Open Access iconOpen Access

ARTICLE

crossmark

A Linked List Encryption Scheme for Image Steganography without Embedding

Pengbiao Zhao1, Qi Zhong2, Jingxue Chen1, Xiaopei Wang3, Zhen Qin1, Erqiang Zhou1,*

1 Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, 610054, China
2 Faculty of Data Science, City University of Macau, Macau, 999078, China
3 Department of Computer Science and Engineering, University of California, Riverside, CA 92521, USA

* Corresponding Author: Erqiang Zhou. Email: email

(This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)

Computer Modeling in Engineering & Sciences 2024, 141(1), 331-352. https://doi.org/10.32604/cmes.2024.050148

Abstract

Information steganography has received more and more attention from scholars nowadays, especially in the area of image steganography, which uses image content to transmit information and makes the existence of secret information undetectable. To enhance concealment and security, the Steganography without Embedding (SWE) method has proven effective in avoiding image distortion resulting from cover modification. In this paper, a novel encrypted communication scheme for image SWE is proposed. It reconstructs the image into a multi-linked list structure consisting of numerous nodes, where each pixel is transformed into a single node with data and pointer domains. By employing a special addressing algorithm, the optimal linked list corresponding to the secret information can be identified. The receiver can restore the secret message from the received image using only the list header position information. The scheme is based on the concept of coverless steganography, eliminating the need for any modifications to the cover image. It boasts high concealment and security, along with a complete message restoration rate, making it resistant to steganalysis. Furthermore, this paper proposes linked-list construction schemes within the proposed framework, which can effectively resist a variety of attacks, including noise attacks and image compression, demonstrating a certain degree of robustness. To validate the proposed framework, practical tests and comparisons are conducted using multiple datasets. The results affirm the framework’s commendable performance in terms of message reduction rate, hidden writing capacity, and robustness against diverse attacks.

Keywords


Cite This Article

APA Style
Zhao, P., Zhong, Q., Chen, J., Wang, X., Qin, Z. et al. (2024). A linked list encryption scheme for image steganography without embedding. Computer Modeling in Engineering & Sciences, 141(1), 331-352. https://doi.org/10.32604/cmes.2024.050148
Vancouver Style
Zhao P, Zhong Q, Chen J, Wang X, Qin Z, Zhou E. A linked list encryption scheme for image steganography without embedding. Comput Model Eng Sci. 2024;141(1):331-352 https://doi.org/10.32604/cmes.2024.050148
IEEE Style
P. Zhao, Q. Zhong, J. Chen, X. Wang, Z. Qin, and E. Zhou, “A Linked List Encryption Scheme for Image Steganography without Embedding,” Comput. Model. Eng. Sci., vol. 141, no. 1, pp. 331-352, 2024. https://doi.org/10.32604/cmes.2024.050148



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 411

    View

  • 258

    Download

  • 0

    Like

Share Link