A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Digital Image Steganography
2019
Journal of Information Hiding and Privacy Protection
.; Li, B. (2018): A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access, vol. 6, pp. 38303-38314. Kekre, H. B.; Athawale, A. A.; Athawale, U. ...
Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. ...
[Zhang, Dong and Liu (2018) ] proposed ISGAN (Invisible Steganography via Generative Adversarial Networks) by introducing the steganalysis network proposed by Xu et al. ...
doi:10.32604/jihpp.2019.07189
fatcat:6dnb6vpepjfhfkl45e46pkggha
Recent Advances of Image Steganography with Generative Adversarial Networks
2020
IEEE Access
We discuss the characteristics of the three strategies of GAN-based steganography and analyze their evaluation metrics. ...
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. ...
EMBEDDING AS ADVERSARIAL SAMPLES Some researchers have also designed steganography with the idea of adversarial examples [87] . ...
doi:10.1109/access.2020.2983175
fatcat:fdakxe2m2rbcjdcebszweripta
Introduction to the special issue on deep learning for real-time information hiding and forensics
2020
Journal of Real-Time Image Processing
Furthermore, a multi-domain loss function is developed to enhance the recognition ability of indepth learning features. ...
Image steganalysis Image steganalysis can be regarded as the adversary to steganography, and it aims to detect whether an image contains secret data or not. ...
doi:10.1007/s11554-020-00947-2
fatcat:ge4olggcubhm3nouy4bkphezvu
Coverless Image Steganography: A Survey
2019
IEEE Access
Therefore, it radically resist the detection of steganalysis tools and significantly improves the security of the image. ...
The existing methods are evaluated and the prospect of future work is also summarized. INDEX TERMS Steganography, coverless image steganography, information hiding, information security. ...
These methods are used to test the anti-steganalysis ability of coverless steganography will be described in Section V.
C. ...
doi:10.1109/access.2019.2955452
fatcat:uu7wjgrolndlvp2he2rpescyfq
Convolutional Video Steganography with Temporal Residual Modeling
[article]
2018
arXiv
pre-print
Second, we develop the model based on deep convolutional neural networks, which is the first of its kind in the literature of video steganography. ...
Steganography represents the art of unobtrusively concealing a secrete message within some cover data. ...
The curves indicate how many leaked training samples are needed for an adversary to distinguish a container from a cover, which reflects the anti-steganalysis ability of a model. ...
arXiv:1806.02941v1
fatcat:hvgesosg5jah5i2ahge7jynplq
An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography
2019
Symmetry
The performance of our steganography scheme is good in steganographic capacity, anti-steganalysis, security, and robustness. ...
However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis possible ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/sym11091152
fatcat:naibk5xc25b4tmyl7rrxrblt3u
Information Forensics and Security: A quarter-century-long journey
[article]
2023
arXiv
pre-print
For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information era. ...
of solid evidence to hold perpetrators accountable. ...
STEGANOGRAPHY AND STEGANALYSIS Steganography is a tool for private covert communication. ...
arXiv:2309.12159v1
fatcat:b63earpxefdkpatbsozfanfvcy
LLsM: Generative Linguistic Steganography with Large Language Model
[article]
2024
arXiv
pre-print
Experiments show that LLsM performs superior to prevalent LS and related-task baselines regarding various kinds of concealment and anti-steganalysis. ...
LLsM's MAUVE surpasses baselines by 60%-80% and anti-steganalysis exceeds baselines by 20%-30%. ...
Acknowledgements This research was funded by the National Natural Science Foundation of China under Grant U21B2020 and in part by BUPT Excellent Ph.D. Students Foundation under Grant CX2023120. ...
arXiv:2401.15656v3
fatcat:dxgozjem4ffejhvxs2eobkjl6u
Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images
2022
Entropy
Steganography is one of the most crucial methods for information hiding, which embeds secret data on an ordinary file or a cover message for avoiding detection. ...
The considered effectiveness of our system design includes embedding capacity, adaptability to chosen cover attacks, and the stability of the trained model. ...
Anti-steganalysis ability is an essential characteristic of a good stego system. ...
doi:10.3390/e24070982
pmid:35885204
pmcid:PMC9318648
fatcat:g4cubvzkbvddhklug27wyiou6q
Multitask Identity-Aware Image Steganography via Minimax Optimization
[article]
2021
arXiv
pre-print
The experiments under the multitask scenario show the effectiveness of our framework compared with other visual information hiding methods and state-of-the-art high-capacity image steganography methods ...
Previous methods focus on the security during transmission and subsequently run a risk of privacy leakage after the restoration of secret images at the receiving end. ...
Adversarial Learning To enhance anti-analysis ability, many steganography methods adopted GAN-based adversarial learning. ...
arXiv:2107.05819v1
fatcat:p53frbo5yngzrj2anulf76toz4
High-Capacity Image Steganography Based on Improved FC-DenseNet
2020
IEEE Access
In addition, steganalysis tools are introduced to detect the anti-steganography security of our proposed scheme. Image distortion is evaluated by the SSIM and the PSNR. ...
The high-frequency region of the carrier image has a strong anti-interference ability, so the artifact of the carrier image appears in the error image. ...
doi:10.1109/access.2020.3024193
fatcat:qt4kehgypba5lozvu3cwrwmnyy
A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network
2020
IEEE Access
The Discrete Cosine Transform(DCT) is used to transform the secret image, and then the transformed image is encrypted by Elliptic Curve Cryptography(ECC) to improve the anti-detection property of the obtained ...
The experimental results show that the method can effectively allocate each pixel in the image so that the relative capacity of steganography reaches 1. ...
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable suggestions. ...
doi:10.1109/access.2020.2971528
fatcat:b2fpkriqubhe5iaqgi6uyon7vq
Unitary embedding for data hiding with the SVD
2005
Security, Steganography, and Watermarking of Multimedia Contents VII
Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. ...
Security, Steganography, and Watermarking of Multimedia Contents VII, edited by Edward J. ...
All other images used in this study were obtained from the Watermarking Evaluation Testbed (http://www.datahiding.org), courtesy of Dr. Edward Delp. ...
doi:10.1117/12.587796
dblp:conf/sswmc/BergmanD05
fatcat:wr37clb6traebabrie6mcx5r2u
A Review on Text Steganography Techniques
2021
Mathematics
Most of the research on steganography utilizes cover media, such as videos, images, and sounds. ...
Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file. ...
This technique also attempts to enhance the ability of anti-steganalysis; 10 cover texts with small compression ratios are chosen from a huge cover text set and are embedded in the matching compressed ...
doi:10.3390/math9212829
doaj:b8cb29df8ae44b2fb8aab4173ec498b3
fatcat:xudvbcx6hzfnxbskvbekr3xjqa
Secret-to-Image Reversible Transformation for Generative Steganography
[article]
2022
arXiv
pre-print
Recently, generative steganography that transforms secret information to a generated image has been a promising technique to resist steganalysis detection. ...
desirable anti-detectability and imperceptibility. ...
As an adversary of steganography, steganalysis aims to detect the existence of hidden information in stego-images. ...
arXiv:2203.06598v1
fatcat:fndno2oeuvhalfuaeyl3e3skli
« Previous
Showing results 1 — 15 out of 40 results