A review of coverless steganography

L Meng, X Jiang, T Sun - Neurocomputing, 2024 - Elsevier
With the enhancement of people's security awareness, transmitting secret information
securely has gradually become a demand for the public. Steganography is a technology of …

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Advancements and challenges in coverless image steganography: A survey

X Xiang, Y Tan, J Qin, Y Tan - Signal Processing, 2024 - Elsevier
Coverless image steganography has emerged as a significant research direction in the field
of steganography in recent years. Unlike traditional image steganography, it does not …

A two-stream-network based steganalysis network: TSNet

F Guo, S Sun, S Weng, L Yu, J He - Expert Systems with Applications, 2024 - Elsevier
The three-stage framework consisting of preprocessing, feature extraction and classification
is the most commonly used structure in traditional deep learning based steganalysis …

Multi-modality ensemble distortion for spatial steganography with dynamic cost correction

F Li, Z Yu, K Wu, C Qin, X Zhang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper tackles a recent challenge in designing an efficient steganographic distortion
model, whose goal is to accurately measure the modification cost of a pixel and help design …

Diversified cover selection for image steganography

X Li, D Guo, C Qin - Symmetry, 2023 - mdpi.com
This paper proposes a new cover selection method for steganography. We focus on the
scenario that the available images for selection contain diversified sources, ie, nature …

Detection of QIM-Based Steganography in VoIP Streams: A MobileViT-Inspired Model

C Zhang, S Jiang - IEEE Signal Processing Letters, 2024 - ieeexplore.ieee.org
In the past decades, there have been many studies on VoIP steganalysis models for
quantization index modulation (QIM) based steganography. However, most of the proposed …

Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling

T Fu, L Chen, Y Jiang, J Jia, Z Fu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Image steganalysis has always been an important topic in the field of information security,
and researchers have designed many excellent steganalysis models. However, the existing …

[PDF][PDF] A Comprehensive Survey of Digital Image Steganography and Steganalysis

W Luo, K Wei, Q Li, M Ye, S Tan… - … on Signal and …, 2024 - nowpublishers.com
In the realm of digital communications, steganography and steganalysis have become a
solution for securely exchanging covert information. This survey initiates with an exploration …