Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding

W Lu, J Zhang, X Zhao, W Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Social networks are everywhere and currently transmitting very large messages. As a result,
transmitting secret messages in such an environment is worth researching. However, the …

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

R Chaganti, V Ravi, M Alazab, TD Pham - arXiv preprint arXiv:2110.02504, 2021 - arxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or from the internet, when the victim interacts with the source of infection. To …

Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction

X Duan, B Li, Z Yin, X Zhang, B Luo - Expert Systems with Applications, 2023 - Elsevier
Transmitting images for communication on social networks has become routine, which is
helpful for covert communication. The traditional steganography algorithm is unable to …

Image robust adaptive steganography adapted to lossy channels in open social networks

Y Zhang, X Luo, J Wang, Y Guo, F Liu - Information Sciences, 2021 - Elsevier
Currently, the demand for covert communication in open social networks brings new
opportunities and challenges to existing image steganography technology in terms of …

GAN-based image steganography for enhancing security via adversarial attack and pixel-wise deep fusion

C Yuan, H Wang, P He, J Luo, B Li - Multimedia Tools and Applications, 2022 - Springer
In recent years, the development of steganalysis based on convolutional neural networks
(CNN) has brought new challenges to the security of image steganography. However, the …

ACGIS: Adversarial cover generator for image steganography with noise residuals features-preserving

J Yang, X Liao - Signal Processing: Image Communication, 2023 - Elsevier
Recent works with the technique of adversarial example have been bringing the possibility
of effectively resisting the machine learning-based steganalyzers. Nevertheless, these …

Improving cost learning for JPEG steganography by exploiting JPEG domain knowledge

W Tang, B Li, M Barni, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although significant progress has been achieved recently in automatic learning of
steganographic cost, the existing methods designed for spatial images cannot be directly …

Cover selection for steganography using image similarity

Z Wang, G Feng, L Shen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Existing cover selection methods for steganography mainly focus on embedding distortion of
each image, but ignore the similarity between images. When the cover images are similar, a …

On security enhancement of steganography via generative adversarial image

L Zhou, G Feng, L Shen, X Zhang - IEEE Signal Processing …, 2019 - ieeexplore.ieee.org
Steganography plays an important role in information hiding. With the development of
steganalysis, traditional steganography faces more detection threat. It is necessary to …