A Taxonomy-Driven Survey of Deep Learning-Based Semantic Mapping Methods for Coverless Steganography

Yaseen Hikmat IsmaielDepartment of Computer Science, College of Computer Sciences and Mathematics, University of Mosul, Mosul, IraqAli Farag SultanDepartment of Computer Science, College of Computer Sciences and Mathematics, University of Mosul, Mosul, IraqSadiq Sardar SadiqDepartment of Computer Science, College of Computer Sciences and Mathematics, University of Mosul, Mosul, IraqQutaiba Salim MuradDepartment of Computer Science, College of Computer Sciences and Mathematics, University of Mosul, Mosul, IraqAhmed Waad MohammedDepartment of Computer Science, College of Computer Sciences and Mathematics, University of Mosul, Mosul, Iraq

Vol 10 No 5 (2026): Volume 10, Issue 5, May 2026 | Pages: 61-70

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 07-05-2026

doi Logo doi.org/10.47001/IRJIET/2026.105009

Abstract

Coverless steganography has emerged as a promising alternative to traditional information hiding techniques by eliminating direct modification of carrier media. Recently, deep learning (DL) has enabled a new paradigm known as deep semantic mapping, where secret information is encoded through high-level semantic representations extracted from images rather than pixel-level embedding. This approach significantly improves resistance against modern steganalysis methods based on statistical and neural network analysis. In this study, we aim to provide a systematic taxonomy and comparative analysis of deep learning-based coverless steganography methods with a focus on semantic mapping techniques. A comprehensive systematic survey of recent literature (2019 onward) is conducted, covering retrieval-based methods, generative adversarial networks (GANs), diffusion models, and Vision Transformer (ViT)-based approaches. A structured taxonomy is developed to classify existing methods into retrieval-based, generative-based, diffusion-based, transformer-based, and hybrid semantic mapping frameworks. A comparative analysis is performed based on accuracy, payload capacity, robustness, and visual quality. The analysis reveals a clear evolution from database-driven retrieval systems to advanced generative and transformer-based architectures. Recent diffusion and ViT-based models demonstrate superior robustness against compression, noise, and steganalysis attacks while maintaining high visual fidelity and improved semantic consistency. Deep semantic mapping significantly enhances the security and efficiency of coverless steganography. However, challenges remain in balancing payload capacity, computational complexity, and adversarial robustness. Future research should focus on hybrid architectures and real-time lightweight semantic encoding models.

Keywords

Coverless steganography, Deep semantic mapping, Information hiding, Diffusion models, Vision Transformers


Citation of this Article

Yaseen Hikmat Ismaiel, Ali Farag Sultan, Sadiq Sardar Sadiq, Qutaiba Salim Murad, & Ahmed Waad Mohammed. (2026). A Taxonomy-Driven Survey of Deep Learning-Based Semantic Mapping Methods for Coverless Steganography. International Research Journal of Innovations in Engineering and Technology - IRJIET, 10(5), 61-70. Article DOI https://doi.org/10.47001/IRJIET/2026.105009

References
  1. Y. A. Hamza and W. M. Abduallah, "A Secured Method of Reversible Data Hiding," 2020 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 2020, pp. 61-66, doi: 10.1109/CSASE48920.2020.9142098.
  2. Y. H. Ismael, “Improved security using two levels of steganography,” AIP Conference Proceedings, vol. 3264, no. 1, p. 030010, Mar. 2025, doi: 10.1063/5.0259914.
  3. J. Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications,” IEEE Signal Processing Magazine, vol. 36, no. 5, pp. 12–20, 2019.
  4. B. Li, M. Wang, J. Huang, and X. Li, “A New Cost Function for Spatial Image Steganography,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 512–526, 2019.
  5. Y. Qian, J. Dong, W. Wang, and T. Tan, “Deep Learning for Steganalysis via Convolutional Neural Networks,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 124–135, 2020.
  6. D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, “A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks,” IEEE Access, vol. 8, pp. 148948–148963, 2020.
  7. X. Zhang, F. Peng, and M. Long, “Robust Coverless Image Steganography Based on Image Retrieval and CNN Features,” Multimedia Tools and Applications, vol. 79, pp. 25991–26011, 2020.
  8. T. Karras, S. Laine, M. Aittala, J. Hellsten, J. Lehtinen, and T. Aila, “Analyzing and Improving the Image Quality of StyleGAN,” in Proc. CVPR, 2020.
  9. Jolicoeur-Martineau, “The relativistic discriminator: a key element missing from standard GAN,” International Conference on Learning Representations (ICLR), 2020.
  10. J. Ho, A. Jain, and P. Abbeel, “Denoising Diffusion Probabilistic Models,” in Advances in Neural Information Processing Systems (NeurIPS), 2020.
  11. Dosovitskiy et al., “An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale,” in Proc. ICLR, 2021.
  12. Saharia et al., “Image Super-Resolution via Iterative Refinement,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022.
  13. H. Wu, Y. Shi, and H. Wang, “Deep Learning-Based Robust Image Steganography Using GANs,” IEEE Access, vol. 9, pp. 39821–39832, 2021.
  14. P. Dhariwal and A. Nichol, “Diffusion Models Beat GANs on Image Synthesis,” in NeurIPS, 2021.
  15. Z. Zhang, Y. Chen, and F. Huang, “Coverless Image Steganography Based on Deep Learning,” Signal Processing, vol. 187, 2021.
  16. S. Tan and B. Li, “Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 454–467, 2021.
  17. R. Rombach, A. Blattmann, D. Lorenz, P. Esser, and B. Ommer, “High-Resolution Image Synthesis with Latent Diffusion Models,” in CVPR, 2022.
  18. Y. Chen, Z. He, and L. Wang, “Vision Transformer-Based Secure Image Representation for Information Hiding,” Pattern Recognition Letters, vol. 167, pp. 10–18, 2023.
  19. K. He, X. Zhang, S. Ren, and J. Sun, “Deep Residual Learning for Image Recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022.
  20. Y. Luo, J. Qin, and Y. Xiang, “Coverless Information Hiding Based on Generative Models,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 32, no. 6, pp. 3456–3469, 2022.
  21. J. Wang, L. Liu, and S. Xiang, “A Survey on Coverless Information Hiding,” ACM Computing Surveys, vol. 55, no. 3, pp. 1–36, 2023.
  22. H. Zhang, Y. Li, and X. Zhang, “Diffusion-Based Image Steganography with High Robustness,” IEEE Signal Processing Letters, vol. 30, pp. 450–454, 2023.
  23. X. Liu, Q. Wu, and W. Zhang, “Hybrid Deep Learning Framework for Secure Image Steganography,” IEEE Access, vol. 11, pp. 98765–98780, 2023.
  24. Y. A. Hamza, N. E. Tewfiq, and M. Q. Ahmed, “An enhanced approach of image steganographic using discrete shearlet transform and secret sharing,” Baghdad Science Journal, vol. 19, no. 1, Art. no. 2, 2022, doi: 10.21123/bsj.2022.19.1.0197.
  25. OpenAI, “DALL·E 2: Hierarchical Text-Conditional Image Generation with CLIP Latents,” 2022.
  26. Stability AI, “Stable Diffusion: High-Resolution Image Synthesis with Latent Diffusion Models,” 2023.
  27. K. Nichol and P. Dhariwal, “Improved Denoising Diffusion Probabilistic Models,” in ICML, 2021.
  28. Y. LeCun, Y. Bengio, and G. Hinton, “Deep Learning,” Nature, vol. 521, pp. 436–444, updated perspectives 2020.