Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review

被引:0
|
作者
Apau, Richard [1 ]
Asante, Michael [1 ]
Twum, Frimpong [1 ]
Ben Hayfron-Acquah, James [1 ]
Peasah, Kwame Ofosuhene [1 ]
机构
[1] Kwame Nkrumah Univ Sci & Technol KNUST, Dept Comp Sci, Kumasi, Ghana
来源
PLOS ONE | 2024年 / 19卷 / 09期
关键词
INFORMATION; SCHEME; CYBERSECURITY; TECHNOLOGIES; CYBERCRIME; TRANSFORM; SECURITY; LESSONS; TRENDS;
D O I
10.1371/journal.pone.0308807
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are limited. This paper aims to fill the existing gap in extant literature on image steganography schemes capable of resisting statistical steganalysis attacks, by providing a comprehensive systematic literature review. This will ensure image steganography researchers and data protection practitioners are updated on current trends in information security assurance mechanisms. The study sampled 125 articles from ACM Digital Library, IEEE Explore, Science Direct, and Wiley. Using PRISMA, articles were synthesized and analyzed using quantitative and qualitative methods. A comprehensive discussion on image steganography techniques in terms of their robustness against well-known universal statistical steganalysis attacks including Regular-Singular (RS) and Chi-Square (X2) are provided. Trends in publication, techniques and methods, performance evaluation metrics, and security impacts were discussed. Extensive comparisons were drawn among existing techniques to evaluate their merits and limitations. It was observed that Generative Adversarial Networks dominate image steganography techniques and have become the preferred method by scholars within the domain. Artificial intelligence-powered algorithms including Machine Learning, Deep Learning, Convolutional Neural Networks, and Genetic Algorithms are recently dominating image steganography research as they enhance security. The implication is that previously preferred traditional techniques such as LSB algorithms are receiving less attention. Future Research may consider emerging technologies like blockchain technology, artificial neural networks, and biometric and facial recognition technologies to improve the robustness and security capabilities of image steganography applications.
引用
收藏
页数:47
相关论文
共 50 条
  • [1] Semi random position based steganography for resisting statistical steganalysis
    Department of Information Technology, Academy of Technology, Hoogly
    721212, India
    不详
    741 235, India
    [J]. Int. J. Netw. Secur., 1 (57-65):
  • [2] A comprehensive study on image steganography and steganalysis techniques
    Amsaveni, A.
    Vanathi, P.T.
    [J]. International Journal of Information and Communication Technology, 2015, 7 (4-5) : 406 - 424
  • [3] Statistical Steganalysis of High Capacity Image Steganography with Cryptography
    Sabnis, S. K.
    Awale, R. N.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 321 - 327
  • [4] An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection
    Zhang, Yue
    Ye, Dengpan
    Gan, Junjun
    Li, Zhenyu
    Cheng, Qingfeng
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (01): : 151 - 167
  • [5] Performance study of common image steganography and steganalysis techniques
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Mernon, Nasir
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [6] An image steganography scheme resisting RS statistical analysis
    Luo, Xiang-Yang
    Gao, Shan-Qing
    Liu, Bin
    Liu, Fen-Lin
    [J]. Kongzhi yu Juece/Control and Decision, 2007, 22 (04): : 423 - 427
  • [7] Statistical modelling and steganalysis of DFT-based image steganography
    Wang, Y
    Moulin, P
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [8] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, Mehdi
    Sencar, Husrev T.
    Memon, Nasir
    [J]. TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY 1, 2006, 4300 : 123 - 137
  • [9] Improving steganalysis by fusion techniques: A case study with image steganography
    Kharrazi, M
    Sencar, HT
    Memon, N
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [10] A Review on Security Techniques in Image Steganography
    Ghoul, Sami
    Sulaiman, Rossilawati
    Shukur, Zarina
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 361 - 385