Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

A new adversarial embedding method for enhancing image steganography

M Liu, W Luo, P Zheng, J Huang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Image steganography aims to embed secret messages into cover images in an
imperceptible manner. While steganalysis tries to identify stegos from covers, which is a …

Steganography using a 3-player game

M Yedroudj, F Comby, M Chaumont - Journal of Visual Communication and …, 2020 - Elsevier
Image steganography aims to securely embed secret information into cover images. Until
now, adaptive embedding algorithms such as S-UNIWARD or Mi-POD, were among the …

Dataset mismatched steganalysis using subdomain adaptation with guiding feature

L Zhang, SM Abdullahi, P He, H Wang - Telecommunication Systems, 2022 - Springer
The generalization problem in deep learning has always been an important problem to be
solved. In the field of steganalysis, generalization is also an important factor that makes …

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

R Chaganti, V Ravi, M Alazab, TD Pham - arXiv preprint arXiv:2110.02504, 2021 - arxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or from the internet, when the victim interacts with the source of infection. To …

A generative learning steganalysis network against the problem of training-images-shortage

H Zhang, Z Song, Q Xing, B Feng, X Lin - Electronics, 2022 - mdpi.com
In recent years, several steganalysis neural networks have been proposed and achieved
satisfactory performances. However, these deep learning methods all encounter the …

Novel hidden bit location method towards JPEG steganography

B Pan, T Qiao, J Li, Y Chen… - Security and …, 2022 - Wiley Online Library
Image steganalysis has been widely studied, most of which can only complete the binary
task of identifying the existence of hidden bits in an inquiry image. Currently, although some …

Distribution-preserving-based automatic data augmentation for deep image steganalysis

J Zhang, K Chen, C Qin, W Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In recent years, deep learning-based steganalyzers far outperformed handcrafted feature-
based steganalyzers. However, a large amount of data is needed to train deep learning …

Analysis of the scalability of a deep-learning network for steganography “into the wild”

H Ruiz, M Chaumont, M Yedroudj, AO Amara… - … and Challenges: Virtual …, 2021 - Springer
Since the emergence of deep learning and its adoption in steganalysis fields, most of the
reference articles kept using small to medium size CNN, and learn them on relatively small …