Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …

An intriguing struggle of cnns in jpeg steganalysis and the onehot solution

Y Yousfi, J Fridrich - IEEE Signal Processing Letters, 2020 - ieeexplore.ieee.org
Deep convolutional neural networks (CNNs) have become the tool of choice for steganalysis
because they outperform older feature-based detectors by a large margin. However, recent …

[HTML][HTML] Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research

DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security
services have received a lot of attention. Among those trends are steganography and …

RCDD: Contrastive domain discrepancy with reliable steganalysis labeling for cover source mismatch

L Yu, S Weng, M Chen, Y Wei - Expert Systems with Applications, 2024 - Elsevier
The cover source mismatch (CSM) can be very challenging for steganalysis because
different distribution between source and target inevitably leads to poor performance of the …

[HTML][HTML] Deep image steganography using transformer and recursive permutation

Z Wang, M Zhou, B Liu, T Li - Entropy, 2022 - mdpi.com
Image steganography, which usually hides a small image (hidden image or secret image) in
a large image (carrier) so that the crackers cannot feel the existence of the hidden image in …

A wireless covert channel based on dirty constellation with phase drift

K Grzesiak, Z Piotrowski, JM Kelner - Electronics, 2021 - mdpi.com
Modern telecommunications systems require the use of various transmission techniques,
which are either open or hidden. The open transmission system uses various security …

Enhancing Data Hiding Methods for Improved Cyber Security Through Histogram Shifting Direction Optimization.

AN Fatman, T Ahmad… - Mathematical …, 2023 - search.ebscohost.com
Advancements in information and communication technology have facilitated diverse
operational environments, spanning across financial to military sectors. However, these …

Steganography using a 3-player game

M Yedroudj, F Comby, M Chaumont - Journal of Visual Communication and …, 2020 - Elsevier
Image steganography aims to securely embed secret information into cover images. Until
now, adaptive embedding algorithms such as S-UNIWARD or Mi-POD, were among the …