Adaptive Image Steganography: A Review and Research Directions

被引:0
|
作者
Fadhl, Ayyah Abdulhafith Mahmoud [1 ]
Shareif, Hanein Omar Mohamed [2 ]
Ali, Malak Ahmed Elsherif [3 ]
Elmangoush, Abdullah Mohammad Abdullah [4 ]
机构
[1] Libyan Int Univ, Artificial Intelligence Dept, Benghazi, Libya
[2] Libyan Int Univ, Software Engn Dept, Benghazi, Libya
[3] Libyan Int Univ, Telecommun Dept, Benghazi, Libya
[4] Libyan Int Univ, Comp Network Dept, Benghazi, Libya
关键词
Adaptive Image Steganography; Content Adaptive Image Steganography; CNN-based; end_to_end GAN-based; minimizing additive distortion function-based;
D O I
10.1109/ATSIP62566.2024.10638907
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Steganography involves concealing secret information in an appropriate multimedia carrier, such as text, image, audio, and video files, in such a way that only the sender and receiver suspect the existence of the secret information. Images are the most popular multimedia carriers. Adaptive image steganography is a promising new trend in the steganographic field. It basically means that the embedding locations are altered adaptively depending on the image content. The primary objective of this paper is to investigate and discuss various approaches to adaptive image steganography. The approaches can be broadly categorized as CNN-based, end_to_end GAN-based, and minimizing additive distortion function-based, both huristically and automatically designed. In addition to discussing the four categorized approaches, this paper provides an overview of image steganography including its characteristics or properties, and evaluation metrics. A summary table of all the details is also provided for convenience. The purpose of this paper is to assist fellow researchers by compiling current trends, their advantages and disadvantages, and identifying improvement gaps
引用
收藏
页码:494 / 499
页数:6
相关论文
共 50 条
  • [1] Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions
    Evsutin, Oleg
    Melman, Anna
    Meshcheryakov, Roman
    IEEE ACCESS, 2020, 8 : 166589 - 166611
  • [2] A Review on Image Steganography
    Faraj, Bana Shekh
    Siddiq, Abdulrahman
    PROCEEDINGS OF NINTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 8, ICICT 2024, 2024, 1004 : 1 - 10
  • [3] Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography
    Sharifzadeh, Mehdi
    Aloraini, Mohammed
    Schonfeld, Dan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 867 - 879
  • [4] VidaGAN: Adaptive GAN for image steganography
    Ramandi, Vida Yousefi
    Fateh, Mansoor
    Rezvani, Mohsen
    IET IMAGE PROCESSING, 2024, 18 (12) : 3329 - 3342
  • [5] An adaptive and high capacity image steganography
    Cao, Longhan
    Dai, Qinfang
    Bai, Sen
    Liu, Ruipeng
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2938 - 2942
  • [6] A Strategy of Clustering Modification Directions in Spatial Image Steganography
    Li, Bin
    Wang, Ming
    Li, Xiaolong
    Tan, Shunquan
    Huang, Jiwu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1905 - 1917
  • [7] Research Review on Digital Image Steganography Which Resists Against Compression
    Mehta, Darshan M.
    Bhatti, Dharmendra G.
    EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 529 - 534
  • [8] Adaptive image steganography by reversible data hiding
    Liu, Guangjie
    Dai, Yuewei
    Wang, Zhiquan
    Shiguo, Lian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (ISKE 2007), 2007,
  • [9] Adaptive image steganography using contourlet transform
    Fakhredanesh, Mohammad
    Rahmati, Mohammad
    Safabakhsh, Reza
    JOURNAL OF ELECTRONIC IMAGING, 2013, 22 (04)
  • [10] Adaptive Image Steganography Based on Pixel Selection
    Shen, Qingqing
    Liu, Guangjie
    Liu, Weiwei
    Dai, Yuewei
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 623 - 627