Recent advances of image steganography with generative adversarial networks

J Liu, Y Ke, Z Zhang, Y Lei, J Li, M Zhang… - IEEE Access, 2020 - ieeexplore.ieee.org
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014,
has achieved great success. There have been increasing research achievements based on …

A novel image steganography method via deep convolutional generative adversarial networks

D Hu, L Wang, W Jiang, S Zheng, B Li - IEEE access, 2018 - ieeexplore.ieee.org
The security of image steganography is an important basis for evaluating steganography
algorithms. Steganography has recently made great progress in the long-term confrontation …

Secret-to-image reversible transformation for generative steganography

Z Zhou, Y Su, J Li, K Yu, QMJ Wu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, generative steganography that transforms secret information to a generated image
has been a promising technique to resist steganalysis detection. However, due to the …

Reversible image steganography scheme based on a U-Net structure

X Duan, K Jia, B Li, D Guo, E Zhang, C Qin - Ieee Access, 2019 - ieeexplore.ieee.org
Traditional steganography methods often hide secret data by establishing a map**
relationship between secret data and a cover image or directly in a noisy area, but has a low …

Robust coverless image steganography based on DCT and LDA topic classification

X Zhang, F Peng, M Long - IEEE Transactions on Multimedia, 2018 - ieeexplore.ieee.org
In order to improve the robustness and capability of resisting image steganalysis, a novel
coverless image steganography algorithm based on discrete cosine transform and latent …

A sensitive dynamic mutual encryption system based on a new 1D chaotic map

MA Midoun, X Wang, MZ Talhaoui - Optics and Lasers in Engineering, 2021 - Elsevier
In this research paper, we propose a novel one-dimensional chaotic system based on the
fraction of cosine over sine (1-DFCS). Evaluation of 1-DFCS indicates the existence of a …

A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network

X Duan, D Guo, N Liu, B Li, M Gou, C Qin - IEEE Access, 2020 - ieeexplore.ieee.org
Image steganography is a technology that hides sensitive information into an image. The
traditional image steganography method tends to securely embed secret information in the …

Generative steganography network

P Wei, S Li, X Zhang, G Luo, Z Qian… - Proceedings of the 30th …, 2022 - dl.acm.org
Steganography usually modifies cover media to embed secret data. A new steganographic
approach called generative steganography (GS) has emerged recently, in which stego …

Coverless information hiding based on robust image hashing

S Zheng, L Wang, B Ling, D Hu - … , ICIC 2017, Liverpool, UK, August 7-10 …, 2017 - Springer
Traditional image steganography modifies the content of the image more or less, it is hard to
resist the detection of image steganalysis tools. New kind of steganography methods …

A new one-dimensional cosine polynomial chaotic map and its use in image encryption

MZ Talhaoui, X Wang, MA Midoun - The Visual Computer, 2021 - Springer
In this paper, we propose a new real one-dimensional cosine polynomial (1-DCP) chaotic
map. The statistical analysis of the proposed map shows that it has a simple structure, a high …