A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seddik, Al-Hussien | - |
dc.contributor.author | Salah, Mohammed | - |
dc.contributor.author | Behery, Gamal | - |
dc.contributor.author | El-harby, Ahmed | - |
dc.contributor.author | Ismail Ebada, Ahmed | - |
dc.contributor.author | Teng, Sokea | - |
dc.contributor.author | Nam, Yunyoung | - |
dc.contributor.author | Abouhawwash, Mohamed | - |
dc.date.accessioned | 2023-04-25T02:40:41Z | - |
dc.date.available | 2023-04-25T02:40:41Z | - |
dc.date.issued | 2023-01 | - |
dc.identifier.issn | 1546-2218 | - |
dc.identifier.issn | 1546-2226 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/22255 | - |
dc.description.abstract | The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured cov-erless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This sys-tem consists of two components. The first component contains two processes, encryption process, and hiding process. The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image. On the other hand, the second component contains two processes, extraction and decryption, which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image, respectively. The results were obtained using the bit error rate (BER) metric. These results confirmed that the system achieved high hiding capacity, good performance, and a high level of robustness against attackers compared with other coverless steganography methods. | - |
dc.format.extent | 17 | - |
dc.publisher | Tech Science Press | - |
dc.title | A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.32604/cmc.2023.035364 | - |
dc.identifier.scopusid | 2-s2.0-85145260753 | - |
dc.identifier.wosid | 000950629100009 | - |
dc.identifier.bibliographicCitation | Computers, Materials and Continua, v.74, no.3, pp 5087 - 5103 | - |
dc.citation.title | Computers, Materials and Continua | - |
dc.citation.volume | 74 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 5087 | - |
dc.citation.endPage | 5103 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Materials Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Materials Science, Multidisciplinary | - |
dc.subject.keywordAuthor | Coverless steganography | - |
dc.subject.keywordAuthor | data hiding | - |
dc.subject.keywordAuthor | information security | - |
dc.subject.keywordAuthor | QR code | - |
dc.subject.keywordAuthor | maze game | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.