Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Comparison of Least Significant Bit, Pixel Value Differencing, and Modulus Function on Steganography to Measure Image Quality, Storage Capacity, and Robustness

D Darwis, NB Pamungkas - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Abstract Information security is an important aspect of information. The importance of the
value of information in every aspect can result in attempts to transfer access or theft of data …

A review of coverless steganography

L Meng, X Jiang, T Sun - Neurocomputing, 2023 - Elsevier
With the enhancement of people's security awareness, transmitting secret information
securely has gradually become a demand for the public. Steganography is a technology of …

Reversible data hiding with hierarchical embedding for encrypted images

C Yu, X Zhang, X Zhang, G Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Reversible data hiding in encrypted images (RDHEI) is an effective technique of data
security. Most state-of-the-art RDHEI methods do not achieve desirable payload yet. To …

Generative steganography network

P Wei, S Li, X Zhang, G Luo, Z Qian… - Proceedings of the 30th …, 2022 - dl.acm.org
Steganography usually modifies cover media to embed secret data. A new steganographic
approach called generative steganography (GS) has emerged recently, in which stego …

A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based E-healthcare platforms

B Abd-El-Atty, AM Iliyasu, H Alaskar, AA Abd El-Latif - Sensors, 2020 - mdpi.com
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the
stego cover image and/or hidden message prior to embedding it into the carrier object …

Reversible data hiding with adaptive difference recovery for encrypted images

C Yu, X Zhang, G Li, S Zhan, Z Tang - Information Sciences, 2022 - Elsevier
Vacating room after encryption (VRAE) is a popular framework of reversible data hiding for
encrypted images (RDHEI). Most VRAE based RDHEI methods do not make a desirable …

Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding

W Lu, J Zhang, X Zhao, W Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Social networks are everywhere and currently transmitting very large messages. As a result,
transmitting secret messages in such an environment is worth researching. However, the …

Image steganography with symmetric embedding using Gaussian Markov random field model

W Su, J Ni, X Hu, J Fridrich - … on Circuits and Systems for Video …, 2020 - ieeexplore.ieee.org
Recent advances on adaptive steganography show that the performance of image
steganographic communication can be improved by incorporating the non-additive models …

Robust high-capacity watermarking over online social network shared images

W Sun, J Zhou, Y Li, M Cheung… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, online social networks (OSNs) have become extremely popular and been
one of the most common ways for storing and distributing images. Naturally, such …