Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








40 Hits in 3.7 sec

A Survey on Digital Image Steganography

Jiaxin Wang, Mengxin Cheng, Peng Wu, Beijing Chen
2019 Journal of Information Hiding and Privacy Protection  
.; Li, B. (2018): A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access, vol. 6, pp. 38303-38314. Kekre, H. B.; Athawale, A. A.; Athawale, U.  ...  Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography.  ...  [Zhang, Dong and Liu (2018) ] proposed ISGAN (Invisible Steganography via Generative Adversarial Networks) by introducing the steganalysis network proposed by Xu et al.  ... 
doi:10.32604/jihpp.2019.07189 fatcat:6dnb6vpepjfhfkl45e46pkggha

Recent Advances of Image Steganography with Generative Adversarial Networks

Jia Liu, Yan Ke, Zhuo Zhang, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang
2020 IEEE Access  
We discuss the characteristics of the three strategies of GAN-based steganography and analyze their evaluation metrics.  ...  In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success.  ...  EMBEDDING AS ADVERSARIAL SAMPLES Some researchers have also designed steganography with the idea of adversarial examples [87] .  ... 
doi:10.1109/access.2020.2983175 fatcat:fdakxe2m2rbcjdcebszweripta

Introduction to the special issue on deep learning for real-time information hiding and forensics

Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato
2020 Journal of Real-Time Image Processing  
Furthermore, a multi-domain loss function is developed to enhance the recognition ability of indepth learning features.  ...  Image steganalysis Image steganalysis can be regarded as the adversary to steganography, and it aims to detect whether an image contains secret data or not.  ... 
doi:10.1007/s11554-020-00947-2 fatcat:ge4olggcubhm3nouy4bkphezvu

Coverless Image Steganography: A Survey

Jiaohua Qin, Yuanjing Luo, Xuyu Xiang, Yun Tan, Huajun Huang
2019 IEEE Access  
Therefore, it radically resist the detection of steganalysis tools and significantly improves the security of the image.  ...  The existing methods are evaluated and the prospect of future work is also summarized. INDEX TERMS Steganography, coverless image steganography, information hiding, information security.  ...  These methods are used to test the anti-steganalysis ability of coverless steganography will be described in Section V. C.  ... 
doi:10.1109/access.2019.2955452 fatcat:uu7wjgrolndlvp2he2rpescyfq

Convolutional Video Steganography with Temporal Residual Modeling [article]

Xinyu Weng, Yongzhi Li, Lu Chi, Yadong Mu
2018 arXiv   pre-print
Second, we develop the model based on deep convolutional neural networks, which is the first of its kind in the literature of video steganography.  ...  Steganography represents the art of unobtrusively concealing a secrete message within some cover data.  ...  The curves indicate how many leaked training samples are needed for an adversary to distinguish a container from a cover, which reflects the anti-steganalysis ability of a model.  ... 
arXiv:1806.02941v1 fatcat:hvgesosg5jah5i2ahge7jynplq

An Image Style Transfer Network Using Multilevel Noise Encoding and Its Application in Coverless Steganography

Shanqing Zhang, Shengqi Su, Li Li, Qili Zhou, Jianfeng Lu, Chin-Chen Chang
2019 Symmetry  
The performance of our steganography scheme is good in steganographic capacity, anti-steganalysis, security, and robustness.  ...  However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis possible  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym11091152 fatcat:naibk5xc25b4tmyl7rrxrblt3u

Information Forensics and Security: A quarter-century-long journey [article]

Mauro Barni and Patrizio Campisi and Edward J. Delp and Gwenael Doërr and Jessica Fridrich and Nasir Memon and Fernando Pérez-González and Anderson Rocha and Luisa Verdoliva and Min Wu
2023 arXiv   pre-print
For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information era.  ...  of solid evidence to hold perpetrators accountable.  ...  STEGANOGRAPHY AND STEGANALYSIS Steganography is a tool for private covert communication.  ... 
arXiv:2309.12159v1 fatcat:b63earpxefdkpatbsozfanfvcy

LLsM: Generative Linguistic Steganography with Large Language Model [article]

Yihao Wang and Ruiqi Song and Ru Zhang and Jianyi Liu and Lingxiao Li
2024 arXiv   pre-print
Experiments show that LLsM performs superior to prevalent LS and related-task baselines regarding various kinds of concealment and anti-steganalysis.  ...  LLsM's MAUVE surpasses baselines by 60%-80% and anti-steganalysis exceeds baselines by 20%-30%.  ...  Acknowledgements This research was funded by the National Natural Science Foundation of China under Grant U21B2020 and in part by BUPT Excellent Ph.D. Students Foundation under Grant CX2023120.  ... 
arXiv:2401.15656v3 fatcat:dxgozjem4ffejhvxs2eobkjl6u

Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images

Yi-Lun Pan, Ja-Ling Wu
2022 Entropy  
Steganography is one of the most crucial methods for information hiding, which embeds secret data on an ordinary file or a cover message for avoiding detection.  ...  The considered effectiveness of our system design includes embedding capacity, adaptability to chosen cover attacks, and the stability of the trained model.  ...  Anti-steganalysis ability is an essential characteristic of a good stego system.  ... 
doi:10.3390/e24070982 pmid:35885204 pmcid:PMC9318648 fatcat:g4cubvzkbvddhklug27wyiou6q

Multitask Identity-Aware Image Steganography via Minimax Optimization [article]

Jiabao Cui, Pengyi Zhang, Songyuan Li, Liangli Zheng, Cuizhu Bao, Jupeng Xia, Xi Li
2021 arXiv   pre-print
The experiments under the multitask scenario show the effectiveness of our framework compared with other visual information hiding methods and state-of-the-art high-capacity image steganography methods  ...  Previous methods focus on the security during transmission and subsequently run a risk of privacy leakage after the restoration of secret images at the receiving end.  ...  Adversarial Learning To enhance anti-analysis ability, many steganography methods adopted GAN-based adversarial learning.  ... 
arXiv:2107.05819v1 fatcat:p53frbo5yngzrj2anulf76toz4

High-Capacity Image Steganography Based on Improved FC-DenseNet

Xintao Duan, Liu Nao, Gou Mengxiao, Dongli Yue, Zimei Xie, Yuanyuan Ma, Chuan Qin
2020 IEEE Access  
In addition, steganalysis tools are introduced to detect the anti-steganography security of our proposed scheme. Image distortion is evaluated by the SSIM and the PSNR.  ...  The high-frequency region of the carrier image has a strong anti-interference ability, so the artifact of the carrier image appears in the error image.  ... 
doi:10.1109/access.2020.3024193 fatcat:qt4kehgypba5lozvu3cwrwmnyy

A New High Capacity Image Steganography Method Combined with Image Elliptic Curve Cryptography and Deep Neural Network

Xintao Duan, Daidou Guo, Nao Liu, Baoxia Li, Mengxiao Gou, Chuan Qin
2020 IEEE Access  
The Discrete Cosine Transform(DCT) is used to transform the secret image, and then the transformed image is encrypted by Elliptic Curve Cryptography(ECC) to improve the anti-detection property of the obtained  ...  The experimental results show that the method can effectively allocate each pixel in the image so that the relative capacity of steganography reaches 1.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable suggestions.  ... 
doi:10.1109/access.2020.2971528 fatcat:b2fpkriqubhe5iaqgi6uyon7vq

Unitary embedding for data hiding with the SVD

Clifford Bergman, Jennifer Davidson, Edward J. Delp III, Ping W. Wong
2005 Security, Steganography, and Watermarking of Multimedia Contents VII  
Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent.  ...  Security, Steganography, and Watermarking of Multimedia Contents VII, edited by Edward J.  ...  All other images used in this study were obtained from the Watermarking Evaluation Testbed (http://www.datahiding.org), courtesy of Dr. Edward Delp.  ... 
doi:10.1117/12.587796 dblp:conf/sswmc/BergmanD05 fatcat:wr37clb6traebabrie6mcx5r2u

A Review on Text Steganography Techniques

Mohammed Abdul Majeed, Rossilawati Sulaiman, Zarina Shukur, Mohammad Kamrul Hasan
2021 Mathematics  
Most of the research on steganography utilizes cover media, such as videos, images, and sounds.  ...  Notably, text steganography is usually not given priority because of the difficulties in identifying redundant bits in a text file.  ...  This technique also attempts to enhance the ability of anti-steganalysis; 10 cover texts with small compression ratios are chosen from a huge cover text set and are embedded in the matching compressed  ... 
doi:10.3390/math9212829 doaj:b8cb29df8ae44b2fb8aab4173ec498b3 fatcat:xudvbcx6hzfnxbskvbekr3xjqa

Secret-to-Image Reversible Transformation for Generative Steganography [article]

Zhili Zhou, Yuecheng Su, Q. M. Jonathan Wu, Zhangjie Fu, Yunqing Shi
2022 arXiv   pre-print
Recently, generative steganography that transforms secret information to a generated image has been a promising technique to resist steganalysis detection.  ...  desirable anti-detectability and imperceptibility.  ...  As an adversary of steganography, steganalysis aims to detect the existence of hidden information in stego-images.  ... 
arXiv:2203.06598v1 fatcat:fndno2oeuvhalfuaeyl3e3skli
« Previous Showing results 1 — 15 out of 40 results