Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Digital steganography and watermarking for digital images: A review of current research directions

O Evsutin, A Melman, R Meshcheryakov - IEEE Access, 2020 - ieeexplore.ieee.org
The development of information technology has led to a significant increase in the share of
multimedia traffic in data networks. This has necessitated to solve the following information …

PSNR vs SSIM: imperceptibility quality assessment for image steganography

DRIM Setiadi - Multimedia Tools and Applications, 2021 - Springer
Peak signal to noise ratio (PSNR) and structural index similarity (SSIM) are two measuring
tools that are widely used in image quality assessment. Especially in the steganography …

Large-capacity image steganography based on invertible neural networks

SP Lu, R Wang, T Zhong… - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
Many attempts have been made to hide information in images, where the main challenge is
how to increase the payload capacity without the container image being detected as …

[PDF][PDF] Enhanced data security of communication system using combined encryption and steganography

HT ALRikabi, HT Hazim - iJIM, 2021 - lib.uowasit.edu.iq
Data security has become a paramount necessity and more obligation in daily life. Most of
our systems can be hacked, and it causes very high risks to our confidential files inside the …

Robust invertible image steganography

Y Xu, C Mou, Y Hu, J Xie… - Proceedings of the IEEE …, 2022 - openaccess.thecvf.com
Image steganography aims to hide secret images into a container image, where the secret is
hidden from human vision and can be restored when necessary. Previous image …

Editguard: Versatile image watermarking for tamper localization and copyright protection

X Zhang, R Li, J Yu, Y Xu, W Li… - Proceedings of the …, 2024 - openaccess.thecvf.com
In the era of AI-generated content (AIGC) malicious tampering poses imminent threats to
copyright integrity and information security. Current deep image watermarking while widely …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding

L Zhu, H Song, X Zhang, M Yan, T Zhang, X Wang… - Signal Processing, 2020 - Elsevier
In this paper, an efficient and robust meaningful image encryption (MIE) scheme is
developed by combining block compressive sensing (BCS) and singular value …

Cross: Diffusion model makes controllable, robust and secure image steganography

J Yu, X Zhang, Y Xu, J Zhang - Advances in Neural …, 2024 - proceedings.neurips.cc
Current image steganography techniques are mainly focused on cover-based methods,
which commonly have the risk of leaking secret images and poor robustness against …