Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review

被引:0
|
作者
Apau, Richard [1 ]
Asante, Michael [1 ]
Twum, Frimpong [1 ]
Ben Hayfron-Acquah, James [1 ]
Peasah, Kwame Ofosuhene [1 ]
机构
[1] Kwame Nkrumah Univ Sci & Technol KNUST, Dept Comp Sci, Kumasi, Ghana
来源
PLOS ONE | 2024年 / 19卷 / 09期
关键词
INFORMATION; SCHEME; CYBERSECURITY; TECHNOLOGIES; CYBERCRIME; TRANSFORM; SECURITY; LESSONS; TRENDS;
D O I
10.1371/journal.pone.0308807
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are limited. This paper aims to fill the existing gap in extant literature on image steganography schemes capable of resisting statistical steganalysis attacks, by providing a comprehensive systematic literature review. This will ensure image steganography researchers and data protection practitioners are updated on current trends in information security assurance mechanisms. The study sampled 125 articles from ACM Digital Library, IEEE Explore, Science Direct, and Wiley. Using PRISMA, articles were synthesized and analyzed using quantitative and qualitative methods. A comprehensive discussion on image steganography techniques in terms of their robustness against well-known universal statistical steganalysis attacks including Regular-Singular (RS) and Chi-Square (X2) are provided. Trends in publication, techniques and methods, performance evaluation metrics, and security impacts were discussed. Extensive comparisons were drawn among existing techniques to evaluate their merits and limitations. It was observed that Generative Adversarial Networks dominate image steganography techniques and have become the preferred method by scholars within the domain. Artificial intelligence-powered algorithms including Machine Learning, Deep Learning, Convolutional Neural Networks, and Genetic Algorithms are recently dominating image steganography research as they enhance security. The implication is that previously preferred traditional techniques such as LSB algorithms are receiving less attention. Future Research may consider emerging technologies like blockchain technology, artificial neural networks, and biometric and facial recognition technologies to improve the robustness and security capabilities of image steganography applications.
引用
收藏
页数:47
相关论文
共 50 条
  • [21] Statistical Modeling for LSB-based Image Steganalysis:A Systematic Perspective
    Yao, Xiaoming
    Du, Wencai
    Li, Taijun
    Wang, Longjuan
    Li, Honglei
    Wu, Hanwei
    Wang, Zequn
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 398 - 401
  • [22] A systematic literature review on Ransomware attacks
    School of Engineering, University of Guelph, Guelph
    ON, Canada
    [J]. arXiv, 1600,
  • [23] Steganalysis attacks on stego-images using stego-signatures and statistical image properties
    Al Hawi, T
    Al Qutayri, M
    Barada, H
    [J]. TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B104 - B107
  • [24] Deep learning techniques in CT image reconstruction and segmentation: a systematic literature review
    Devi, Manju
    Singh, Sukhdip
    Tiwari, Shailendra
    [J]. INTERNATIONAL JOURNAL OF NANOTECHNOLOGY, 2023, 20 (5-10) : 790 - 828
  • [25] A systematic literature review on chaotic maps-based image security techniques
    Singh, Dilbag
    Kaur, Sharanpreet
    Kaur, Mandeep
    Singh, Surender
    Kaur, Manjit
    Lee, Heung-No
    [J]. COMPUTER SCIENCE REVIEW, 2024, 54
  • [26] A Systematic Literature Review on Vulnerabilities, Mitigation Techniques, and Attacks in Field-Programmable Gate Arrays
    Alsuwaiyan, Ali
    Habib, Aliyu Abubakar
    Imoukhuede, Ali Bello
    Omar, Mohamed Osman
    Maruf, Md Al
    Alqarni, Mansour
    El-Maleh, Aiman
    Tabbakh, Abdulaziz
    Felemban, Muhamad
    Azim, Akramul
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024,
  • [27] A Literature Review on Image Encryption Techniques
    Geetha, S.
    Punithavathi, P.
    Infanteena, A. Magnus
    Sindhu, Siva S. Sivatha
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (03) : 42 - 83
  • [28] Literature Review on Image Encryption Techniques
    Khan, Majid
    Shah, Tariq
    [J]. 3D RESEARCH, 2014, 5 (04):
  • [29] Enhancing trustworthy deep learning for image classification against evasion attacks: a systematic literature review
    Akhtom, Dua'a Mkhiemir
    Singh, Manmeet Mahinderjit
    Xinying, Chew
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (07)
  • [30] Social Engineering Attacks Prevention: A Systematic Literature Review
    Syafitri, Wenni
    Shukur, Zarina
    Mokhtar, Umi Asma'
    Sulaiman, Rossilawati
    Ibrahim, Muhammad Azwan
    [J]. IEEE ACCESS, 2022, 10 : 39325 - 39343