Adaptive Image Steganography: A Review and Research Directions

被引:0
|
作者
Fadhl, Ayyah Abdulhafith Mahmoud [1 ]
Shareif, Hanein Omar Mohamed [2 ]
Ali, Malak Ahmed Elsherif [3 ]
Elmangoush, Abdullah Mohammad Abdullah [4 ]
机构
[1] Libyan Int Univ, Artificial Intelligence Dept, Benghazi, Libya
[2] Libyan Int Univ, Software Engn Dept, Benghazi, Libya
[3] Libyan Int Univ, Telecommun Dept, Benghazi, Libya
[4] Libyan Int Univ, Comp Network Dept, Benghazi, Libya
关键词
Adaptive Image Steganography; Content Adaptive Image Steganography; CNN-based; end_to_end GAN-based; minimizing additive distortion function-based;
D O I
10.1109/ATSIP62566.2024.10638907
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Steganography involves concealing secret information in an appropriate multimedia carrier, such as text, image, audio, and video files, in such a way that only the sender and receiver suspect the existence of the secret information. Images are the most popular multimedia carriers. Adaptive image steganography is a promising new trend in the steganographic field. It basically means that the embedding locations are altered adaptively depending on the image content. The primary objective of this paper is to investigate and discuss various approaches to adaptive image steganography. The approaches can be broadly categorized as CNN-based, end_to_end GAN-based, and minimizing additive distortion function-based, both huristically and automatically designed. In addition to discussing the four categorized approaches, this paper provides an overview of image steganography including its characteristics or properties, and evaluation metrics. A summary table of all the details is also provided for convenience. The purpose of this paper is to assist fellow researchers by compiling current trends, their advantages and disadvantages, and identifying improvement gaps
引用
收藏
页码:494 / 499
页数:6
相关论文
共 50 条
  • [41] A high quality image sharing with steganography and adaptive authentication scheme
    Wu, Chia-Chun
    Kao, Shang-Juh
    Hwang, Min-Shiang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2196 - 2207
  • [42] An adaptive image steganography using AMBTC compression and interpolation technique
    Tang, Mingwei
    Zeng, Shenke
    Chen, Xiaoliang
    Hu, Jie
    Du, Yajun
    OPTIK, 2016, 127 (01): : 471 - 477
  • [43] Adaptive Color Image Steganography Based on Dynamic Distortion Modification
    Tang G.
    Jiang M.
    Sun Y.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2019, 41 (03): : 656 - 665
  • [44] Research on image steganography analysis based on deep learning
    Zou, Ying
    Zhang, Ge
    Liu, Leian
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 60 : 266 - 275
  • [45] Multiple Robustness Enhancements for Image Adaptive Steganography in Lossy Channels
    Zhang, Yi
    Luo, Xiangyang
    Guo, Yanqing
    Qin, Chuan
    Liu, Fenlin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 30 (08) : 2750 - 2764
  • [46] Image Steganography Using Remainder Replacement, Adaptive QVD and QVC
    Swain, Gandharba
    Pradhan, Anita
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (01) : 273 - 293
  • [47] Digital Image Authentication Model Based on Edge Adaptive Steganography
    Grover, Nidhi
    Mohapatra, A. K.
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 238 - 242
  • [48] A Novel Image Steganography Methodology Based on Adaptive PMS Technique
    Mukherjee, Srilekha
    Sanyal, Goutam
    PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 1, 2018, 518 : 157 - 164
  • [49] Image Steganography Using Remainder Replacement, Adaptive QVD and QVC
    Gandharba Swain
    Anita Pradhan
    Wireless Personal Communications, 2022, 123 : 273 - 293
  • [50] Enhancing Adversarial Embedding based Image Steganography via Clustering Modification Directions
    Wang, Dewang
    Yang, Gaobo
    Guo, Zhiqing
    Chen, Jiyou
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2024, 20 (01)