Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (16)

Search Parameters:
Keywords = spatial steganography

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 11319 KB  
Article
Enhancing Feature Integrity and Transmission Stealth: A Multi-Channel Imaging Hiding Method for Network Abnormal Traffic
by Zhenghao Qian, Fengzheng Liu, Mingdong He and Denghui Zhang
Buildings 2025, 15(20), 3638; https://doi.org/10.3390/buildings15203638 - 10 Oct 2025
Viewed by 198
Abstract
In open-network environments of smart buildings and urban infrastructure, abnormal traffic from security and energy monitoring systems is critical for operational safety and decision reliability. We can develop malware that exploits building automation protocols to simulate attacks involving the falsification or modification of [...] Read more.
In open-network environments of smart buildings and urban infrastructure, abnormal traffic from security and energy monitoring systems is critical for operational safety and decision reliability. We can develop malware that exploits building automation protocols to simulate attacks involving the falsification or modification of chiller controller commands, thereby endangering the entire network infrastructure. Intrusion detection systems rely on abundant labeled abnormal traffic data to detect attack patterns, improving network system reliability. However, transmitting such data faces two major challenges: single-feature representations fail to capture comprehensive traffic features, limiting the information representation for artificial intelligence (AI)-based detection models, and unconcealed abnormal traffic is easily intercepted by firewalls or intrusion detection systems, hindering cross-departmental sharing. Existing methods struggle to balance feature integrity and transmission stealth, often sacrificing one for the other or relying on easily detectable spatial-domain steganography. To address these gaps, we propose a multi-channel imaging hiding method that reconstructs abnormal traffic into multi-channel images by combining three mappings to generate grayscale images that depict traffic state transitions, dynamic trends, and internal similarity, respectively. These images are combined to enhance feature representation and embedded into frequency-domain adversarial examples, enabling evasion of security devices while preserving traffic integrity. Experimental results demonstrate that our method captures richer information than single-representation approaches, achieving a PSNR of 44.5 dB (a 6.0 dB improvement over existing methods) and an SSIM of 0.97. The high-fidelity reconstructions enabled by these gains facilitate the secure and efficient sharing of abnormal traffic data, thereby enhancing AI-driven security in smart buildings. Full article
Show Figures

Figure 1

18 pages, 1956 KB  
Article
Two Novel Quantum Steganography Algorithms Based on LSB for Multichannel Floating-Point Quantum Representation of Digital Signals
by Meiyu Xu, Dayong Lu, Youlin Shang, Muhua Liu and Songtao Guo
Electronics 2025, 14(14), 2899; https://doi.org/10.3390/electronics14142899 - 20 Jul 2025
Viewed by 599
Abstract
Currently, quantum steganography schemes utilizing the least significant bit (LSB) approach are primarily optimized for fixed-point data processing, yet they encounter precision limitations when handling extended floating-point data structures owing to quantization error accumulation. To overcome precision constraints in quantum data hiding, the [...] Read more.
Currently, quantum steganography schemes utilizing the least significant bit (LSB) approach are primarily optimized for fixed-point data processing, yet they encounter precision limitations when handling extended floating-point data structures owing to quantization error accumulation. To overcome precision constraints in quantum data hiding, the EPlsb-MFQS and MVlsb-MFQS quantum steganography algorithms are constructed based on the LSB approach in this study. The multichannel floating-point quantum representation of digital signals (MFQS) model enhances information hiding by augmenting the number of available channels, thereby increasing the embedding capacity of the LSB approach. Firstly, we analyze the limitations of fixed-point signals steganography schemes and propose the conventional quantum steganography scheme based on the LSB approach for the MFQS model, achieving enhanced embedding capacity. Moreover, the enhanced embedding efficiency of the EPlsb-MFQS algorithm primarily stems from the superposition probability adjustment of the LSB approach. Then, to prevent an unauthorized person easily extracting secret messages, we utilize channel qubits and position qubits as novel carriers during quantum message encoding. The secret message is encoded into the signal’s qubits of the transmission using a particular modulo value rather than through sequential embedding, thereby enhancing the security and reducing the time complexity in the MVlsb-MFQS algorithm. However, this algorithm in the spatial domain has low robustness and security. Therefore, an improved method of transferring the steganographic process to the quantum Fourier transformed domain to further enhance security is also proposed. This scheme establishes the essential building blocks for quantum signal processing, paving the way for advanced quantum algorithms. Compared with available quantum steganography schemes, the proposed steganography schemes achieve significant improvements in embedding efficiency and security. Finally, we theoretically delineate, in detail, the quantum circuit design and operation process. Full article
Show Figures

Figure 1

20 pages, 1526 KB  
Article
Chroma Backdoor: A Stealthy Backdoor Attack Based on High-Frequency Wavelet Injection in the UV Channels
by Yukang Fan, Kun Zhang, Bing Zheng, Yu Zhou, Jinyang Zhou and Wenting Pan
Symmetry 2025, 17(7), 1014; https://doi.org/10.3390/sym17071014 - 27 Jun 2025
Viewed by 812
Abstract
With the widespread adoption of deep learning in critical domains, such as computer vision, model security has become a growing concern. Backdoor attacks, as a highly stealthy threat, have emerged as a significant research topic in AI security. Existing backdoor attack methods primarily [...] Read more.
With the widespread adoption of deep learning in critical domains, such as computer vision, model security has become a growing concern. Backdoor attacks, as a highly stealthy threat, have emerged as a significant research topic in AI security. Existing backdoor attack methods primarily introduce perturbations in the spatial domain of images, which suffer from limitations, such as visual detectability and signal fragility. Although subsequent approaches, such as those based on steganography, have proposed more covert backdoor attack schemes, they still exhibit various shortcomings. To address these challenges, this paper presents HCBA (high-frequency chroma backdoor attack), a novel backdoor attack method based on high-frequency injection in the UV chroma channels. By leveraging discrete wavelet transform (DWT), HCBA embeds a polarity-triggered perturbation in the high-frequency sub-bands of the UV channels in the YUV color space. This approach capitalizes on the human visual system’s insensitivity to high-frequency signals, thereby enhancing stealthiness. Moreover, high-frequency components exhibit strong stability during data transformations, improving robustness. The frequency-domain operation also simplifies the trigger embedding process, enabling high attack success rates with low poisoning rates. Extensive experimental results demonstrate that HCBA achieves outstanding performance in terms of both stealthiness and evasion of existing defense mechanisms while maintaining a high attack success rate (ASR > 98.5%). Specifically, it improves the PSNR by 25% compared to baseline methods, with corresponding enhancements in SSIM as well. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

33 pages, 20540 KB  
Article
SG-ResNet: Spatially Adaptive Gabor Residual Networks with Density-Peak Guidance for Joint Image Steganalysis and Payload Location
by Zhengliang Lai, Chenyi Wu, Xishun Zhu, Jianhua Wu and Guiqin Duan
Mathematics 2025, 13(9), 1460; https://doi.org/10.3390/math13091460 - 29 Apr 2025
Cited by 1 | Viewed by 719
Abstract
Image steganalysis detects hidden information in digital images by identifying statistical anomalies, serving as a forensic tool to reveal potential covert communication. The field of deep learning-based image steganography has relatively scarce effective steganalysis methods, particularly those designed to extract hidden information. This [...] Read more.
Image steganalysis detects hidden information in digital images by identifying statistical anomalies, serving as a forensic tool to reveal potential covert communication. The field of deep learning-based image steganography has relatively scarce effective steganalysis methods, particularly those designed to extract hidden information. This paper introduces an innovative image steganalysis method based on generative adaptive Gabor residual networks with density-peak guidance (SG-ResNet). SG-ResNet employs a dual-stream collaborative architecture to achieve precise detection and reconstruction of steganographic information. The classification subnet utilizes dual-frequency adaptive Gabor convolutional kernels to decouple high-frequency texture and low-frequency contour components in images. It combines a density peak clustering with three quantization and transformation-enhanced convolutional blocks to generate steganographic covariance matrices, enhancing the weak steganographic signals. The reconstruction subnet synchronously constructs multi-scale features, preserves steganographic spatial fingerprints with channel-separated residual spatial rich model and pixel reorganization operators, and achieves sub-pixel-level steganographic localization via iterative optimization mechanism of feedback residual modules. Experimental results obtained with datasets generated by several public steganography algorithms demonstrate that SG-ResNet achieves State-of-the-Art results in terms of detection accuracy, with 0.94, and with a PSNR of 29 between reconstructed and original secret images. Full article
(This article belongs to the Special Issue New Solutions for Multimedia and Artificial Intelligence Security)
Show Figures

Figure 1

22 pages, 24537 KB  
Article
Recovery-Enhanced Image Steganography Framework with Auxiliary Model Based on Invertible Neural Networks
by Lin Huo, Kai Wang and Jie Wei
Symmetry 2025, 17(3), 456; https://doi.org/10.3390/sym17030456 - 18 Mar 2025
Viewed by 1116
Abstract
With the advancement of technology, the information hiding capacity has significantly increased, allowing a cover image to conceal one or more secret images. However, this high hiding capacity often leads to contour shadows and color distortions, making the high-quality recovery of secret images [...] Read more.
With the advancement of technology, the information hiding capacity has significantly increased, allowing a cover image to conceal one or more secret images. However, this high hiding capacity often leads to contour shadows and color distortions, making the high-quality recovery of secret images extremely challenging. Existing image hiding algorithms based on Invertible Neural Networks (INNs) often discard useful information during the hiding process, resulting in poor quality of the recovered secret images, especially in multi-image hiding scenarios. The theoretical symmetry of INNs ensures the lossless reversibility of the embedder and decoder, but the lost information generated in practical image steganography disrupts this symmetry. To address this issue, we propose an INN-based image steganography framework that overcomes the limitations of current INN methods in image steganography applications. Our framework can embed multiple full-size secret images into cover images of the same size and utilize the correlation between the lost information and the secret and cover images to generate the lost information by combining the auxiliary model of the Dense–Channel–Spatial Attention Module to restore the symmetry of reversible neural networks, thereby improving the quality of the recovered images. In addition, we employ a multi-stage progressive training strategy to improve the recovery of lost information, thereby achieving high-quality secret image recovery. To further enhance the security of the hiding process, we introduced a multi-scale wavelet loss function into the loss function. Our method significantly improves the quality of image recovery in single-image steganography tasks across multiple datasets (DIV2K, COCO, ImageNet), with a PSNR reaching up to 50.37 dB (an improvement of over 3 dB compared to other methods). The results show that our method outperforms other state-of-the-art (SOTA) image hiding techniques on different datasets and achieves strong performance in multi-image hiding as well. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

28 pages, 2038 KB  
Article
Exploiting Spatiotemporal Redundancy Using Octree Decomposition to Enhance the Performance of Video Steganography
by Mohammed Baziyad, Tamer Rabie and Ibrahim Kamel
Appl. Syst. Innov. 2025, 8(1), 2; https://doi.org/10.3390/asi8010002 - 26 Dec 2024
Viewed by 1186
Abstract
Leveraging data redundancy has long been recognized as an effective approach for concealing large amounts of secret data. In digital images, the 2D-pixel matrix inherently provides opportunities for redundancy, as each pixel is connected to its eight neighbors. Video segments, with their 3D [...] Read more.
Leveraging data redundancy has long been recognized as an effective approach for concealing large amounts of secret data. In digital images, the 2D-pixel matrix inherently provides opportunities for redundancy, as each pixel is connected to its eight neighbors. Video segments, with their 3D structures, introduce an additional layer of redundancy known as temporal redundancy. Recent video steganography techniques have proposed utilizing this temporal redundancy for data concealment. This paper seeks to fully exploit the redundancy present in video segments by integrating both spatial and temporal redundancy through an Octree segmentation method. The video is divided into homogeneous, variable-sized 3D cubes to enhance redundancy in each region, thereby improving energy compaction in the 3D discrete cosine transform (3D-DCT) domain. Consequently, the hiding capacity is optimized because most of the signal’s energy is concentrated in a few significant 3D-DCT coefficients, leaving a substantial portion of insignificant coefficients. These insignificant coefficients can be replaced with secret data without significantly affecting the quality of the carrier signal. Full article
Show Figures

Figure 1

20 pages, 17178 KB  
Article
Stego-STFAN: A Novel Neural Network for Video Steganography
by Guilherme Fay Vergara, Pedro Giacomelli, André Luiz Marques Serrano, Fábio Lúcio Lopes de Mendonça, Gabriel Arquelau Pimenta Rodrigues, Guilherme Dantas Bispo, Vinícius Pereira Gonçalves, Robson de Oliveira Albuquerque and Rafael Timóteo de Sousa Júnior
Computers 2024, 13(7), 180; https://doi.org/10.3390/computers13070180 - 19 Jul 2024
Cited by 2 | Viewed by 3125
Abstract
This article presents an innovative approach to video steganography called Stego-STFAN, as by using a cheap model process to use the temporal and spatial domains together, they end up presenting fine adjustments in each frame, the Stego-STFAN had a [...] Read more.
This article presents an innovative approach to video steganography called Stego-STFAN, as by using a cheap model process to use the temporal and spatial domains together, they end up presenting fine adjustments in each frame, the Stego-STFAN had a PSNRc metric of 27.03 and PSNRS of 23.09, which is close to the state-of-art. Steganography is the ability to hide a message so that third parties cannot perceive communication between them. Thus, one of the precautions in steganography is the size of the message you want to hide, as the security of the message is inversely proportional to its size. Inspired by this principle, video steganography appears to expand channels further and incorporate data into a message. To improve the construction of better stego-frames and recovered secrets, we propose a new architecture for video steganography derived from the Spatial-Temporal Adaptive Filter Network (STFAN) in conjunction with the Attention mechanism, which together generates filters and maps dynamic frames to increase the efficiency and effectiveness of frame processing, exploiting the redundancy present in the temporal dimension of the video, as well as fine details such as edges, fast-moving pixels and the context of secret and cover frames and by using the DWT method as another feature extraction level, having the same characteristics as when applied to an image file. Full article
(This article belongs to the Special Issue Machine Learning Applications in Pattern Recognition)
Show Figures

Figure 1

14 pages, 398 KB  
Article
Domain Transformation of Distortion Costs for Efficient JPEG Steganography with Symmetric Embedding
by Yuanfeng Pan and Jiangqun Ni
Symmetry 2024, 16(5), 575; https://doi.org/10.3390/sym16050575 - 7 May 2024
Cited by 1 | Viewed by 1298
Abstract
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we [...] Read more.
Nowadays, most image steganographic schemes embed secret messages by minimizing a well-designed distortion cost function for the corresponding domain, i.e., the spatial domain for spatial image steganography or the JPEG (Joint Photographic Experts Group) domain for JPEG image steganography. In this paper, we break the boundary between these two types of schemes by establishing a theoretical link between the distortion costs in the spatial domain and those in the JPEG domain and thus propose a scheme for domain transformations of distortion costs for efficient JPEG steganography with symmetric embedding, which can directly convert the spatial distortion cost into its JPEG counterpart. Specifically, by formulating the distortion cost function for JPEG images in the decompressed spatial domain, a closed-form expression for a distortion cost cross-domain transformation is derived theoretically, which precisely characterizes the conversion from the distortion costs obtained by existing spatial steganographic schemes to those applied in JPEG steganography. Experimental results demonstrate that the proposed method outperforms other advanced JPEG steganographic schemes, e.g., JUNIWARD (JPEG steganography with Universal Wavelet Relative Distortion), JMiPOD (JPEG steganography by Minimizing the Power of the Optimal Detector), and DCDT (Distortion Cost Domain Transformation), in resisting the detection of various advanced steganalyzers. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

30 pages, 17042 KB  
Article
Hiding Information in Digital Images Using Ant Algorithms
by Mariusz Boryczka and Grzegorz Kazana
Entropy 2023, 25(7), 963; https://doi.org/10.3390/e25070963 - 21 Jun 2023
Cited by 3 | Viewed by 2580
Abstract
Stenographic methods are closely related to the security and confidentiality of communications, which have always been essential domains of human life. Steganography itself is a science dedicated to the process of hiding information in public communication channels. Its main idea is to use [...] Read more.
Stenographic methods are closely related to the security and confidentiality of communications, which have always been essential domains of human life. Steganography itself is a science dedicated to the process of hiding information in public communication channels. Its main idea is to use digital files or even communication protocols as a medium inside which data are hidden. The present research aims to investigate the applicability of ant algorithms in steganography and evaluate the effectiveness of this approach. Ant systems could be employed both in spatial and frequency-based image steganography. The combination of frequency domain and optimization method to increase robustness is used, and an integer wavelet transform is performed on the host image. ACO optimization is used to find the optimal coefficients describing where to hide the data. The other method utilizes ACO to determine the optimal pixel locations for embedding secret data in the cover image. ACO is also used to detect complex regions of the cover image. Afterward, the least-significant-bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. Our study focuses on optimizing two mutually exclusive features of steganograms—high capacity and low distortion. An attempt was made to use ant systems to select areas of digital images that allow the greatest amount of information to be hidden with the least loss of image quality. The effect of variants of the ant system and its parameters on the quality of the results obtained was also investigated, and the final effectiveness of the proposed method was evaluated. The results of the experiments were compared with those published in related articles. The proposed procedures proved to be effective and allowed the embedding of large amounts of data with relatively little impact on image quality. Full article
Show Figures

Figure 1

18 pages, 5198 KB  
Article
A Novel Steganography Method for Infrared Image Based on Smooth Wavelet Transform and Convolutional Neural Network
by Yu Bai, Li Li, Jianfeng Lu, Shanqing Zhang and Ning Chu
Sensors 2023, 23(12), 5360; https://doi.org/10.3390/s23125360 - 6 Jun 2023
Cited by 4 | Viewed by 2418
Abstract
Infrared images have been widely used in many research areas, such as target detection and scene monitoring. Therefore, the copyright protection of infrared images is very important. In order to accomplish the goal of image-copyright protection, a large number of image-steganography algorithms have [...] Read more.
Infrared images have been widely used in many research areas, such as target detection and scene monitoring. Therefore, the copyright protection of infrared images is very important. In order to accomplish the goal of image-copyright protection, a large number of image-steganography algorithms have been studied in the last two decades. Most of the existing image-steganography algorithms hide information based on the prediction error of pixels. Consequently, reducing the prediction error of pixels is very important for steganography algorithms. In this paper, we propose a novel framework SSCNNP: a Convolutional Neural-Network Predictor (CNNP) based on Smooth-Wavelet Transform (SWT) and Squeeze-Excitation (SE) attention for infrared image prediction, which combines Convolutional Neural Network (CNN) with SWT. Firstly, the Super-Resolution Convolutional Neural Network (SRCNN) and SWT are used for preprocessing half of the input infrared image. Then, CNNP is applied to predict the other half of the infrared image. To improve the prediction accuracy of CNNP, an attention mechanism is added to the proposed model. The experimental results demonstrate that the proposed algorithm reduces the prediction error of the pixels due to full utilization of the features around the pixel in both the spatial and the frequency domain. Moreover, the proposed model does not require either expensive equipment or a large amount of storage space during the training process. Experimental results show that the proposed algorithm had good performances in terms of imperceptibility and watermarking capacity compared with advanced steganography algorithms. The proposed algorithm improved the PSNR by 0.17 on average with the same watermark capacity. Full article
(This article belongs to the Special Issue Computer Vision and Smart Sensors for Human-Computer Interaction)
Show Figures

Figure 1

25 pages, 7399 KB  
Article
Steganographic Method in Selected Areas of the Stego-Carrier in the Spatial Domain
by Predrag Milosav, Milan Milosavljević and Zoran Banjac
Symmetry 2023, 15(5), 1015; https://doi.org/10.3390/sym15051015 - 2 May 2023
Cited by 7 | Viewed by 2427
Abstract
The main goal of this paper is the proposal of a key-based steganographic system in which the ratio of capacity and image quality metrics that represents the stego object while reducing the detectability of hidden content was improved. The main contribution of the [...] Read more.
The main goal of this paper is the proposal of a key-based steganographic system in which the ratio of capacity and image quality metrics that represents the stego object while reducing the detectability of hidden content was improved. The main contribution of the proposed steganographic system is a new algorithm for selecting stego areas. The area selection algorithm is based on clustering the pixels of the cover object into a predetermined number of clusters. The goal of this selection of areas (clusters) is to group as many homogeneous parts of the image as possible in order to cover these areas with as few rectangular shapes as possible. Since the data on the defined rectangles represent the key of the system, the capacity of the additional secret channel is minimized in this way. On the obtained stego-carriers, an embedding of test random content is performed in order to estimate its detectability. By combining the proposed area selection method with the Minimal Decimal Difference steganographic method, a system was created with an optimal trade-off between detectability of secret content, quality and capacity of the carrier, and the length of the stego-key. Finally, a comparison of the obtained results with relevant adaptive steganographic methods is presented. The proposed concept obtains its verification in one practical system for secure file transfer of controlled cryptographic strength. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Cryptography)
Show Figures

Figure 1

13 pages, 563 KB  
Article
Detecting Browser Drive-By Exploits in Images Using Deep Learning
by Patricia Iglesias, Miguel-Angel Sicilia and Elena García-Barriocanal
Electronics 2023, 12(3), 473; https://doi.org/10.3390/electronics12030473 - 17 Jan 2023
Cited by 4 | Viewed by 2648
Abstract
Steganography is the set of techniques aiming to hide information in messages as images. Recently, stenographic techniques have been combined with polyglot attacks to deliver exploits in Web browsers. Machine learning approaches have been proposed in previous works as a solution for detecting [...] Read more.
Steganography is the set of techniques aiming to hide information in messages as images. Recently, stenographic techniques have been combined with polyglot attacks to deliver exploits in Web browsers. Machine learning approaches have been proposed in previous works as a solution for detecting stenography in images, but the specifics of hiding exploit code have not been systematically addressed to date. This paper proposes the use of deep learning methods for such detection, accounting for the specifics of the situation in which the images and the malicious content are delivered using Spatial and Frequency Domain Steganography algorithms. The methods were evaluated by using benchmark image databases with collections of JavaScript exploits, for different density levels and steganographic techniques in images. A convolutional neural network was built to classify the infected images with a validation accuracy around 98.61% and a validation AUC score of 99.75%. Full article
(This article belongs to the Special Issue High Accuracy Detection of Mobile Malware Using Machine Learning)
Show Figures

Figure 1

9 pages, 2690 KB  
Article
A Generative Learning Steganalysis Network against the Problem of Training-Images-Shortage
by Han Zhang, Zhihua Song, Qinghua Xing, Boyu Feng and Xiangyang Lin
Electronics 2022, 11(20), 3331; https://doi.org/10.3390/electronics11203331 - 16 Oct 2022
Cited by 4 | Viewed by 2418
Abstract
In recent years, several steganalysis neural networks have been proposed and achieved satisfactory performances. However, these deep learning methods all encounter the problem of Training-Images-Shortage (TIS). In most cases, it is difficult for steganalyses to obtain enough signals about steganography from a game [...] Read more.
In recent years, several steganalysis neural networks have been proposed and achieved satisfactory performances. However, these deep learning methods all encounter the problem of Training-Images-Shortage (TIS). In most cases, it is difficult for steganalyses to obtain enough signals about steganography from a game opponent. In order to solve the problem of TIS for steganalysis, we propose a novel steganalysis method based on generative learning and deep residual convolutional neural networks. Comparative experiments show that the proposed architecture can achieve promising performance in response to spatial domain steganalysis despite a lack of training images. Full article
(This article belongs to the Special Issue Big Data Analysis Based Network)
Show Figures

Figure 1

16 pages, 4427 KB  
Article
A High-Capacity Steganography Algorithm Based on Adaptive Frequency Channel Attention Networks
by Shanqing Zhang, Hui Li, Li Li, Jianfeng Lu and Ziqian Zuo
Sensors 2022, 22(20), 7844; https://doi.org/10.3390/s22207844 - 15 Oct 2022
Cited by 9 | Viewed by 2897
Abstract
Deep learning has become an essential technique in image steganography. Most of the current deep-learning-based steganographic methods process digital images in the spatial domain. There are problems such as limited embedding capacity and unsatisfactory visual quality. To improve capacity-distortion performance, we develop a [...] Read more.
Deep learning has become an essential technique in image steganography. Most of the current deep-learning-based steganographic methods process digital images in the spatial domain. There are problems such as limited embedding capacity and unsatisfactory visual quality. To improve capacity-distortion performance, we develop a steganographic method from the frequency-domain perspective. We propose a module called the adaptive frequency-domain channel attention network (AFcaNet), which makes full use of the frequency features in each channel by a fine-grained manner of assigning weights. We apply this module to the state-of-the-art SteganoGAN, forming an Adaptive Frequency High-capacity Steganography Generative Adversarial Network (AFHS-GAN). The proposed neural network enhances the ability of high-dimensional feature extraction through overlaying densely connected convolutional blocks. In addition to this, a low-frequency loss function is introduced as an evaluation metric to guide the training of the network and thus reduces the modification of low-frequency regions of the image. Experimental results on the Div2K dataset show that our method has a better generalization capability compared to the SteganoGAN, with substantial improvement in both embedding capacity and stego-image quality. Furthermore, the embedding distribution of our method in the DCT domain is more similar to that of the traditional method, which is consistent with the prior knowledge of image steganography. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

36 pages, 3919 KB  
Article
Comparative Study of Three Steganographic Methods Using a Chaotic System and Their Universal Steganalysis Based on Three Feature Vectors
by Dalia Battikh, Safwan El Assad, Thang Manh Hoang, Bassem Bakhache, Olivier Deforges and Mohamad Khalil
Entropy 2019, 21(8), 748; https://doi.org/10.3390/e21080748 - 30 Jul 2019
Cited by 7 | Viewed by 4286
Abstract
In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two [...] Read more.
In this paper, we firstly study the security enhancement of three steganographic methods by using a proposed chaotic system. The first method, namely the Enhanced Edge Adaptive Image Steganography Based on LSB Matching Revisited (EEALSBMR), is present in the spatial domain. The two other methods, the Enhanced Discrete Cosine Transform (EDCT) and Enhanced Discrete Wavelet transform (EDWT), are present in the frequency domain. The chaotic system is extremely robust and consists of a strong chaotic generator and a 2-D Cat map. Its main role is to secure the content of a message in case a message is detected. Secondly, three blind steganalysis methods, based on multi-resolution wavelet decomposition, are used to detect whether an embedded message is hidden in the tested image (stego image) or not (cover image). The steganalysis approach is based on the hypothesis that message-embedding schemes leave statistical evidence or structure in images that can be exploited for detection. The simulation results show that the Support Vector Machine (SVM) classifier and the Fisher Linear Discriminant (FLD) cannot distinguish between cover and stego images if the message size is smaller than 20% in the EEALSBMR steganographic method and if the message size is smaller than 15% in the EDCT steganographic method. However, SVM and FLD can distinguish between cover and stego images with reasonable accuracy in the EDWT steganographic method, irrespective of the message size. Full article
(This article belongs to the Special Issue Entropy Based Data Hiding)
Show Figures

Figure 1

Back to TopTop