The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

Recent advances of image steganography with generative adversarial networks

J Liu, Y Ke, Z Zhang, Y Lei, J Li, M Zhang… - IEEE Access, 2020 - ieeexplore.ieee.org
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014,
has achieved great success. There have been increasing research achievements based on …

A novel image steganography method via deep convolutional generative adversarial networks

D Hu, L Wang, W Jiang, S Zheng, B Li - IEEE access, 2018 - ieeexplore.ieee.org
The security of image steganography is an important basis for evaluating steganography
algorithms. Steganography has recently made great progress in the long-term confrontation …

Reversible image steganography scheme based on a U-Net structure

X Duan, K Jia, B Li, D Guo, E Zhang, C Qin - Ieee Access, 2019 - ieeexplore.ieee.org
Traditional steganography methods often hide secret data by establishing a mapping
relationship between secret data and a cover image or directly in a noisy area, but has a low …

Robust coverless image steganography based on DCT and LDA topic classification

X Zhang, F Peng, M Long - IEEE Transactions on Multimedia, 2018 - ieeexplore.ieee.org
In order to improve the robustness and capability of resisting image steganalysis, a novel
coverless image steganography algorithm based on discrete cosine transform and latent …

Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping

Q Liu, X Xiang, J Qin, Y Tan, J Tan, Y Luo - Knowledge-Based Systems, 2020 - Elsevier
Recently, researches have shown that coverless image steganography can resist the
existing steganalysis tools effectively. On this basis, a novel coverless image steganography …

Coverless image steganography based on multi-object recognition

Y Luo, J Qin, X Xiang, Y Tan - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
Most of the existing coverless steganography approaches have poor robustness to
geometric attacks, because these approaches use features of the entire image to map …

Neural style transfer for image within images and conditional GANs for destylization

JS Ubhi, AK Aggarwal - Journal of Visual Communication and Image …, 2022 - Elsevier
In this paper, the feature representation of an image by CNN is used to hide the secret
image into the cover image. The style of the cover image hides the content of the secret …

A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network

X Duan, D Guo, N Liu, B Li, M Gou, C Qin - IEEE Access, 2020 - ieeexplore.ieee.org
Image steganography is a technology that hides sensitive information into an image. The
traditional image steganography method tends to securely embed secret information in the …

Coverless image steganography: a survey

J Qin, Y Luo, X Xiang, Y Tan, H Huang - IEEE access, 2019 - ieeexplore.ieee.org
With the digitalization of information, a lot of multimedia data are under attack, information
security has become a key issue of public concern. Image steganography, aiming at using …