Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are limited. This paper aims to fill the existing gap in extant literature on image steganography schemes capable of resisting statistical steganalysis attacks, by providing a comprehensive systematic literature review. This will ensure image steganography researchers and data protection practitioners are updated on current trends in information security assurance mechanisms. The study sampled 125 articles from ACM Digital Library, IEEE Explore, Science Direct, and Wiley. Using PRISMA, articles were synthesized and analyzed using quantitative and qualitative methods. A comprehensive discussion on image steganography techniques in terms of their robustness against well-known universal statistical steganalysis attacks including Regular-Singular (RS) and Chi-Square (X2) are provided. Trends in publication, techniques and methods, performance evaluation metrics, and security impacts were discussed. Extensive comparisons were drawn among existing techniques to evaluate their merits and limitations. It was observed that Generative Adversarial Networks dominate image steganography techniques and have become the preferred method by scholars within the domain. Artificial intelligence-powered algorithms including Machine Learning, Deep Learning, Convolutional Neural Networks, and Genetic Algorithms are recently dominating image steganography research as they enhance security. The implication is that previously preferred traditional techniques such as LSB algorithms are receiving less attention. Future Research may consider emerging technologies like blockchain technology, artificial neural networks, and biometric and facial recognition technologies to improve the robustness and security capabilities of image steganography applications.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11404826PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0308807PLOS

Publication Analysis

Top Keywords

image steganography
36
steganography techniques
16
statistical steganalysis
16
steganalysis attacks
12
image
9
techniques
8
resisting statistical
8
systematic literature
8
literature review
8
steganography
8

Similar Publications

This paper presents an extensive investigation into the application of artificial intelligence, specifically Convolutional Neural Networks (CNNs), in image steganography detection. We initially evaluated the state-of-the-art steganalysis model, SRNet, on various image steganography techniques, including WOW, HILL, S-UNIWARD, and the innovative Spread Spectrum Image Steganography (SSIS). We found SRNet's performance on SSIS detection to be lower compared to other methods, prompting us to fine-tune the model using SSIS datasets.

View Article and Find Full Text PDF

Sterilization of image steganography using self-supervised convolutional neural network.

PeerJ Comput Sci

September 2024

College of Computer and Information Engineering, Henan Normal University, Xinxiang, Henan, China.

Background: With the development of steganography technology, lawbreakers can implement covert communication in social networks more easily, exacerbating network security risks. Sterilization of image steganography methods can eliminate secret messages to block the transmission of illegal covert communication. However, existing methods overly rely on cover-stego image pairs and are unable to sanitize unknown image, which reduces stego image blocking rate in social networks.

View Article and Find Full Text PDF

Health care images contain a variety of imaging information that has specific features, which can make it challenging to assess and decide on the methods necessitated to safeguard the highly classified visuals from unauthorized exposure during transmission in a communication channel. As a result, this proposed approach utilizes a variety of techniques that will enhance the quality of textual healthcare images, communicate information securely, and interpret textual data from healthcare visuals without difficulty. Natural interference, primarily on the receiver side, reduces text-based healthcare image contrast, and numerous artifacts and adjacent picture element values impede diagnosis.

View Article and Find Full Text PDF

The main goal of image steganalysis, as a technique of confrontation with steganography, is to determine the presence or absence of secret information in conjunction with the specific statistical characteristics of the carrier. With the development of deep learning technology in recent years, the performance of steganography has been gradually enhanced. Especially for the complex reality environment, the image content is mixed and heterogeneous, which brings great challenges to the practical application of image steganalysis technology.

View Article and Find Full Text PDF

The development of innovative methods for concealing critical data in multimedia files has exploded in information security in recent years. Cryptography and steganography cannot be used alone to protect data; rather, they can be combined and used in a single system. Audio steganography is among the most important information security techniques.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!