Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Coverless real-time image information hiding based on image block matching and dense convolutional network

Y Luo, J Qin, X Xiang, Y Tan, Q Liu, L Xiang - Journal of Real-Time Image …, 2020 - Springer
Abstract Information security has become a key issue of public concern recently. In order to
radically resist the decryption and analysis in the field of image information hiding and …

Coverless image steganography based on multi-object recognition

Y Luo, J Qin, X Xiang, Y Tan - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
Most of the existing coverless steganography approaches have poor robustness to
geometric attacks, because these approaches use features of the entire image to map …

Coverless image steganography: a survey

J Qin, Y Luo, X Xiang, Y Tan, H Huang - IEEE access, 2019 - ieeexplore.ieee.org
With the digitalization of information, a lot of multimedia data are under attack, information
security has become a key issue of public concern. Image steganography, aiming at using …

[PDF][PDF] Coverless image steganography based on image segmentation

Y Luo, J Qin, X Xiang, Y Tan, Z He… - Computers …, 2020 - pdfs.semanticscholar.org
To resist the risk of the stego-image being maliciously altered during transmission, we
propose a coverless image steganography method based on image segmentation. Most …

Security of medical images over insecure communication channels using zero-steganography

W Abdul - International Journal of Distributed Sensor …, 2022 - journals.sagepub.com
Secure and private communication has gained much focus on the international arena
recently due to the ability of certain organizations to eavesdrop on private communication …

High secure digital image steganography based on 3D chaotic map

MY Valandar, P Ayubi, MJ Barani - 2015 7th Conference on …, 2015 - ieeexplore.ieee.org
Information security has become an important issue in digital media. Many solutions have
been proposed for enhance the digital media security that some of them are based on …

[PDF][PDF] A Linked List Encryption Scheme for Image Steganography without Embedding.

P Zhao, Q Zhong, J Chen, X Wang… - … -Computer Modeling in …, 2024 - cdn.techscience.cn
Information steganography has received more and more attention from scholars nowadays,
especially in the area of image steganography, which uses image content to transmit …

A Modification‐Free Steganography Method Based on Image Information Entropy

X ShuangKui, J Wu - Security and Communication Networks, 2018 - Wiley Online Library
In order to improve the security and robustness of the Information Steganography Algorithm
under strictly controlled environment, a new algorithm of modification‐free steganography …

[PDF][PDF] A New Image Steganography Method using Message Bits Shuffling

A Das, P Das, K Chakraborty, S Sinha - J. Mech. Contin. Math. Sci, 2018 - researchgate.net
Steganography has been considered as a technique of message hiding within another
carrier multimedia data. Messages in the form of image (with embedded handwritten or …