Open Access
ARTICLE
A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation
1 Department of Computer Science, Faculty of Science, Minia University, Minia, Egypt
2 Department of Computer Science, Faculty of Computers and Artificial Intelligence, Damietta University, New Damietta, Egypt
3 Department of ICT Convergence, Soonchunhyang University, Asan, 31538, Korea
4 Department of Mathematics, Faculty of Science, Mansoura University, Mansoura, 35516, Egypt
5 Department of Computational Mathematics, Science, and Engineering (CMSE), Michigan State University, East Lansing, 48824, MI, USA
* Corresponding Author: Yunyoung Nam. Email:
Computers, Materials & Continua 2023, 74(3), 5087-5103. https://doi.org/10.32604/cmc.2023.035364
Received 18 August 2022; Accepted 03 October 2022; Issue published 28 December 2022
Abstract
The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This system consists of two components. The first component contains two processes, encryption process, and hiding process. The encryption process encrypts secret message bits in the form of a semi-QR code image whereas the hiding process conceals the pregenerated semi-QR code in the generated maze game image. On the other hand, the second component contains two processes, extraction and decryption, which are responsible for extracting the semi-QR code from the maze game image and then retrieving the original secret message from the extracted semi-QR code image, respectively. The results were obtained using the bit error rate (BER) metric. These results confirmed that the system achieved high hiding capacity, good performance, and a high level of robustness against attackers compared with other coverless steganography methods.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.