Coverless Image Steganography Method Based on Snellen-Chart Generation

International Journal of Electrical and Electronics Engineering
© 2025 by SSRG - IJEEE Journal
Volume 12 Issue 11
Year of Publication : 2025
Authors : Aziza Hussein, Mohamed Gamal, Ahmed El-Sawy, Al Hussien Seddik
pdf
How to Cite?

Aziza Hussein, Mohamed Gamal, Ahmed El-Sawy, Al Hussien Seddik, "Coverless Image Steganography Method Based on Snellen-Chart Generation," SSRG International Journal of Electrical and Electronics Engineering, vol. 12,  no. 11, pp. 112-123, 2025. Crossref, https://doi.org/10.14445/23488379/IJEEE-V12I11P110

Abstract:

Conventional Image Steganography typically hides data via pixel-level modifications within digital images, a process that can leave detectable statistical traces when analyzed with advanced steganalysis methods. To overcome this, a coverless data hiding method is proposed. Coverless data hiding does not mean there is no cover at all. Image generation is essential for creating a robust coverless steganography system capable of addressing various information hiding challenges effectively. An Image-Generation-Based Coverless Steganography System is presented in this paper for the secure transmission of hidden messages. The generated image resembles the well-known Snellen chart utilized in vision/eye tests, and is therefore referred to as "Eye Vision Test" within the paper. The proposed method has two phases. First, the sender uses a hiding algorithm to create an "Eye Test Image" from the secret message bits. Then, the receiver uses a method to get the original secret message from the Eye Test Image. The paper ends by showing a coverless steganography system based on the proposed algorithms. Tests and analysis demonstrated that the proposed system performed exceptionally well in terms of strength, security, and hiding ability, outperforming other coverless image steganography methods. Testing indicated that the proposed system is capable of hiding 98 bits within each generated cover image while achieving a complete success rate against various attacks, including scaling, compression, and noise. The results indicate that the method utilizing the Snellen chart is superior to existing coverless steganography techniques in terms of robustness, security, and data capacity.

Keywords:

Coverless Information Hiding, Eye Vision Test Sheet Image, Image Steganography, Data Hiding, and Image Generation.

References:

[1] Abbas Cheddad et al., “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90, no. 3, pp. 727-752, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Mehdi Hussain et al., “Image Steganography in Spatial Domain: A Survey,” Signal Processing: Image Communication, vol. 65, pp. 46-66, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Muhammad Bilal et al., “Zero-Steganography using DCT and Spatial Domain,” 2013 ACS International Conference on Computer Systems and Applications (AICCSA), Ifrane, Morocco, pp. 1-7, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Zhou Zhili, Cao Yi, and Sun Xingming, “Coverless Information Hiding based on Bag-of-Words Model of Image,” Journal of Applied Sciences, vol. 34, no. 5, pp. 527-536, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Jiaohua Qin et al., “Coverless Image Steganography: A Survey,” IEEE Access, vol. 7, pp. 171372-171394, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Jian Ye, Jiangqun Ni, and Yang Yi, “Deep Learning Hierarchical Representations for Image Steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 11, pp. 2545-2557, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[7] H.-C. Wu et al., “Image Steganographic Scheme based on Pixel-Value Differencing and LSB Replacement Methods,” IEE Proceedings-Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611-615, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Jarno Mielikainen, “LSB Matching Revisited,” IEEE Signal Processing Letters, vol. 13, no. 5, pp. 285-287, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Neil F. Johnson, and Sushil Jajodia, “Exploring Steganography: Seeing the Unseen,” Computer, vol. 31, no. 2, pp. 26-34, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Zhuo Li et al., “Lossless Data Hiding Scheme based on Adjacent Pixel Difference,” 2009 International Conference on Computer Engineering and Technology, Singapore, pp. 588-592, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Paul Alvarez, “Using Extended file Information (EXIF) File Headers in Digital Evidence Analysis,” International Journal of Digital Evidence, vol. 2, no. 3, pp. 1-5, 2004.
[Google Scholar] [Publisher Link]
[12] Wen-Yuan Chen, “Color Image Steganography Scheme using set Partitioning in Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation,” Applied Mathematics and Computation, vol. 185, no. 1, pp. 432-448, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Robert T. McKeon, “Strange Fourier Steganography in Movies,” 2007 IEEE International Conference on Electro/Information Technology, Chicago, IL, USA, pp. 178-182, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[14] I.J. Cox et al., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
[CrossRef] [Google Scholar] [Publisher Link]
[15] C.C. Chang, T.D. Kieu, and Y.C. Chou, “Reversible Information Hiding for VQ Indices based on Locally Adaptive Coding,” Journal of Visual Communication and Image Representation, vol. 20, pp. 57-64, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Weiqi Luo, Fangjun Huang, and Jiwu Huang, “Edge Adaptive Image Steganography based on LSB Matching Revisited,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 5, pp. 201-214, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Yuanjing Luo et al., “Coverless Image Steganography based on Image Segmentation,” Computers, Materials and Continua, vol. 64, no. 2, pp. 1281-1295, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Xiang Zhang, Fei Peng, and Min Long, “Robust Coverless Image Steganography based on DCT and LDA Topic Classification,” IEEE Transactions on Multimedia, vol. 20, no. 12, pp. 3223-3238, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Shuli Zheng et al., “Coverless Information Hiding based on Robust Image Hashing,” International Conference on Intelligent Computing, Liverpool, United Kingdom, pp. 536-547, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Zhili Zhou et al., “Coverless Image Steganography without Embedding,” International Conference on Cloud Computing and Security, Nanjing, China, pp. 123-132, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Xintao Duan et al., “Coverless Steganography for Digital Images based on a Generative Model,” Computers, Materials & Continua, vol. 55, no. 3, pp. 483-493, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Jianbin Wu et al., “A Coverless Information Hiding Algorithm based on Grayscale Gradient Co-Occurrence Matrix,” IETE Technical Review, vol. 35, no. sup1, pp. 23-33, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Al Hussien Seddik Saad, M.S. Mohamed, and E.H. Hafez, “Coverless Image Steganography based on Jigsaw Puzzle Image Generation,” Computers, Materials & Continua, vol. 67, no. 2, pp. 2077-2091, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Xianyi Chen et al., “Novel Coverless Steganography Method based on Image Selection and StarGAN,” IEEE Transactions on Network Science and Engineering, vol. 9, no. 1, pp. 219-230, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Al Hussien S. Saad, M.S. Mohamed, and Eslam H. Hafez, “Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning,” IEEE Access, vol. 9, pp. 16522-16531, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Liming Zou et al., “A Novel Coverless Information Hiding Method based on the Average Pixel Value of the Sub-Images,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 7965-7980, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Marcio Zapparoli, Fernando Klein, and Hamilton Moreira, “Snellen Visual Acuity Evaluation,” Brazilian Archives of Ophthalmology, vol. 72, no. 6, pp. 783-788, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Yi Cao et al., “Coverless Information Hiding based on the Generation of Anime Characters,” EURASIP Journal on Image and Video Processing, vol. 2020, no. 1, pp. 1-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Qiang Liu et al., “Coverless Steganography based on Image Retrieval of DenseNet Features and DWT Sequence Mapping,” Knowledge-Based Systems, vol. 192, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Xiyao Liu et al., “Robust Coverless Steganography using Limited Mapping Images,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 7, pp. 4472-4482, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Yung-Hui Li et al., “Coverless Image Steganography using Morphed Face Recognition based on Convolutional Neural Network,” EURASIP Journal on Wireless Communications and Networking, vol. 2022, no. 1, pp. 1-21, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Mohammed Salah Reda et al., “Information Hiding using Coverless Steganography System based on Image Generation,” Scientific Journal for Damietta Faculty of Science, vol. 12, no. 1, pp. 39-49, 2022.
[CrossRef] [Google Scholar] [Publisher Link]