Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

IJ Kadhim, P Premaratne, PJ Vial, B Halloran - Neurocomputing, 2019 - Elsevier
Storing and communicating secret and/or private information has become part of our daily
life whether it is for our employment or personal well-being. Therefore, secure storage and …

Current status and key issues in image steganography: A survey

MS Subhedar, VH Mankar - Computer science review, 2014 - Elsevier
Steganography and steganalysis are the prominent research fields in information hiding
paradigm. Steganography is the science of invisible communication while steganalysis is …

[图书][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

11 Survey of Image Steganography and Steganalysis

M Bachrach, FY Shih - Multimedia Security: Watermarking …, 2012 - api.taylorfrancis.com
The term, steganography, comes from Greek and means “covered writing”(Johnson and
Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …

Steganerf: Embedding invisible information within neural radiance fields

C Li, BY Feng, Z Fan, P Pan… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Recent advancements in neural rendering have paved the way for a future marked by the
widespread distribution of visual data through the sharing of Neural Radiance Field (NeRF) …

[PDF][PDF] An overview of image steganography.

T Morkel, JHP Eloff, MS Olivier - ISSA, 2005 - academia.edu
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital …

Light field messaging with deep photographic steganography

E Wengrowski, K Dana - … of the IEEE/CVF conference on …, 2019 - openaccess.thecvf.com
Abstract We develop Light Field Messaging (LFM), a process of embedding, transmitting,
and receiving hidden information in video that is displayed on a screen and captured by a …

A review of image steganalysis techniques for digital forensics

K Karampidis, E Kavallieratou… - Journal of information …, 2018 - Elsevier
Steganalysis and steganography are the two different sides of the same coin.
Steganography tries to hide messages in plain sight while steganalysis tries to detect their …

Statistically undetectable jpeg steganography: dead ends challenges, and opportunities

J Fridrich, T Pevný, J Kodovský - Proceedings of the 9th workshop on …, 2007 - dl.acm.org
The goal of this paper is to determine the steganographic capacity of JPEG images (the
largest payload that can be undetectably embedded) with respect to current best …

An overview of steganography techniques applied to the protection of biometric data

M Douglas, K Bailey, M Leeney, K Curran - Multimedia Tools and …, 2018 - Springer
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …