Coverless image steganography based on generative adversarial network

46Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

Abstract

Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So coverless steganography has become a topic of research in recent years, which has the advantage of hiding secret messages without modification. But current coverless steganography still has problems such as low capacity and poor quality .To solve these problems, we use a generative adversarial network (GAN), an effective deep learning framework, to encode secret messages into the cover image and optimize the quality of the steganographic image by adversaring. Experiments show that our model not only achieves a payload of 2.36 bits per pixel, but also successfully escapes the detection of steganalysis tools.

References Powered by Scopus

Image quality assessment: From error visibility to structural similarity

45196Citations
N/AReaders
Get full text

Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition

9736Citations
N/AReaders
Get full text

Automatic Steganographic Distortion Learning Using a Generative Adversarial Network

348Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Coverless Image Steganography Based on Multi-Object Recognition

98Citations
N/AReaders
Get full text

Evolving Generative Adversarial Networks to improve image steganography

37Citations
N/AReaders
Get full text

Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography

35Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Qin, J., Wang, J., Tan, Y., Huang, H., Xiang, X., & He, Z. (2020). Coverless image steganography based on generative adversarial network. Mathematics, 8(9). https://doi.org/10.3390/MATH8091394

Readers over time

‘20‘21‘22‘23‘24‘25036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

70%

Researcher 2

20%

Lecturer / Post doc 1

10%

Readers' Discipline

Tooltip

Computer Science 14

93%

Biochemistry, Genetics and Molecular Bi... 1

7%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 2

Save time finding and organizing research with Mendeley

Sign up for free
0