Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Digital steganography and watermarking for digital images: A review of current research directions

O Evsutin, A Melman, R Meshcheryakov - IEEE Access, 2020 - ieeexplore.ieee.org
The development of information technology has led to a significant increase in the share of
multimedia traffic in data networks. This has necessitated to solve the following information …

GBRAS-Net: a convolutional neural network architecture for spatial image steganalysis

TS Reinel, AAH Brayan, BOM Alejandro… - IEEE …, 2021 - ieeexplore.ieee.org
Advances in Deep Learning (DL) have provided alternative approaches to various complex
problems, including the domain of spatial image steganalysis using Convolutional Neural …

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research

DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security
services have received a lot of attention. Among those trends are steganography and …

Single-image reflection removal using deep learning: a systematic review

A Amanlou, AA Suratgar, J Tavoosi… - IEEE …, 2022 - ieeexplore.ieee.org
Images captured through the glass often consist of undesirable specular reflections. These
reflections detected in front of the glass remarkably reduce the quality and visibility of the …

Deep image steganography using transformer and recursive permutation

Z Wang, M Zhou, B Liu, T Li - Entropy, 2022 - mdpi.com
Image steganography, which usually hides a small image (hidden image or secret image) in
a large image (carrier) so that the crackers cannot feel the existence of the hidden image in …

A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

Cover-source mismatch in steganalysis: systematic review

A Mallet, M Beneš, R Cogranne - EURASIP Journal on Information Security, 2024 - Springer
Operational steganalysis contends with a major problem referred to as the cover-source
mismatch (CSM), which is essentially a difference in distribution caused by different …