DDIM-Driven Coverless Steganography Scheme with Real Key
Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key factor in scheme evaluation, conventional methods aim to balance this requirement with embedding capacity. Consequently, integrating emerging i...
Saved in:
Published in | arXiv.org |
---|---|
Main Authors | , , , |
Format | Paper |
Language | English |
Published |
Ithaca
Cornell University Library, arXiv.org
10.11.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key factor in scheme evaluation, conventional methods aim to balance this requirement with embedding capacity. Consequently, integrating emerging image generation models and secret transmission has been extensively explored to achieve a higher embedding capacity. Previous works mostly focus on generating stego-images with Generative Adversarial Networks (GANs) and usually rely on pseudo-keys, namely conditions or parameters involved in the generation process, which are related to secret images. However, studies on diffusion-based coverless steganography remain insufficient. In this work, we leverage the Denoising Diffusion Implicit Model (DDIM) to generate high-quality stego-images without introducing pseudo-keys, instead employing real keys to enhance security. Furthermore, our method offers low-image-correlation real-key protection by incorporating chaotic encryption. Another core innovation is that our method requires only one-time negotiation for multiple communications, unlike prior methods that necessitate negotiation for each interaction. |
---|---|
AbstractList | Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key factor in scheme evaluation, conventional methods aim to balance this requirement with embedding capacity. Consequently, integrating emerging image generation models and secret transmission has been extensively explored to achieve a higher embedding capacity. Previous works mostly focus on generating stego-images with Generative Adversarial Networks (GANs) and usually rely on pseudo-keys, namely conditions or parameters involved in the generation process, which are related to secret images. However, studies on diffusion-based coverless steganography remain insufficient. In this work, we leverage the Denoising Diffusion Implicit Model (DDIM) to generate high-quality stego-images without introducing pseudo-keys, instead employing real keys to enhance security. Furthermore, our method offers low-image-correlation real-key protection by incorporating chaotic encryption. Another core innovation is that our method requires only one-time negotiation for multiple communications, unlike prior methods that necessitate negotiation for each interaction. |
Author | Jin, Zhengping Sujuan Qing Yu, Mingyu Miao, Haonan |
Author_xml | – sequence: 1 givenname: Mingyu surname: Yu fullname: Yu, Mingyu – sequence: 2 givenname: Haonan surname: Miao fullname: Miao, Haonan – sequence: 3 givenname: Zhengping surname: Jin fullname: Jin, Zhengping – sequence: 4 fullname: Sujuan Qing |
BookMark | eNqNyr0OgjAUQOHGaCIq79DEmYTeAmUHjca4CDtpzJWf1BZbwPD2OvgATmf4zoYstdG4IB5wzoI0AlgT37kuDENIBMQx90ia5-drkNt2Qk0zM6FV6BwtBqylNrWVfTPT4t7gE-m7HRp6Q6noBecdWT2kcuj_uiX746HMTkFvzWtEN1SdGa3-UsUZiAiYSBj_7_oAIgQ3Ag |
ContentType | Paper |
Copyright | 2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ L6V M7S PIMPY PQEST PQQKQ PQUKI PRINS PTHSS |
DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea SciTech Premium Collection ProQuest Engineering Collection Engineering Database Publicly Available Content Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection |
DatabaseTitle | Publicly Available Content Database Engineering Database Technology Collection ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest One Academic Engineering Collection |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
EISSN | 2331-8422 |
Genre | Working Paper/Pre-Print |
GroupedDBID | 8FE 8FG ABJCF ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS AZQEC BENPR BGLVJ CCPQU DWQXO FRJ HCIFZ L6V M7S M~E PIMPY PQEST PQQKQ PQUKI PRINS PTHSS |
ID | FETCH-proquest_journals_31274217613 |
IEDL.DBID | BENPR |
IngestDate | Wed Nov 13 12:29:14 EST 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-proquest_journals_31274217613 |
OpenAccessLink | https://www.proquest.com/docview/3127421761?pq-origsite=%requestingapplication% |
PQID | 3127421761 |
PQPubID | 2050157 |
ParticipantIDs | proquest_journals_3127421761 |
PublicationCentury | 2000 |
PublicationDate | 20241110 |
PublicationDateYYYYMMDD | 2024-11-10 |
PublicationDate_xml | – month: 11 year: 2024 text: 20241110 day: 10 |
PublicationDecade | 2020 |
PublicationPlace | Ithaca |
PublicationPlace_xml | – name: Ithaca |
PublicationTitle | arXiv.org |
PublicationYear | 2024 |
Publisher | Cornell University Library, arXiv.org |
Publisher_xml | – name: Cornell University Library, arXiv.org |
SSID | ssj0002672553 |
Score | 3.5735452 |
SecondaryResourceType | preprint |
Snippet | Typical steganography embeds secret information into images by exploiting their redundancy. Since the visual imperceptibility of secret information is a key... |
SourceID | proquest |
SourceType | Aggregation Database |
SubjectTerms | Embedding Generative adversarial networks Image enhancement Image processing Image quality Image transmission Negotiations Redundancy Steganography Visual aspects |
Title | DDIM-Driven Coverless Steganography Scheme with Real Key |
URI | https://www.proquest.com/docview/3127421761 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTEwSLU0sUjVBbZ203RNksyMdS2SLCFp2SAVWIWbg1cT-vqZeYSaeEWYRkAH3IqhyyphZSK4oE7JTwaNkesbG4ImFQ2BvW77gkJd0K1RoNlV6BUazAysRsCeggELA6uTq19AEHyUxcjMHNhmNsYoaMG1h5sgA2tAYkFqkRADU2qeMAM7eNFlcrEIg4WLi6evrksRqMBRcAatpcwBljsKwSWp6Yl50KOkFYKBoZqbqgAaL1UIArbqFLxTK0UZlN1cQ5w9dGHWxUOTRHE8wgPGYgwswL59qgSDArB1YZIMmko0sEg0SQXdgpFoCuqUppkkpaQB6w5JBhl8Jknhl5Zm4DIC1sG64FVrMgwsJUWlqbLAOrQkSY6B2cLNXQ4aXECeb50rAAJPeU0 |
link.rule.ids | 783,787,12777,21400,33385,33756,43612,43817 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTEwSLU0sUjVBbZ203RNksyMdS2SLCFp2SAVWIWbg1cT-vqZeYSaeEWYRkAH3IqhyyphZSK4oE7JTwaNkesbG4ImFQ2BvW77gkJd0K1RoNlV6BUazAysJsbAuhq0U9zNHT7GYmRmDmwxG2MUs-C6w02QgTUgsSC1SIiBKTVPmIEdvOQyuViEwcLFxdNX16UIVNwoOINWUuYASx2F4JLU9MQ86EHSCsHAMM1NVQCNlioEAdt0Ct6plaIMym6uIc4eujDr4qEJojge4XxjMQYWYM8-VYJBAdi2MEkGTSQaWCSapILuwEg0BXVJ00ySUtKANYckgww-k6TwS8szcHqE-PrE-3j6eUszcBkBa2Nd8Po1GQaWkqLSVFlgbVqSJAcOMgAP83jB |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=DDIM-Driven+Coverless+Steganography+Scheme+with+Real+Key&rft.jtitle=arXiv.org&rft.au=Yu%2C+Mingyu&rft.au=Miao%2C+Haonan&rft.au=Jin%2C+Zhengping&rft.au=Sujuan+Qing&rft.date=2024-11-10&rft.pub=Cornell+University+Library%2C+arXiv.org&rft.eissn=2331-8422 |