A review of coverless steganography
With the enhancement of people's security awareness, transmitting secret information
securely has gradually become a demand for the public. Steganography is a technology of …
securely has gradually become a demand for the public. Steganography is a technology of …
Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
Deep learning for diverse data types steganalysis: A review
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …
Advancements and challenges in coverless image steganography: A survey
X Xiang, Y Tan, J Qin, Y Tan - Signal Processing, 2024 - Elsevier
Coverless image steganography has emerged as a significant research direction in the field
of steganography in recent years. Unlike traditional image steganography, it does not …
of steganography in recent years. Unlike traditional image steganography, it does not …
A two-stream-network based steganalysis network: TSNet
F Guo, S Sun, S Weng, L Yu, J He - Expert Systems with Applications, 2024 - Elsevier
The three-stage framework consisting of preprocessing, feature extraction and classification
is the most commonly used structure in traditional deep learning based steganalysis …
is the most commonly used structure in traditional deep learning based steganalysis …
Multi-modality ensemble distortion for spatial steganography with dynamic cost correction
This paper tackles a recent challenge in designing an efficient steganographic distortion
model, whose goal is to accurately measure the modification cost of a pixel and help design …
model, whose goal is to accurately measure the modification cost of a pixel and help design …
Diversified cover selection for image steganography
This paper proposes a new cover selection method for steganography. We focus on the
scenario that the available images for selection contain diversified sources, ie, nature …
scenario that the available images for selection contain diversified sources, ie, nature …
Detection of QIM-Based Steganography in VoIP Streams: A MobileViT-Inspired Model
C Zhang, S Jiang - IEEE Signal Processing Letters, 2024 - ieeexplore.ieee.org
In the past decades, there have been many studies on VoIP steganalysis models for
quantization index modulation (QIM) based steganography. However, most of the proposed …
quantization index modulation (QIM) based steganography. However, most of the proposed …
Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling
T Fu, L Chen, Y Jiang, J Jia, Z Fu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Image steganalysis has always been an important topic in the field of information security,
and researchers have designed many excellent steganalysis models. However, the existing …
and researchers have designed many excellent steganalysis models. However, the existing …
[PDF][PDF] A Comprehensive Survey of Digital Image Steganography and Steganalysis
In the realm of digital communications, steganography and steganalysis have become a
solution for securely exchanging covert information. This survey initiates with an exploration …
solution for securely exchanging covert information. This survey initiates with an exploration …