and real - time performance of object detection. 2. **Dynamic matching substrings**: - Introduce the method of dynamic matching substrings, represent each image as a binary substring of length \(u\), and thus generate \(\frac{u^{2}+u}{2}\) substrings. This method can achieve more flexible information hiding in a limited image library. 3. **Increase steganographic capacity**: - The experimental results show that under ideal conditions, this method can reach the ability to hide an average of 19 bits of information per image, which is significantly better than existing methods. 4. **Reduce the burden on the image library**: - By indirectly hiding information in the key instead of directly in the image, the need for a large number of images is reduced. Experiments show that only about 200 random images are required to meet the steganographic capacity requirement of 19 bits per image. 5. **Enhance anti - attack ability**: - Under common geometric attacks, this method can recover 79.85% of the secret information, showing strong robustness. Through these improvements, the method proposed in this paper not only improves the steganographic capacity and anti - attack ability but also achieves efficient coverless steganography in a limited image library.