Analysis of various data security techniques of steganography: A survey

S Dhawan, R Gupta - Information Security Journal: A Global …, 2021 - Taylor & Francis
The amount of data exchanged via the Internet is increasing nowadays. Hence, data security
is termed as a serious issue while communication of data is processed over the Internet …

Channel attention image steganography with generative adversarial networks

J Tan, X Liao, J Liu, Y Cao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, extensive research has revealed the enormous potential of deep learning in the
application of image steganography. However, some defects still exist in previous studies on …

VAE-Stega: linguistic steganography based on variational auto-encoder

ZL Yang, SY Zhang, YT Hu, ZW Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In recent years, linguistic steganography based on text auto-generation technology has
been greatly developed, which is considered to be a very promising but also a very …

Improving data hiding within colour images using hue component of HSV colour space

FS Hassan, A Gutub - CAAI Transactions on Intelligence …, 2022 - Wiley Online Library
Data hiding technologies aim to hide the existence of secret information within digital covers
such as images by causing unnoticeable degradation to their quality. Reducing the image …

A survey on Deep-Learning-based image steganography

B Song, P Wei, S Wu, Y Lin, W Zhou - Expert Systems with Applications, 2024 - Elsevier
With the development of Internet and multimedia development, digital image steganography
is becoming more extensive in transmitting data with high capacity and security. Although …

Stegaddpm: Generative image steganography based on denoising diffusion probabilistic model

Y Peng, D Hu, Y Wang, K Chen, G Pei… - Proceedings of the 31st …, 2023 - dl.acm.org
Image steganography is the technology of concealing secret messages within an image.
Recently, generative image steganography has been developed, which conceals secret …

Gradually enhanced adversarial perturbations on color pixel vectors for image steganography

X Qin, B Li, S Tan, W Tang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Compared to element-wise embedding, vector-wise embedding based on CPV (color pixel
vector) shows its superiority in color image steganography. However, when working with an …

Non-additive cost functions for JPEG steganography based on block boundary maintenance

Y Wang, W Zhang, W Li, N Yu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent advances show that a reasonable non-additive cost function can significantly
improve the security level of additive cost based steganography. So far, there is only one …

Universal deep network for steganalysis of color image based on channel representation

K Wei, W Luo, S Tan, J Huang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Up to now, most existing steganalytic methods were designed for grayscale images, and are
not suitable for the color images that are widely used in social networks. In this paper, we …

BBC++: Enhanced block boundary continuity on defining non-additive distortion for JPEG steganography

Y Wang, W Li, W Zhang, X Yu, K Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, Li et al. proposed an effective non-additive distortion model for JPEG
steganography by preserving Block Boundary Continuity (BBC) in the spatial domain …