{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:47:35Z","timestamp":1757544455395,"version":"3.37.3"},"reference-count":51,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736121","KCJJ2019-2"],"award-info":[{"award-number":["U1736121","KCJJ2019-2"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Wuhan Maritime Communication Research Institute","award":["U1736121","KCJJ2019-2"],"award-info":[{"award-number":["U1736121","KCJJ2019-2"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,1,16]]},"abstract":"<jats:p>Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the Internet. These icons can be used as the training subset, and the hot news can be designed according to construction rules. Secondly, the Alex-Net network is introduced for training in the algorithm, and the adversarial samples are added to the training set. Thirdly, using the preset template, certain small icons and a hot news image are spliced into a secret carrier image according to the construction principle. The hot news image is in the top half of the carrier, and those small icons are in the bottom half. The image on the upper part of the carrier and the icons of the lower part can be connected by image and text semantics, and the semantic matching can be realized between image semantics and explanatory. The experimental results and analysis show that the proposed algorithm can resist steganalysis tools effectively and has good robustness against various image attacks. Meanwhile, the secret information payload has been greatly improved, the maximum payload can reach 180\u2009bits of a single <jats:inline-formula>\n                     <a:math xmlns:a=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\">\n                        <a:mn>512<\/a:mn>\n                        <a:mo>\u00d7<\/a:mo>\n                        <a:mn>512<\/a:mn>\n                     <\/a:math>\n                  <\/jats:inline-formula> image. This promising algorithm can be applied to build covert communications.<\/jats:p>","DOI":"10.1155\/2021\/6628034","type":"journal-article","created":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T02:35:07Z","timestamp":1610850907000},"page":"1-12","source":"Crossref","is-referenced-by-count":5,"title":["Multimedia Communication Security in 5G\/6G Coverless Steganography Based on Image Text Semantic Association"],"prefix":"10.1155","volume":"2021","author":[{"given":"Yajing","family":"Hao","sequence":"first","affiliation":[{"name":"College of Physics Science and Technology, Central China Normal University, Wuhan 430079, China"}]},{"given":"Xinrong","family":"Yan","sequence":"additional","affiliation":[{"name":"Wuhan Maritime Communication Research Institute, Wuhan 430079, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0728-2384","authenticated-orcid":true,"given":"Jianbin","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Physics Science and Technology, Central China Normal University, Wuhan 430079, China"}]},{"given":"Huijun","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan Maritime Communication Research Institute, Wuhan 430079, China"}]},{"given":"Linfeng","family":"Yuan","sequence":"additional","affiliation":[{"name":"Wuhan Maritime Communication Research Institute, Wuhan 430079, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-3-319-27051-7_12","article-title":"Coverless information hiding method based on the Chinese mathematical expression","volume-title":"International Conference on Cloud Computing and Security","author":"X. Chen","year":"2015"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105375"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4946-9"},{"key":"4","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","article-title":"Coverless image steganography without embedding","volume-title":"International Conference on Cloud Computing and Security","author":"Z. Zhou","year":"2015"},{"issue":"2","key":"5","first-page":"313","article-title":"Coverless information hiding method based on the Chinese character encoding","volume":"18","author":"X. Chen","year":"2017","journal-title":"Journal of Internet Technology"},{"key":"6","first-page":"1179","article-title":"Dynamic content selection framework applied to coverless information hiding","volume":"19","author":"Y. Cao","year":"2018","journal-title":"Journal of Internet Technology"},{"key":"7","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1007\/978-3-030-00015-8_37","article-title":"Steganography by constructing marbling texture","volume-title":"International Conference on Cloud Computing and Security","author":"Z. Qian","year":"2018"},{"key":"8","article-title":"Researchers at Hunan University of Finance & Economics have reported new data on information and data security (coverless image steganography: a survey)","author":"Information Technology\u2014Information and Data Security","year":"2020","journal-title":"Computers, Networks & Communications"},{"issue":"10","key":"9","first-page":"111","article-title":"Research on semi-structured text information extraction algorithm based on improved HMM","volume":"27","author":"S. Sun","year":"2014","journal-title":"Electronic Science and Technology"},{"volume-title":"Coverless Information Hiding Based on Generative Model","year":"2018","author":"H. Song","key":"10"},{"issue":"9","key":"11","first-page":"39","article-title":"FP-CNNH: a fast image hashing algorithm based on deep convolutional neural network","volume":"43","author":"Y. Liu","year":"2016","journal-title":"Computer Science"},{"key":"12","first-page":"536","article-title":"Coverless information hiding based on robust image hashing","volume-title":"International Conference on Intelligent Computing","author":"S. Zheng","year":"2017"},{"volume-title":"Research on Coverless Information Hiding Algorithm","year":"2019","author":"Z. Wang","key":"13"},{"author":"Y. Cao","key":"14","article-title":"Information hiding based on cartoon images"},{"author":"J. Wu","key":"15","article-title":"Coverless information hiding algorithm based on image coding and stitching"},{"key":"16","first-page":"1","article-title":"A coverless information hiding algorithm based on grayscale gradient co-occurrence matrix","volume":"35","author":"J. Wu","year":"2018","journal-title":"IETE Technical Review"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.08.013"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6444-0"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2018.1475267"},{"issue":"24","key":"20","first-page":"4","article-title":"Research on modified information hiding technology based on carrier","volume":"15","author":"L. Zhao","year":"2017","journal-title":"Science and Technology Information"},{"key":"21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-50209-0_3","volume-title":"Behavior Steganography in Social Network","author":"X. Zhang","year":"2017"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3286-7"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-48671-0_4","article-title":"Coverless information hiding method based on multi-keywords","volume-title":"Cloud Computing and Security","author":"Z. Zhou","year":"2016"},{"issue":"12","key":"24","first-page":"25","article-title":"A coverless information hiding method based on image classification","volume":"46","author":"J. Wu","year":"2019","journal-title":"Journal of Hunan University (Natural Science Edition)"},{"key":"25","first-page":"1097","article-title":"ImageNet classification with deep convolutional neural networks","volume":"60","author":"A. Krizhevsky","year":"2012","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"6","key":"26","first-page":"73","article-title":"Animal picture classification based on AlexNet network","volume":"36","author":"D. Zhou","year":"2019","journal-title":"Journal of Guizhou University (Natural Science Edition)"},{"issue":"1","key":"27","first-page":"92","article-title":"Classification of ancient murals based on feature fusion with AlexNet model","volume":"25","author":"J. Cao","year":"2020","journal-title":"Journal of Image and Graphics of China"},{"key":"28","first-page":"7","article-title":"A new deep learning model based on improved AlexNet for radiation source target recognition","volume":"5","author":"X. Xu","year":"2018","journal-title":"International Association of Applied Science and Engineering"},{"key":"29","article-title":"Very deep convolutional networks for large-scale image recognition","volume-title":"International Conference on Learning Representations","author":"K. Simonyan","year":"2015"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"31","first-page":"770","article-title":"Deep residual learning for image recognition","author":"K. He","year":"2016"},{"issue":"2","key":"32","first-page":"442","article-title":"Stochastic gradient descent algorithm based on convolution neural network","volume":"39","author":"G. Wang","year":"2018","journal-title":"Computer Engineering and Design"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2020.107375"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2013.167"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2720603"},{"volume-title":"Hybrid Heterogeneous Transfer Learning through Deep Learning","year":"2014","author":"J. Zhou","key":"36"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-019-01268-4"},{"volume-title":"Information Carrier\u2019s Text Information Hiding Technology","year":"2017","author":"Y. Liu","key":"38"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07994-3"},{"issue":"5","key":"40","first-page":"193","article-title":"Simulation Study on Handwritten numeral recognition based on deep neural network","volume":"19","author":"X. Song","year":"2019","journal-title":"Science Technology and Engineering"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1415-y"},{"issue":"5","key":"42","first-page":"174","article-title":"Zero-steganography algorithm research based on chaotic sequences and image DCT transform","volume":"40","author":"J. Wu","year":"2017","journal-title":"Electronic Measurement Technology"},{"author":"Y. Wang","key":"43","article-title":"A coding scheme base on deep learning in coverless information hiding"},{"issue":"3","key":"44","first-page":"48","article-title":"An intelligent mapping relation search method for information hiding without carrier","volume":"5","author":"Y. Wang","year":"2020","journal-title":"Chinese Journal of Information Security"},{"key":"45","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-319-27051-7_11","article-title":"Coverless image steganography without embedding","volume-title":"Cloud Computing and Security","author":"Z. Zhou","year":"2015"},{"issue":"2","key":"46","first-page":"197","article-title":"Coverless information hiding based on the molecular structure images of material","volume":"54","author":"Y. Cao","year":"2018","journal-title":"Computers, Materials & Continua"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3151-8"},{"issue":"12","key":"48","doi-asserted-by":"crossref","first-page":"3223","DOI":"10.1109\/TMM.2018.2838334","article-title":"Robust coverless image steganography based on DCT and LDA topic classification","volume":"20","author":"X. Zhang","year":"2018","journal-title":"IEEE Transactions on Multimedia"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08476-2"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6584-2"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08221-9"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6628034.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6628034.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6628034.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T02:35:18Z","timestamp":1610850918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6628034\/"}},"subtitle":[],"editor":[{"given":"Jinwei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1,16]]},"references-count":51,"alternative-id":["6628034","6628034"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6628034","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,1,16]]}}}