DDIM-Driven Coverless Steganography Scheme with Real Key

Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key factor in scheme evaluation, conventional methods aim to balance this requirement with embedding capacity. Consequently, integrating emerging i...

Full description

Saved in:
Bibliographic Details
Published inarXiv.org
Main Authors Yu, Mingyu, Miao, Haonan, Jin, Zhengping, Sujuan Qing
Format Paper
LanguageEnglish
Published Ithaca Cornell University Library, arXiv.org 10.11.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key factor in scheme evaluation, conventional methods aim to balance this requirement with embedding capacity. Consequently, integrating emerging image generation models and secret transmission has been extensively explored to achieve a higher embedding capacity. Previous works mostly focus on generating stego-images with Generative Adversarial Networks (GANs) and usually rely on pseudo-keys, namely conditions or parameters involved in the generation process, which are related to secret images. However, studies on diffusion-based coverless steganography remain insufficient. In this work, we leverage the Denoising Diffusion Implicit Model (DDIM) to generate high-quality stego-images without introducing pseudo-keys, instead employing real keys to enhance security. Furthermore, our method offers low-image-correlation real-key protection by incorporating chaotic encryption. Another core innovation is that our method requires only one-time negotiation for multiple communications, unlike prior methods that necessitate negotiation for each interaction.
AbstractList Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key factor in scheme evaluation, conventional methods aim to balance this requirement with embedding capacity. Consequently, integrating emerging image generation models and secret transmission has been extensively explored to achieve a higher embedding capacity. Previous works mostly focus on generating stego-images with Generative Adversarial Networks (GANs) and usually rely on pseudo-keys, namely conditions or parameters involved in the generation process, which are related to secret images. However, studies on diffusion-based coverless steganography remain insufficient. In this work, we leverage the Denoising Diffusion Implicit Model (DDIM) to generate high-quality stego-images without introducing pseudo-keys, instead employing real keys to enhance security. Furthermore, our method offers low-image-correlation real-key protection by incorporating chaotic encryption. Another core innovation is that our method requires only one-time negotiation for multiple communications, unlike prior methods that necessitate negotiation for each interaction.
Author Jin, Zhengping
Sujuan Qing
Yu, Mingyu
Miao, Haonan
Author_xml – sequence: 1
  givenname: Mingyu
  surname: Yu
  fullname: Yu, Mingyu
– sequence: 2
  givenname: Haonan
  surname: Miao
  fullname: Miao, Haonan
– sequence: 3
  givenname: Zhengping
  surname: Jin
  fullname: Jin, Zhengping
– sequence: 4
  fullname: Sujuan Qing
BookMark eNqNyr0OgjAUQOHGaCIq79DEmYTeAmUHjca4CDtpzJWf1BZbwPD2OvgATmf4zoYstdG4IB5wzoI0AlgT37kuDENIBMQx90ia5-drkNt2Qk0zM6FV6BwtBqylNrWVfTPT4t7gE-m7HRp6Q6noBecdWT2kcuj_uiX746HMTkFvzWtEN1SdGa3-UsUZiAiYSBj_7_oAIgQ3Ag
ContentType Paper
Copyright 2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID 8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
L6V
M7S
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
SciTech Premium Collection
ProQuest Engineering Collection
Engineering Database
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle Publicly Available Content Database
Engineering Database
Technology Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest Engineering Collection
ProQuest One Academic UKI Edition
ProQuest Central Korea
Materials Science & Engineering Collection
ProQuest One Academic
Engineering Collection
DatabaseTitleList Publicly Available Content Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
EISSN 2331-8422
Genre Working Paper/Pre-Print
GroupedDBID 8FE
8FG
ABJCF
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FRJ
HCIFZ
L6V
M7S
M~E
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
ID FETCH-proquest_journals_31274217613
IEDL.DBID BENPR
IngestDate Wed Nov 13 12:29:14 EST 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-proquest_journals_31274217613
OpenAccessLink https://www.proquest.com/docview/3127421761?pq-origsite=%requestingapplication%
PQID 3127421761
PQPubID 2050157
ParticipantIDs proquest_journals_3127421761
PublicationCentury 2000
PublicationDate 20241110
PublicationDateYYYYMMDD 2024-11-10
PublicationDate_xml – month: 11
  year: 2024
  text: 20241110
  day: 10
PublicationDecade 2020
PublicationPlace Ithaca
PublicationPlace_xml – name: Ithaca
PublicationTitle arXiv.org
PublicationYear 2024
Publisher Cornell University Library, arXiv.org
Publisher_xml – name: Cornell University Library, arXiv.org
SSID ssj0002672553
Score 3.5735452
SecondaryResourceType preprint
Snippet Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key...
SourceID proquest
SourceType Aggregation Database
SubjectTerms Embedding
Generative adversarial networks
Image enhancement
Image processing
Image quality
Image transmission
Negotiations
Redundancy
Steganography
Visual aspects
Title DDIM-Driven Coverless Steganography Scheme with Real Key
URI https://www.proquest.com/docview/3127421761
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTEwSLU0sUjVBbZ203RNksyMdS2SLCFp2SAVWIWbg1cT-vqZeYSaeEWYRkAH3IqhyyphZSK4oE7JTwaNkesbG4ImFQ2BvW77gkJd0K1RoNlV6BUazAysRsCeggELA6uTq19AEHyUxcjMHNhmNsYoaMG1h5sgA2tAYkFqkRADU2qeMAM7eNFlcrEIg4WLi6evrksRqMBRcAatpcwBljsKwSWp6Yl50KOkFYKBoZqbqgAaL1UIArbqFLxTK0UZlN1cQ5w9dGHWxUOTRHE8wgPGYgwswL59qgSDArB1YZIMmko0sEg0SQXdgpFoCuqUppkkpaQB6w5JBhl8Jknhl5Zm4DIC1sG64FVrMgwsJUWlqbLAOrQkSY6B2cLNXQ4aXECeb50rAAJPeU0
link.rule.ids 783,787,12777,21400,33385,33756,43612,43817
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTEwSLU0sUjVBbZ203RNksyMdS2SLCFp2SAVWIWbg1cT-vqZeYSaeEWYRkAH3IqhyyphZSK4oE7JTwaNkesbG4ImFQ2BvW77gkJd0K1RoNlV6BUazAysJsbAuhq0U9zNHT7GYmRmDmwxG2MUs-C6w02QgTUgsSC1SIiBKTVPmIEdvOQyuViEwcLFxdNX16UIVNwoOINWUuYASx2F4JLU9MQ86EHSCsHAMM1NVQCNlioEAdt0Ct6plaIMym6uIc4eujDr4qEJojge4XxjMQYWYM8-VYJBAdi2MEkGTSQaWCSapILuwEg0BXVJ00ySUtKANYckgww-k6TwS8szcHqE-PrE-3j6eUszcBkBa2Nd8Po1GQaWkqLSVFlgbVqSJAcOMgAP83jB
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DDIM-Driven+Coverless+Steganography+Scheme+with+Real+Key&rft.jtitle=arXiv.org&rft.au=Yu%2C+Mingyu&rft.au=Miao%2C+Haonan&rft.au=Jin%2C+Zhengping&rft.au=Sujuan+Qing&rft.date=2024-11-10&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422