[PDF][PDF] Image steganography using least significant bit and secret map techniques.

A ALabaichi, MAAK Al-Dabbas… - International journal of …, 2020 - researchgate.net
In steganography, secret data are invisible in cover media, such as text, audio, video and
image. Hence, attackers have no knowledge of the original message contained in the media …

An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques

MA Hameed, M Hassaballah, S Aly, AI Awad - IEEE Access, 2019 - ieeexplore.ieee.org
Pixel value differencing (PVD) and least significant bit substitution (LSB) are two widely used
schemes in image steganography. These two methods do not consider different content in a …

Triple-layer image security using a zigzag embedding pattern

S Farrag, W Alexan, HH Hussein - … International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a triple-layer, high capacity, message security scheme. The first two
layers are of a cryptographic nature, whereas the third layer is of a steganographic nature. In …

A secure image steganography algorithm based on least significant bit and integer wavelet transform

E Emad, A Safey, A Refaat, Z Osama… - Journal of Systems …, 2018 - ieeexplore.ieee.org
The rapid development of data communication in modern era demands secure exchange of
information. Steganography is an established method for hiding secret data from an …

Coverless image steganography based on generative adversarial network

J Qin, J Wang, Y Tan, H Huang, X Xiang, Z He - Mathematics, 2020 - mdpi.com
Traditional image steganography needs to modify or be embedded into the cover image for
transmitting secret messages. However, the distortion of the cover image can be easily …

High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution

AA Zakaria, M Hussain, AWA Wahab, MYI Idris… - Applied Sciences, 2018 - mdpi.com
Steganography is the art and practice of communication using hidden messages. The least
significant bits (LSB) based method is the well-known type of steganography in the spatial …

Robust coverless image steganography based on DCT and LDA topic classification

X Zhang, F Peng, M Long - IEEE Transactions on Multimedia, 2018 - ieeexplore.ieee.org
In order to improve the robustness and capability of resisting image steganalysis, a novel
coverless image steganography algorithm based on discrete cosine transform and latent …

Channel attention image steganography with generative adversarial networks

J Tan, X Liao, J Liu, Y Cao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, extensive research has revealed the enormous potential of deep learning in the
application of image steganography. However, some defects still exist in previous studies on …

A survey on deep convolutional neural networks for image steganography and steganalysis

I Hussain, J Zeng, X Qin, S Tan - KSII Transactions on Internet and …, 2020 - koreascience.kr
Steganalysis & steganography have witnessed immense progress over the past few years
by the advancement of deep convolutional neural networks (DCNN). In this paper, we …

Novel coverless steganography method based on image selection and StarGAN

X Chen, Z Zhang, A Qiu, Z Xia… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the development of steganalysis technology keeps progressing, the traditional image
steganography has confronted some security bottleneck, as the secret embedding method …