The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

Coverless image steganography based on generative adversarial network

J Qin, J Wang, Y Tan, H Huang, X Xiang, Z He - Mathematics, 2020 - mdpi.com
Traditional image steganography needs to modify or be embedded into the cover image for
transmitting secret messages. However, the distortion of the cover image can be easily …

Improving robust adaptive steganography via minimizing channel errors

K Zeng, K Chen, W Zhang, Y Wang, N Yu - Signal Processing, 2022 - Elsevier
Abstract Online Social Networks (OSNs) are becoming increasingly entrenched in peoples
lives and a huge number of images are shared on them every day, which are well-suited …

Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction

X Duan, B Li, Z Yin, X Zhang, B Luo - Expert Systems with Applications, 2023 - Elsevier
Transmitting images for communication on social networks has become routine, which is
helpful for covert communication. The traditional steganography algorithm is unable to …

Image robust adaptive steganography adapted to lossy channels in open social networks

Y Zhang, X Luo, J Wang, Y Guo, F Liu - Information Sciences, 2021 - Elsevier
Currently, the demand for covert communication in open social networks brings new
opportunities and challenges to existing image steganography technology in terms of …

Towards Secure and Robust Steganography for Black-box Generated Images

K Zeng, K Chen, J Zhang, W Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The progression of text-to-image generation models has incited an upsurge in disseminating
generated images across social networks, providing a fertile ground for steganography …

High-capacity image steganography based on improved Xception

X Duan, M Gou, N Liu, W Wang, C Qin - Sensors, 2020 - mdpi.com
The traditional cover modification steganography method only has low steganography
ability. We propose a steganography method based on the convolutional neural network …

Robust adaptive steganography based on dither modulation and modification with re-compression

Z Yin, L Ke - IEEE Transactions on Signal and Information …, 2021 - ieeexplore.ieee.org
Traditional adaptive steganography is a technique used for covert communication with high
security, but it is invalid in the case of stego images are sent to legal receivers over networks …

Image sanitization in online social networks: A general framework for breaking robust information hiding

Z Zhu, P Wei, Z Qian, S Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of robust information hiding (RIH) approaches, secret messages can
be extracted successfully from stego-data after transmission through lossy channels of …

Enhancing Data Security through Hybrid Error Detection: Combining Cyclic Redundancy Check (CRC) and Checksum Techniques

AH Saleh, MS Mohammed - International Journal of …, 2024 - ijeer.forexjournal.co.in
Error detection is a critical aspect of ensuring the accuracy of data transmission in
communication systems. In this study, the performance of two error detection techniques has …