A Survey on Digital Image Steganography

Internet brings us not only the convenience of communication but also some security risks, such as intercepting information and stealing information. Therefore, some important information needs to be hidden during communication. Steganography is the most common information hiding technology. This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms. Moreover, their advantages and weaknesses are pointed out. Finally, further research directions are discussed.

[1]  George Danezis,et al.  Generating steganographic images via adversarial training , 2017, NIPS.

[2]  Naser Ebrahimian,et al.  A New Method for Color Image Steganography Using SPIHT and DFT, Sending with JPEG Format , 2009, 2009 International Conference on Computer Technology and Development.

[3]  Francisco Madeiro,et al.  Word-Hunt: A LSB Steganography Method with Low Expected Number of Modifications per Pixel , 2016, IEEE Latin America Transactions.

[4]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[5]  Wang Zhi-quan High Capacity Information Hiding Scheme for JPEG Images , 2007 .

[6]  Ali N. Akansu,et al.  A robust data hiding scheme for images using DFT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[7]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[8]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[9]  C.-C. Jay Kuo,et al.  Steganography in JPEG2000 compressed images , 2003, IEEE Trans. Consumer Electron..

[10]  Richa Gupta,et al.  Importance and Techniques of Information Hiding : A Review , 2014, ArXiv.

[11]  A.A. Abdelwahab,et al.  A discrete wavelet transform based technique for image data hiding , 2008, 2008 National Radio Science Conference.

[12]  Lei Xu,et al.  SteganoGAN: High Capacity Image Steganography with GANs , 2019, ArXiv.

[13]  Kai Liu,et al.  Spatial Image Steganography Based on Generative Adversarial Network , 2018, ArXiv.

[14]  Wen-Nung Lie,et al.  Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[15]  Rafia Rahim,et al.  End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.

[16]  Liang Zhang,et al.  A High-Capacity Steganography Scheme for JPEG2000 Baseline System , 2009, IEEE Transactions on Image Processing.

[17]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[18]  Robert M. Hierons,et al.  High Capacity Steganographic Method Based Upon JPEG , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[19]  N. Vongurai,et al.  Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform , 2012, 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation.

[20]  Evgeny Burnaev,et al.  Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.

[21]  Li Fei-Fei,et al.  HiDDeN: Hiding Data With Deep Networks , 2018, ECCV.

[22]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[23]  Bin Li,et al.  A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.

[24]  Mohammad Ali Akhaee,et al.  One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme , 2014, IET Image Process..

[25]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[26]  Wen-Yuan Chen,et al.  Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..

[27]  T. Shahara Banu,et al.  Secure reversible data hiding technique on textures using double encryption , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[28]  Jianyi Liu,et al.  Invisible steganography via generative adversarial networks , 2018, Multimedia Tools and Applications.

[29]  Francisco J. Gallegos Funes,et al.  Color local complexity estimation based steganographic (CLCES) method , 2013, Expert Syst. Appl..

[30]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[31]  Jing Dong,et al.  SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.

[32]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[33]  Edward Rivas Fourier phase domain steganography: phase bin encoding via interpolation , 2007, SPIE Defense + Commercial Sensing.

[34]  Bin Li,et al.  Automatic Steganographic Distortion Learning Using a Generative Adversarial Network , 2017, IEEE Signal Processing Letters.

[35]  H. B. Kekre,et al.  Increased cover capacity using advanced multiple LSB algorithms , 2011, ICWET.