Research Article

A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features

Table 1

Comparison of the two types of coverless image steganography algorithms.

AlgorithmIs there a one-to-one correspondence between images and hash values?Rely on generating a hash sequence based on the image?Necessary to manually establish a mapping rule?Need a large image database?

Generative-based coverless image steganographyYesYesNoYes
Mapping-based coverless image steganographyYesNoYesNo