Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Steganogram removal using multidirectional diffusion in fourier domain while preserving perceptual image quality

S Geetha, S Subburam, S Selvakumar, S Kadry… - Pattern Recognition …, 2021 - Elsevier
This paper proposes a novel and efficient method for destructing any secret information
hidden (steganograms) inside an image by any steganographic technique while preserving …

Erase and repair: An efficient box-free removal attack on high-capacity deep hiding

H Liu, T Xiang, S Guo, H Li, T Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep hiding, embedding images with others using deep neural networks, has demonstrated
impressive efficacy in increasing the message capacity and robustness of secret sharing. In …

Stegano-Purge: An integer wavelet transformation based adaptive universal image sterilizer for steganography removal

S Ganguly, I Mukherjee, A Pati - Journal of Information Security and …, 2023 - Elsevier
Sterilization is the method of annihilating steganographic data hidden in a cover media. This
paper proposes a visual quality preserving image sterilization method that effectively …

Monsters in the Dark: Sanitizing Hidden Threats with Diffusion Models

PK Robinette, D Moyer, TT Johnson - arXiv preprint arXiv:2310.06951, 2023 - arxiv.org
Steganography is the art of hiding information in plain sight. This form of covert
communication can be used by bad actors to propagate malware, exfiltrate victim data, and …

Image sterilization through adaptive noise blending in integer wavelet transformation

S Ganguly, I Mukherjee - 2022 IEEE 19th India Council …, 2022 - ieeexplore.ieee.org
Detecting steganography can be more resource-consuming than corrupting the stego-data
concealed inside a cover media. Based on this fact, the current work proposes an Integer …

Removing Hidden Information by Geometrical Perturbation in Frequency Domain

L He, B Feng, Z Peng, B Chen, Z Xia… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The risk of malicious exploitation of advanced image steganography necessitates the
removal of hidden information from images. However, it is crucial to preserve the visual …

IMIH: Imperceptible Medical Image Hiding for Secure Healthcare

P Ping, P Wei, D Fu, B Guo, OT Bloh… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Medical images play a crucial role in doctors' clinical diagnosis and treatment. However, the
transmission and sharing of such private information raises security concerns. To address …

Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion

F Tao, C Cao, H Li, B Zou, L Wang, J Sun - Applied Sciences, 2023 - mdpi.com
Deep steganography (DS), using neural networks to hide one image in another, has
performed well in terms of invisibility, embedding capacity, etc. Current steganalysis …