An Extensive Survey of Digital Image Steganography: State of the Art
- URL: http://arxiv.org/abs/2404.19548v1
- Date: Tue, 30 Apr 2024 13:16:24 GMT
- Title: An Extensive Survey of Digital Image Steganography: State of the Art
- Authors: Idakwo M. A., Muazu M. B., Adedokun A. E., Sadiq B. O,
- Abstract summary: The need to protect sensitive information privacy duringinformation exchange over the internet/intranet has led to wide adoption of cryptography and steganography.
This paper critically analyzes the current steganographic techniques, recent trends, and challenges.
- Score: 0.0
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: The need to protect sensitive information privacy duringinformation exchange over the internet/intranet has led towider adoption of cryptography and steganography. The cryptography approaches convert the information into an unreadable format however draws the attention of cryptanalyst owing to the uncommon random nature flow of the bytes when viewing the flowing structured bytes on a computer. While steganography, in contrast, conceals the very existence of covert communication using digital media. Although any digital media (text, image, video, audio) can covey the sensitive information, the media with higher redundant bits are more favorable for embedding the sensitive information without distorting the media. Digital images are majorly used in conveying sensitive information compared to others owing to their higher rate of tolerating distortions, highly available, smaller sizes with high redundant bits. However, the need for maximizing the redundancy bits for the optimum embedding of secret information has been a paramount issue due to the imperceptibility prerequisite which deteriorates with an increase in payload thus, resulting in a tradeoff. This has limited steganography to only applications with lower payload requirements, thus limiting the adoption for wider deployment. This paper critically analyzes the current steganographic techniques, recent trends, and challenges.
Related papers
- Can Encrypted Images Still Train Neural Networks? Investigating Image Information and Random Vortex Transformation [51.475827684468875]
We establish a novel framework for measuring image information content to evaluate the variation in information content during image transformations.
We also propose a novel image encryption algorithm called Random Vortex Transformation.
arXiv Detail & Related papers (2024-11-25T09:14:53Z) - Robust Message Embedding via Attention Flow-Based Steganography [34.35209322360329]
Image steganography can hide information in a host image and obtain a stego image that is perceptually indistinguishable from the original one.
We propose a novel message embedding framework, called Robust Message Steganography (RMSteg), which is competent to hide message via QR Code in a host image.
arXiv Detail & Related papers (2024-05-26T03:16:40Z) - Perceptual Image Compression with Cooperative Cross-Modal Side
Information [53.356714177243745]
We propose a novel deep image compression method with text-guided side information to achieve a better rate-perception-distortion tradeoff.
Specifically, we employ the CLIP text encoder and an effective Semantic-Spatial Aware block to fuse the text and image features.
arXiv Detail & Related papers (2023-11-23T08:31:11Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Fighting Malicious Media Data: A Survey on Tampering Detection and
Deepfake Detection [115.83992775004043]
Recent advances in deep learning, particularly deep generative models, open the doors for producing perceptually convincing images and videos at a low cost.
This paper provides a comprehensive review of the current media tampering detection approaches, and discusses the challenges and trends in this field for future research.
arXiv Detail & Related papers (2022-12-12T02:54:08Z) - A Compact Neural Network-based Algorithm for Robust Image Watermarking [30.727227627295548]
We propose a novel digital image watermarking solution with a compact neural network, named Invertible Watermarking Network (IWN)
Our IWN architecture is based on a single Invertible Neural Network (INN)
In order to enhance the robustness of our watermarking solution, we specifically introduce a simple but effective bit message normalization module.
arXiv Detail & Related papers (2021-12-27T03:20:45Z) - A New Approach for Image Authentication Framework for Media Forensics
Purpose [0.0]
This paper introduces a novel digital forensic security framework for digital image authentication and originality identification.
The approach depends on implanting secret code into RGB images that should indicate any unauthorized modification on the image under investigation.
arXiv Detail & Related papers (2021-10-03T18:31:37Z) - News Image Steganography: A Novel Architecture Facilitates the Fake News
Identification [52.83247667841588]
A larger portion of fake news quotes untampered images from other sources with ulterior motives.
This paper proposes an architecture named News Image Steganography to reveal the inconsistency through image steganography based on GAN.
arXiv Detail & Related papers (2021-01-03T11:12:23Z) - Multi-Image Steganography Using Deep Neural Networks [9.722040907570072]
Steganography is the science of hiding a secret message within an ordinary public message.
We aim to utilize deep neural networks for the encoding and decoding of multiple secret images inside a single cover image of the same resolution.
arXiv Detail & Related papers (2021-01-02T01:51:38Z) - Modeling Lost Information in Lossy Image Compression [72.69327382643549]
Lossy image compression is one of the most commonly used operators for digital images.
We propose a novel invertible framework called Invertible Lossy Compression (ILC) to largely mitigate the information loss problem.
arXiv Detail & Related papers (2020-06-22T04:04:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.