Deep learning based image steganography: A review

被引:12
|
作者
Wani, Mohd Arif [1 ]
Sultan, Bisma [1 ]
机构
[1] Univ Kashmir, Dept Comp Sci, Srinagar, Jammu & Kashmir, India
关键词
deep learning based steganography; GAN-based steganography; image steganography; image steganography classification; image steganography evaluation; steganalysis; ADVERSARIAL; STEGANALYSIS;
D O I
10.1002/widm.1481
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A review of the deep learning based image steganography techniques is presented in this paper. For completeness, the recent traditional steganography techniques are also discussed briefly. The three key parameters (security, embedding capacity, and invisibility) for measuring the quality of an image steganographic technique are described. Various steganography techniques, with emphasis on the above three key parameters, are reviewed. The steganography techniques are classified here into three main categories: Traditional, Hybrid, and fully Deep Learning. The hybrid techniques are further divided into three sub-categories: Cover Generation, Distortion Learning, and Adversarial Embedding. The fully Deep Learning techniques, based on the nature of the input, are further divided into three sub-categories: GAN Embedding, Embedding Less, and Category Label. The main ideas of the important deep learning based steganography techniques are described. The strong and weak features of these techniques are outlined. The results reported by researchers on benchmark data sets CelebA, Bossbase, PASCAL-VOC12, CIFAR-100, ImageNet, and USC-SIPI are used to evaluate the performance of various steganography techniques. Analysis of the results shows that there is scope for new suitable deep learning architectures that can improve the capacity and invisibility of image steganography.This article is categorized under:Technologies > Computational IntelligenceTechnologies > Machine LearningTechnologies > Artificial Intelligence
引用
收藏
页数:26
相关论文
共 50 条
  • [31] High-capacity image steganography algorithm combining image encryption and deep learning
    Yang X.
    Bi X.
    Liu J.
    Huang S.
    Liu, Jia (liujia1022@gmail.com); Liu, Jia (liujia1022@gmail.com), 1600, Editorial Board of Journal on Communications (42): : 96 - 105
  • [32] Research on Steganography of Digital Images based on Deep Learning
    Fu Z.-J.
    Wang F.
    Sun X.-M.
    Wang Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (09): : 1656 - 1672
  • [33] Arabic Text Steganography Based on Deep Learning Methods
    Adeeb, Omer Farooq Ahmed
    Kabudian, Seyed Jahanshah
    IEEE ACCESS, 2022, 10 : 94403 - 94416
  • [34] Learning-based image steganography and watermarking: A survey
    Hu, Kun
    Wang, Mingpei
    Ma, Xiaohui
    Chen, Jia
    Wang, Xiaochao
    Wang, Xingjun
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [35] A Review on Spatial Domain Technique Based on Image Steganography
    Sharma, Neha
    Batra, Usha
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 24 - 27
  • [36] A Review of Image Steganography Based on Multiple Hashing Algorithm
    Alenizi, Abdullah
    Mohammadi, Mohammad Sajid
    Al-Hajji, Ahmad A.
    Ansari, Arshiya Sajid
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2463 - 2494
  • [37] Deep learning-based lung image registration: A review
    Xiao, Hanguang
    Xue, Xufeng
    Zhu, Mi
    Jiang, Xin
    Xia, Qingling
    Chen, Kai
    Li, Huanqi
    Long, Li
    Peng, Ke
    COMPUTERS IN BIOLOGY AND MEDICINE, 2023, 165
  • [38] Review of Deep Learning-Based Image Inpainting Techniques
    Yang, Jing
    Ruhaiyem, Nur Intan Raihana
    IEEE ACCESS, 2024, 12 : 138441 - 138482
  • [39] Explainable Methods for Image-Based Deep Learning: A Review
    Gupta, Lav Kumar
    Koundal, Deepika
    Mongia, Shweta
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2023, 30 (04) : 2651 - 2666
  • [40] Explainable Methods for Image-Based Deep Learning: A Review
    Lav Kumar Gupta
    Deepika Koundal
    Shweta Mongia
    Archives of Computational Methods in Engineering, 2023, 30 : 2651 - 2666