Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Hinet: Deep image hiding by invertible network

J Jing, X Deng, M Xu, J Wang… - Proceedings of the IEEE …, 2021 - openaccess.thecvf.com
Image hiding aims to hide a secret image into a cover image in an imperceptible way, and
then recover the secret image perfectly at the receiver end. Capacity, invisibility and security …

Image steganography in spatial domain: A survey

M Hussain, AWA Wahab, YIB Idris, ATS Ho… - Signal Processing: Image …, 2018 - Elsevier
This paper presents a literature review of image steganography techniques in the spatial
domain for last 5 years. The research community has already done lots of noteworthy …

Universal distortion function for steganography in an arbitrary domain

V Holub, J Fridrich, T Denemark - EURASIP Journal on Information …, 2014 - Springer
Currently, the most successful approach to steganography in empirical objects, such as
digital media, is to embed the payload while minimizing a suitably defined distortion …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

CNN-based adversarial embedding for image steganography

W Tang, B Li, S Tan, M Barni… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Steganographic schemes are commonly designed in a way to preserve image statistics or
steganalytic features. Since most of the state-of-the-art steganalytic methods employ a …

Rich models for steganalysis of digital images

J Fridrich, J Kodovsky - IEEE Transactions on information …, 2012 - ieeexplore.ieee.org
We describe a novel general strategy for building steganography detectors for digital
images. The process starts with assembling a rich model of the noise component as a union …

Designing steganographic distortion using directional filters

V Holub, J Fridrich - … on information forensics and security (WIFS …, 2012 - ieeexplore.ieee.org
This paper presents a new approach to defining additive steganographic distortion in the
spatial domain. The change in the output of directional high-pass filters after changing one …

An adaptive image steganography approach depending on integer wavelet transform and genetic algorithm

S Pramanik - Multimedia Tools and Applications, 2023 - Springer
Steganography is the art and a science of obscuring the presence of communication by
hiding content in electronic media and so obscuring the presence of communication from the …