Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering images a prime target for cyber-attacks. Also, studies examining image steganography techniques are limited. This paper aims to fill the existing gap in extant literature on image steganography schemes capable of resisting statistical steganalysis attacks, by providing a comprehensive systematic literature review. This will ensure image steganography researchers and data protection practitioners are updated on current trends in information security assurance mechanisms. The study sampled 125 articles from ACM Digital Library, IEEE Explore, Science Direct, and Wiley. Using PRISMA, articles were synthesized and analyzed using quantitative and qualitative methods. A comprehensive discussion on image steganography techniques in terms of their robustness against well-known universal statistical steganalysis attacks including Regular-Singular (RS) and Chi-Square (X2) are provided. Trends in publication, techniques and methods, performance evaluation metrics, and security impacts were discussed. Extensive comparisons were drawn among existing techniques to evaluate their merits and limitations. It was observed that Generative Adversarial Networks dominate image steganography techniques and have become the preferred method by scholars within the domain. Artificial intelligence-powered algorithms including Machine Learning, Deep Learning, Convolutional Neural Networks, and Genetic Algorithms are recently dominating image steganography research as they enhance security. The implication is that previously preferred traditional techniques such as LSB algorithms are receiving less attention. Future Research may consider emerging technologies like blockchain technology, artificial neural networks, and biometric and facial recognition technologies to improve the robustness and security capabilities of image steganography applications.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11404826 | PMC |
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0308807 | PLOS |
Sensors (Basel)
December 2024
Institute of Security and Computer Science, University of the National Education Commission, 30-084 Krakow, Poland.
This paper presents an extensive investigation into the application of artificial intelligence, specifically Convolutional Neural Networks (CNNs), in image steganography detection. We initially evaluated the state-of-the-art steganalysis model, SRNet, on various image steganography techniques, including WOW, HILL, S-UNIWARD, and the innovative Spread Spectrum Image Steganography (SSIS). We found SRNet's performance on SSIS detection to be lower compared to other methods, prompting us to fine-tune the model using SSIS datasets.
View Article and Find Full Text PDFPeerJ Comput Sci
September 2024
College of Computer and Information Engineering, Henan Normal University, Xinxiang, Henan, China.
Background: With the development of steganography technology, lawbreakers can implement covert communication in social networks more easily, exacerbating network security risks. Sterilization of image steganography methods can eliminate secret messages to block the transmission of illegal covert communication. However, existing methods overly rely on cover-stego image pairs and are unable to sanitize unknown image, which reduces stego image blocking rate in social networks.
View Article and Find Full Text PDFComput Biol Med
December 2024
Department of Technical Education Uttar Pradesh, India.
Health care images contain a variety of imaging information that has specific features, which can make it challenging to assess and decide on the methods necessitated to safeguard the highly classified visuals from unauthorized exposure during transmission in a communication channel. As a result, this proposed approach utilizes a variety of techniques that will enhance the quality of textual healthcare images, communicate information securely, and interpret textual data from healthcare visuals without difficulty. Natural interference, primarily on the receiver side, reduces text-based healthcare image contrast, and numerous artifacts and adjacent picture element values impede diagnosis.
View Article and Find Full Text PDFSci Rep
November 2024
College of Cryptographic Engineering, Engineering University of PAP, Xi'an, 710086, China.
The main goal of image steganalysis, as a technique of confrontation with steganography, is to determine the presence or absence of secret information in conjunction with the specific statistical characteristics of the carrier. With the development of deep learning technology in recent years, the performance of steganography has been gradually enhanced. Especially for the complex reality environment, the image content is mixed and heterogeneous, which brings great challenges to the practical application of image steganalysis technology.
View Article and Find Full Text PDFSci Rep
September 2024
Electronics and Communications Engineering Department, Faculty of Engineering, Canadian International College (CIC), Giza, Egypt.
The development of innovative methods for concealing critical data in multimedia files has exploded in information security in recent years. Cryptography and steganography cannot be used alone to protect data; rather, they can be combined and used in a single system. Audio steganography is among the most important information security techniques.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!