Journal ArticleDOI
Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research
TLDR
A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.About:
This article is published in Neurocomputing.The article was published on 2019-03-28. It has received 253 citations till now. The article focuses on the topics: Steganography & Steganalysis.read more
Citations
More filters
Journal ArticleDOI
PSNR vs SSIM: imperceptibility quality assessment for image steganography
TL;DR: This research concludes that SSIM is a better measure of imperceptibility in all aspects and it is preferable that in the next steganographic research at least use SSIM.
Journal ArticleDOI
An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map.
Priya Ramasamy,Vidhyapriya Ranganathan,Seifedine Kadry,Robertas Damasevicius,Tomas Blažauskas +4 more
TL;DR: This work proposes an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks.
Journal ArticleDOI
A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding
TL;DR: An efficient and robust meaningful image encryption (MIE) scheme is developed by combining block compressive sensing and singular value decomposition (SVD) embedding by combining hyper-chaotic Lorenz system and SVD embedding.
Proceedings ArticleDOI
Large-capacity Image Steganography Based on Invertible Neural Networks
TL;DR: In this paper, a large capacity Invertible Steganography Network (ISN) is proposed for image steganography, which takes the recovery of hidden images as a pair of inverse problems on image domain transformation.
Journal ArticleDOI
Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
Adnan Gutub,Faiza Al-Shaarani +1 more
TL;DR: This paper compares the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image.
References
More filters
Book
Neural Networks: A Comprehensive Foundation
TL;DR: Thorough, well-organized, and completely up to date, this book examines all the important aspects of this emerging technology, including the learning process, back-propagation learning, radial-basis function networks, self-organizing systems, modular networks, temporal processing and neurodynamics, and VLSI implementation of neural networks.
Book
Compressed sensing
TL;DR: It is possible to design n=O(Nlog(m)) nonadaptive measurements allowing reconstruction with accuracy comparable to that attainable with direct knowledge of the N most important coefficients, and a good approximation to those N important coefficients is extracted from the n measurements by solving a linear program-Basis Pursuit in signal processing.
Journal ArticleDOI
An Introduction To Compressive Sampling
TL;DR: The theory of compressive sampling, also known as compressed sensing or CS, is surveyed, a novel sensing/sampling paradigm that goes against the common wisdom in data acquisition.
Journal ArticleDOI
Information hiding-a survey
TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI
The dual-tree complex wavelet transform
TL;DR: Several methods for filter design are described for dual-tree CWT that demonstrates with relatively short filters, an effective invertible approximately analytic wavelet transform can indeed be implemented using the dual- tree approach.