scispace - formally typeset
Journal ArticleDOI

Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research

TLDR
A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.
About
This article is published in Neurocomputing.The article was published on 2019-03-28. It has received 253 citations till now. The article focuses on the topics: Steganography & Steganalysis.

read more

Citations
More filters
Journal ArticleDOI

PSNR vs SSIM: imperceptibility quality assessment for image steganography

TL;DR: This research concludes that SSIM is a better measure of imperceptibility in all aspects and it is preferable that in the next steganographic research at least use SSIM.
Journal ArticleDOI

An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map.

TL;DR: This work proposes an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permutation, diffusion, and key stream generation to withstand the attacks.
Journal ArticleDOI

A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding

TL;DR: An efficient and robust meaningful image encryption (MIE) scheme is developed by combining block compressive sensing and singular value decomposition (SVD) embedding by combining hyper-chaotic Lorenz system and SVD embedding.
Proceedings ArticleDOI

Large-capacity Image Steganography Based on Invertible Neural Networks

TL;DR: In this paper, a large capacity Invertible Steganography Network (ISN) is proposed for image steganography, which takes the recovery of hidden images as a pair of inverse problems on image domain transformation.
Journal ArticleDOI

Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons

TL;DR: This paper compares the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image.
References
More filters
Book

Neural Networks: A Comprehensive Foundation

Simon Haykin
TL;DR: Thorough, well-organized, and completely up to date, this book examines all the important aspects of this emerging technology, including the learning process, back-propagation learning, radial-basis function networks, self-organizing systems, modular networks, temporal processing and neurodynamics, and VLSI implementation of neural networks.
Book

Compressed sensing

TL;DR: It is possible to design n=O(Nlog(m)) nonadaptive measurements allowing reconstruction with accuracy comparable to that attainable with direct knowledge of the N most important coefficients, and a good approximation to those N important coefficients is extracted from the n measurements by solving a linear program-Basis Pursuit in signal processing.
Journal ArticleDOI

An Introduction To Compressive Sampling

TL;DR: The theory of compressive sampling, also known as compressed sensing or CS, is surveyed, a novel sensing/sampling paradigm that goes against the common wisdom in data acquisition.
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

The dual-tree complex wavelet transform

TL;DR: Several methods for filter design are described for dual-tree CWT that demonstrates with relatively short filters, an effective invertible approximately analytic wavelet transform can indeed be implemented using the dual- tree approach.
Related Papers (5)