A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
- Authors
- Seddik, Al-Hussien; Salah, Mohammed; Behery, Gamal; El-harby, Ahmed; Ismail Ebada, Ahmed; Teng, Sokea; Nam, Yunyoung; Abouhawwash, Mohamed
- Issue Date
- Jan-2023
- Publisher
- Tech Science Press
- Keywords
- Coverless steganography; data hiding; information security; QR code; maze game
- Citation
- Computers, Materials and Continua, v.74, no.3, pp 5087 - 5103
- Pages
- 17
- Journal Title
- Computers, Materials and Continua
- Volume
- 74
- Number
- 3
- Start Page
- 5087
- End Page
- 5103
- URI
- https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/22255
- DOI
- 10.32604/cmc.2023.035364
- ISSN
- 1546-2218
1546-2226
- Abstract
- The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured cov-erless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This sys-tem consists of two components. The first component contains two processes, encryption process, and hiding process. The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image. On the other hand, the second component contains two processes, extraction and decryption, which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image, respectively. The results were obtained using the bit error rate (BER) metric. These results confirmed that the system achieved high hiding capacity, good performance, and a high level of robustness against attackers compared with other coverless steganography methods.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - College of Engineering > Department of Computer Science and Engineering > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/22255)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.