4.6 Review

A review of coverless steganography

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Adaptive HEVC Steganography Based on Steganographic Compression Efficiency Degradation Model

Yi Dong et al.

Summary: This study proposes a Steganographic Compression Efficiency Degradation Model (SCEDM), which minimizes the degradation of compression efficiency caused by steganographies without increasing visual quality distortion. Based on this model, a novel adaptive steganography using HEVC intra block partitioning structure is introduced, which increases capacity and minimizes compression efficiency degradation. Experimental results demonstrate the effectiveness and advantages of the proposed model and steganography in compression efficiency, capacity, visual quality, and resistance to video steganalysis.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Hardware & Architecture

An Anti-Steganalysis HEVC Video Steganography With High Performance Based on CNN and PU Partition Modes

Zhonghao Li et al.

Summary: This article proposes a prediction unit(PU) based wide residual-net steganography(PWRN) for HEVC videos. The data hiding method in this article allows to modify all types of PUs except for 2N x 2N according to the secret data. The experimental results show that PWRN successfully resists the latest PU-targeted steganalysis algorithms and achieves the lowest bitrate cost and highest visual quality under the same capacity compared to the state-of-the-art work.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Multi-Channel HEVC Steganography by Minimizing IPM Steganographic Distortions

Yi Dong et al.

Summary: This paper proposes an HEVC steganographic algorithm that resists IPM shift by introducing channel division and distortion function based on block size, and discovering a unique IPM transition probability distribution in HEVC. A mapping rule is designed based on this distribution to achieve a better embedding effect. Experimental results show that the proposed algorithm outperforms the state-of-the-art steganography in resisting steganalysis, bitrate controlling, and visual quality.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Engineering, Electrical & Electronic

Self-attention enhanced deep residual network for spatial image steganalysis

Guoliang Xie et al.

Summary: This paper proposes an enhanced residual network (ERANet) for spatial image steganalysis, which utilizes a more complex residual method and a global self-attention technique to extract more effective features. Experimental results show that ERANet outperforms other CNNs on the BOSSbase and ALASKA#2 datasets.

DIGITAL SIGNAL PROCESSING (2023)

Article Engineering, Electrical & Electronic

A Robust Coverless Image Steganography Based on an End-to-End Hash Generation Model

Laijin Meng et al.

Summary: This paper proposes a robust coverless image steganography algorithm based on a hash generation model. The hash sequences are generated by an end-to-end CNN model, eliminating the need for transmitting auxiliary information. Attention mechanism and adversarial training are introduced to enhance the model's robustness, while an index structure is built to improve mapping efficiency. Experimental results demonstrate that the proposed method achieves better robustness and security compared to existing algorithms.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2023)

Article Automation & Control Systems

JPEG Steganography With Content Similarity Evaluation

Zichi Wang et al.

Summary: This article investigates the application of content similarity in JPEG steganography to improve its undetectability. A distortion function is designed using the content similarity of DCT blocks and parallel channels, and the initial embedding costs are updated based on the similarities of blocks and channels. Experimental results show that this scheme achieves better undetectability than current state-of-the-art JPEG steganographic methods.

IEEE TRANSACTIONS ON CYBERNETICS (2023)

Article Engineering, Multidisciplinary

Novel Coverless Steganography Method Based on Image Selection and StarGAN

Xianyi Chen et al.

Summary: This study proposes a new method of Cover Less Image Steganography (CIS) based on image selection and Star Generative Adversarial Network (StarGAN). The method aims to increase the hidden capacity, maintain better image quality, and enhance robustness and security performance.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Engineering, Multidisciplinary

Channel Attention Image Steganography With Generative Adversarial Networks

Jingxuan Tan et al.

Summary: This paper proposes a novel network architecture for image steganography based on generative adversarial networks with channel attention mechanisms. The proposed model can generate imperceptible stego images at various capacities and outperforms traditional algorithms and current GAN-based steganographic schemes.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Engineering, Electrical & Electronic

A Robust Coverless Steganography Scheme Using Camouflage Image

Qiang Liu et al.

Summary: This paper proposes a robust coverless steganography scheme using camouflage image (CI-CIS), which introduces a camouflage image as the transmission carrier and establishes the correlation between them using Convolutional Neural Network (CNN) features. By designing a reversible retrieval scheme through image clustering, the camouflage image can retrieve the corresponding stego-image to recover the secret information. Experimental results show that CI-CIS has higher robustness and more flexible capacity setting compared to existing CIS methods.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article

A coverless image steganography based on robust image wavelet hashing

Nadia A. Karim et al.

Telkomnika (Telecommunication Computing Electronics and Control) (2022)

Article Engineering, Electrical & Electronic

A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation

Fei Peng et al.

Summary: This paper proposes a novel image steganography framework based on the generator of GAN and gradient descent approximation to address the irreversibility problem in some common neural networks for secret data extraction. Experimental results show that the proposed method achieves good performance in extraction accuracy, capacity, and robustness, and it also demonstrates good generalization with different GAN models and image datasets.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

Feature Passing Learning for Image Steganalysis

Jiahao Liu et al.

Summary: Image steganalysis is a critical technique in information security, and our proposed FPNet network outperforms existing state-of-the-art methods in various aspects according to several experiments.

IEEE SIGNAL PROCESSING LETTERS (2022)

Article Computer Science, Theory & Methods

Universal Deep Network for Steganalysis of Color Image Based on Channel Representation

Kangkang Wei et al.

Summary: In this paper, a universal color image steganalysis network called UCNet is designed for both spatial and JPEG domains. The method preserves steganalytic features in each color channel through preprocessing, convolutional, and classification modules. The proposed method achieves state-of-the-art results comparable to other modern CNN-based steganalyzers in both domains, with low memory requirements and short training times.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Information Systems

An encrypted coverless information hiding method based on generative models

Qi Li et al.

Summary: The paper introduces an encrypted coverless information hiding method that transfers secret images between different image domains using generative models, addressing the issue of traditional image steganography methods leaving traces in cover images. Experimental results show that the method is able to generate high-quality encrypted images with strong security and reconstruction ability.

INFORMATION SCIENCES (2021)

Article Engineering, Electrical & Electronic

Coverless Image Steganography Based on Multi-Object Recognition

Yuanjing Luo et al.

Summary: The proposed method utilizes multi-object recognition to generate robust binary sequences, introduces a novel mapping rule, effectively resists geometric attacks and noise attacks, with images remaining unmodified during transmission, demonstrating strong robustness.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2021)

Article Computer Science, Information Systems

Blind MV-based video steganalysis based on joint inter-frame and intra-frame statistics

Negin Ghamsarian et al.

Summary: The paper introduces a method for detecting MV-based video steganography using spatio-temporal features for blind detection. Experimental results demonstrate that the performance of these features far exceeds that of existing steganalysis methods.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Theory & Methods

A Siamese CNN for Image Steganalysis

Weike You et al.

Summary: This paper explores the use of convolutional neural networks for image steganalysis and proposes an end-to-end deep learning solution for distinguishing steganography images from normal images without retraining parameters. The proposed network demonstrates satisfactory performance in classifying images of different sizes using shared parameters and a Siamese CNN architecture.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Artificial Intelligence

Coverless real-time image information hiding based on image block matching and dense convolutional network

Yuanjing Luo et al.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2020)

Article Engineering, Electrical & Electronic

A New Payload Partition Strategy in Color Image Steganography

Xin Liao et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2020)

Article Computer Science, Artificial Intelligence

Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping

Qiang Liu et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Engineering, Electrical & Electronic

A video coverless information hiding algorithm based on semantic segmentation

Nan Pan et al.

EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING (2020)

Article Computer Science, Theory & Methods

Universal Detection of Video Steganography in Multiple Domains Based on the Consistency of Motion Vectors

Liming Zhai et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Artificial Intelligence

Coverless image steganography using partial-duplicate image retrieval

Zhili Zhou et al.

SOFT COMPUTING (2019)

Article Engineering, Electrical & Electronic

Towards Robust Image Steganography

Jinyuan Tao et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

CNN-Based Adversarial Embedding for Image Steganography

Weixuan Tang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Artificial Intelligence

Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

Inas Jawad Kadhim et al.

NEUROCOMPUTING (2019)

Review Computer Science, Artificial Intelligence

Video steganography: A review

Yunxia Liu et al.

NEUROCOMPUTING (2019)

Article Computer Science, Information Systems

Coverless Image Steganography: A Survey

Jiaohua Qin et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

An efficient information hiding method based on motion vector space encoding for HEVC

Jie Yang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Deep residual learning for image steganalysis

Songtao Wu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework

Jishen Zeng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

Xiang Zhang et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Computer Science, Information Systems

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

Donghui Hu et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

Deep Learning Hierarchical Representations for Image Steganalysis

Jian Ye et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Artificial Intelligence

A new data hiding method for H.264 based on secret sharing

Yunxia Liu et al.

NEUROCOMPUTING (2016)

Article Computer Science, Artificial Intelligence

A reversible data hiding method for H.264 with Shamir's (t, n)-threshold secret sharing

Yunxia Liu et al.

NEUROCOMPUTING (2016)

Article Computer Science, Artificial Intelligence

A robust reversible data hiding scheme for H.264 without distortion drift

Yunxia Liu et al.

NEUROCOMPUTING (2015)

Article Computer Science, Artificial Intelligence

A new robust data hiding method for H.264/AVC without intra-frame distortion drift

Yunxia Liu et al.

NEUROCOMPUTING (2015)

Article Computer Science, Information Systems

Defining embedding distortion for motion vector-based video steganography

Yuanzhi Yao et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2015)

Article Computer Science, Theory & Methods

Video Steganalysis Against Motion Vector-Based Steganography by Adding or Subtracting One Motion Vector Value

Keren Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Information Systems

A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames

Po-Chun Chang et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2014)

Article Computer Science, Information Systems

Digital video steganalysis by subtractive prediction error adjacency matrix

Keren Wang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Computer Science, Information Systems

A robust without intra-frame distortion drift data hiding algorithm based on H.264/AVC

Yunxia Liu et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2014)

Article Computer Science, Theory & Methods

Random Projections of Residuals for Digital Image Steganalysis

Vojtech Holub et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2013)

Article Engineering, Electrical & Electronic

Video Steganalysis Exploiting Motion Vector Reversion-Based Features

Yun Cao et al.

IEEE SIGNAL PROCESSING LETTERS (2012)

Article Computer Science, Theory & Methods

Rich Models for Steganalysis of Digital Images

Jessica Fridrich et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error

Hussein A. Aly

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Theory & Methods

Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes

Tomas Filler et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Engineering, Electrical & Electronic

A video steganalytic algorithm against motion-vector-based steganography

Yuting Su et al.

SIGNAL PROCESSING (2011)

Article Engineering, Electrical & Electronic

A Data Hiding Algorithm for H.264/AVC Video Streams Without Intra-Frame Distortion Drift

Xiaojing Ma et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2010)

Article Computer Science, Theory & Methods

Adaptive data hiding in edge areas of images with spatial LSB domain systems

Cheng-Hsing Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)

Article Computer Science, Theory & Methods

A framework for robust watermarking of H.264-encoded video with controllable detection performance

Maneli Noorkami et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2007)