JOURNAL ARTICLE

Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

Al-Hussien SeddikM. S. MohamedE. H. Hafez

Year: 2021 Journal:   Computers, materials & continua/Computers, materials & continua (Print) Vol: 67 (2)Pages: 2077-2091

Abstract

Current image steganography methods are working by assigning an image as a cover file then embed the payload within it by modifying its pixels, creating the stego image. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. A coverless data hiding concept is proposed to solve this issue. Coverless does not mean that cover is not required, or the payload can be transmitted without a cover. Instead, the payload is embedded by cover generation or a secret message mapping between the cover file and the payload. In this paper, a new coverless image steganography method has been proposed based on the jigsaw puzzle image generation driven by a secret message. Firstly, the image is divided into equal rows then further divided into equal columns, creating blocks (i.e., sub-images). Then, according to secret message bits and a proposed mapping function, each block will have tabs/blanks to get the shape of a puzzle piece creating a fully shaped jigsaw puzzle stego-image. After that, the generated jigsaw puzzle image is sent to the receiver. Experimental results and analysis show a good performance in the hiding capacity, security, and robustness compared with existing coverless image steganography methods.

Keywords:
Steganography Payload (computing) Steganalysis Cover (algebra) Jigsaw Computer science Robustness (evolution) Image (mathematics) Information hiding Pixel Block (permutation group theory) Steganography tools Artificial intelligence Computer vision Mathematics Computer security Engineering

Metrics

16
Cited By
1.23
FWCI (Field Weighted Citation Impact)
35
Refs
0.80
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Digital Media Forensic Detection
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Biometric Identification and Security
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Coverless Image Steganography Based on Image Segmentation

Yuanjing LuoJiaohua QinXuyu XiangYun TanZhibin HeNaixue Xiong

Journal:   Computers, materials & continua/Computers, materials & continua (Print) Year: 2020 Vol: 64 (2)Pages: 1281-1295
JOURNAL ARTICLE

Coverless Image Steganography Based on Semantic-Controlled Text-to-Image Generation

Li XiaoLiquan ChenTong FuZhangjie FuYuan Gao

Journal:   IEEE Transactions on Circuits and Systems for Video Technology Year: 2025 Vol: 35 (8)Pages: 8391-8405
JOURNAL ARTICLE

Coverless Image Steganography Method Based on Snellen-Chart Generation

Aziza I. HusseinMohamed GamalA. M. El-SawyAl Hussien Seddik

Journal:   International Journal of Electrical and Electronics Engineering Year: 2025 Vol: 12 (11)Pages: 112-123
JOURNAL ARTICLE

Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction

Liming ZouJing LiWenbo WanQ. M. Jonathan WuJiande Sun

Journal:   IEEE Transactions on Multimedia Year: 2022 Vol: 25 Pages: 5552-5564
© 2026 ScienceGate Book Chapters — All rights reserved.