Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Deep learning applied to steganalysis of digital images: A systematic review

TS Reinel, RP Raul, I Gustavo - IEEE Access, 2019 - ieeexplore.ieee.org
Steganography consists of hiding messages inside some object known as a carrier in order
to establish a covert communication channel so that the act of communication itself goes …

Channel attention image steganography with generative adversarial networks

J Tan, X Liao, J Liu, Y Cao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, extensive research has revealed the enormous potential of deep learning in the
application of image steganography. However, some defects still exist in previous studies on …

Self-adversarial training incorporating forgery attention for image forgery localization

L Zhuo, S Tan, B Li, J Huang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Image editing techniques enable people to modify the content of an image without leaving
visual traces and thus may cause serious security risks. Hence the detection and localization …

ImageNet pre-trained CNNs for JPEG steganalysis

Y Yousfi, J Butora, E Khvedchenya… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
In this paper, we investigate pre-trained computer-vision deep architectures, such as the
EfficientNet, MixNet, and ResNet for steganalysis. These models pre-trained on ImageNet …

Improving EfficientNet for JPEG steganalysis

Y Yousfi, J Butora, J Fridrich, C Fuji Tsang - Proceedings of the 2021 …, 2021 - dl.acm.org
In this paper, we study the EfficientNet family pre-trained on ImageNet when used for
steganalysis using transfer learning. We show that certain" surgical modifications" aimed at …

Reload: Using reinforcement learning to optimize asymmetric distortion for additive steganography

X Mo, S Tan, W Tang, B Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, the success of non-additive steganography has demonstrated that asymmetric
distortion can remarkably improve security performance compared with symmetric cost …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

PulseEdit: Editing physiological signals in facial videos for privacy protection

M Chen, X Liao, M Wu - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Recent studies have shown that physiological signals such as heart beat and breathing can
be remotely captured from human faces using a regular color camera under ambient light …

Breaking ALASKA: Color separation for steganalysis in JPEG domain

Y Yousfi, J Butora, J Fridrich, Q Giboulot - Proceedings of the ACM …, 2019 - dl.acm.org
This paper describes the architecture and training of detectors developed for the ALASKA
steganalysis challenge. For each quality factor in the range 60-98, several multi-class tile …