Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …
main aspects of early steganography are security, imperceptibility, and payload. Security is …
Coverless real-time image information hiding based on image block matching and dense convolutional network
Abstract Information security has become a key issue of public concern recently. In order to
radically resist the decryption and analysis in the field of image information hiding and …
radically resist the decryption and analysis in the field of image information hiding and …
Coverless image steganography based on multi-object recognition
Y Luo, J Qin, X Xiang, Y Tan - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
Most of the existing coverless steganography approaches have poor robustness to
geometric attacks, because these approaches use features of the entire image to map …
geometric attacks, because these approaches use features of the entire image to map …
Coverless image steganography: a survey
J Qin, Y Luo, X Xiang, Y Tan, H Huang - IEEE access, 2019 - ieeexplore.ieee.org
With the digitalization of information, a lot of multimedia data are under attack, information
security has become a key issue of public concern. Image steganography, aiming at using …
security has become a key issue of public concern. Image steganography, aiming at using …
[PDF][PDF] Coverless image steganography based on image segmentation
Y Luo, J Qin, X Xiang, Y Tan, Z He… - Computers …, 2020 - pdfs.semanticscholar.org
To resist the risk of the stego-image being maliciously altered during transmission, we
propose a coverless image steganography method based on image segmentation. Most …
propose a coverless image steganography method based on image segmentation. Most …
Security of medical images over insecure communication channels using zero-steganography
W Abdul - International Journal of Distributed Sensor …, 2022 - journals.sagepub.com
Secure and private communication has gained much focus on the international arena
recently due to the ability of certain organizations to eavesdrop on private communication …
recently due to the ability of certain organizations to eavesdrop on private communication …
High secure digital image steganography based on 3D chaotic map
Information security has become an important issue in digital media. Many solutions have
been proposed for enhance the digital media security that some of them are based on …
been proposed for enhance the digital media security that some of them are based on …
[PDF][PDF] A Linked List Encryption Scheme for Image Steganography without Embedding.
P Zhao, Q Zhong, J Chen, X Wang… - … -Computer Modeling in …, 2024 - cdn.techscience.cn
Information steganography has received more and more attention from scholars nowadays,
especially in the area of image steganography, which uses image content to transmit …
especially in the area of image steganography, which uses image content to transmit …
A Modification‐Free Steganography Method Based on Image Information Entropy
X ShuangKui, J Wu - Security and Communication Networks, 2018 - Wiley Online Library
In order to improve the security and robustness of the Information Steganography Algorithm
under strictly controlled environment, a new algorithm of modification‐free steganography …
under strictly controlled environment, a new algorithm of modification‐free steganography …
[PDF][PDF] A New Image Steganography Method using Message Bits Shuffling
Steganography has been considered as a technique of message hiding within another
carrier multimedia data. Messages in the form of image (with embedded handwritten or …
carrier multimedia data. Messages in the form of image (with embedded handwritten or …