Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding by information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.
Urmila Pilania, Manoj Kumar
semanticscholar +7 more sources
A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image. [PDF]
In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information.
Rahman S +7 more
europepmc +2 more sources
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review. [PDF]
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering ...
Apau R +4 more
europepmc +2 more sources
A novel and efficient digital image steganography technique using least significant bit substitution. [PDF]
Steganography is used to hide sensitive types of data including images, audio, text, and videos in an invisible way so that no one can detect it. Image-based steganography is a technique that uses images as a cover media for hiding and transmitting ...
Rahman S +8 more
europepmc +2 more sources
Comparative performance assessment of deep learning based image steganography techniques. [PDF]
Increasing data infringement while transmission and storage have become an apprehension for the data owners. Even the digital images transmitted over the network or stored at servers are prone to unauthorized access.
Himthani V +5 more
europepmc +2 more sources
Survey on image non-additive steganography
Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories ...
Yaofei WANG +4 more
doaj +3 more sources
CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images.
Jiwen Yu +3 more
semanticscholar +1 more source
Digital steganography model and its formal description
In order to make the research of digital steganography model develop synchronously with steganography research, three digital steganography models from general to specific are proposed, and each model was formalized.
SONG Haitao, TANG Guangming, SUN Yifeng, WANG Yang
doaj +3 more sources
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction [PDF]
Transmitting images for communication on social networks has become routine, which is helpful for covert communication. The traditional steganography algorithm is unable to successfully convey secret information since the social network channel will ...
Xiaolong Duan +4 more
semanticscholar +1 more source
Abstract: The behavior of posting pictures on social network structures is befell everywhere and every single 2nd. for this reason, the conversation channels supplied through various social networks have a remarkable potential for covert verbal exchange.
Pratham Patil +4 more
openaire +1 more source

