Large-scale JPEG image steganalysis using hybrid deep-learning framework

J Zeng, S Tan, B Li, J Huang - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Adoption of deep learning in image steganalysis is still in its initial stage. In this paper, we
propose a generic hybrid deep-learning framework for JPEG steganalysis incorporating the …

Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction

L Zhang, Y Lu, J Li, F Chen, G Lu, D Zhang - Neural Computing and …, 2023 - Springer
Image hiding secures information security in multimedia communication. Existing deep
image hiding methods usually process the secret and cover information at first, and then …

Reverse JPEG compatibility attack

J Butora, J Fridrich - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
A novel steganalysis method for JPEG images is introduced that is universal in the sense
that it reliably detects any type of steganography as well as small payloads. It is limited to …

Steganography with multiple JPEG images of the same scene

T Denemark, J Fridrich - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
It is widely recognized that incorporating side-information at the sender can significantly
improve steganographic security in practice. Currently, most side-informed schemes utilize a …

On improving distortion functions for JPEG steganography

Z Wang, Z Qian, X Zhang, M Yang, D Ye - IEEE Access, 2018 - ieeexplore.ieee.org
This paper proposes a framework to improve the existing distortion functions designed for
JPEG steganography, which results in a better capability of countering steganalysis …

Natural steganography in JPEG domain with a linear development pipeline

T Taburet, P Bas, W Sawaya… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In order to achieve high practical security, Natural Steganography (NS) uses cover images
captured at ISO sensitivity ISO 1 and generates stego images mimicking ISO sensitivity ISO …

Towards Secure and Robust Steganography for Black-box Generated Images

K Zeng, K Chen, J Zhang, W Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The progression of text-to-image generation models has incited an upsurge in disseminating
generated images across social networks, providing a fertile ground for steganography …

BBC++: Enhanced block boundary continuity on defining non-additive distortion for JPEG steganography

Y Wang, W Li, W Zhang, X Yu, K Liu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, Li et al. proposed an effective non-additive distortion model for JPEG
steganography by preserving Block Boundary Continuity (BBC) in the spatial domain …

Dither modulation based adaptive steganography resisting JPEG compression and statistic detection

Y Zhang, X Zhu, C Qin, C Yang, X Luo - Multimedia Tools and Applications, 2018 - Springer
In order to improve the JPEG compression resistant performance of the current
steganogrpahy algorithms resisting statistic detection, an adaptive steganography algorithm …

Steganography with Generated Images: Leveraging Volatility to Enhance Security

J Zhang, K Chen, W Li, W Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The development of generative AI applications has revolutionized the data environment for
steganography, providing a new source of steganographic cover. However, existing …