The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
2021
DOI: 10.1109/tdsc.2020.3004708
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
65
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 158 publications
(65 citation statements)
references
References 47 publications
0
65
0
Order By: Relevance
“…This explains the emergence of embedding strategies of payload distribution in multiple images by fusing multiple features to describe image complexity [14]. Other recent strategies are based on the image texture complexity and the distortion distribution as indicator for secure capacity of each cover image [34]. These strategies are applied on single image steganographic algorithms and experiments shown better resistance to modern universal pooled steganalysis compared to existing methods.…”
Section: Distributed Steganographymentioning
confidence: 99%
“…This explains the emergence of embedding strategies of payload distribution in multiple images by fusing multiple features to describe image complexity [14]. Other recent strategies are based on the image texture complexity and the distortion distribution as indicator for secure capacity of each cover image [34]. These strategies are applied on single image steganographic algorithms and experiments shown better resistance to modern universal pooled steganalysis compared to existing methods.…”
Section: Distributed Steganographymentioning
confidence: 99%
“…Traditional image steganography algorithms require manual design of the steganography strategy and require sufficient expertise of the designer. As the image is modified, it will inevitably leave modification traces on the image and cause some statistical features of the image to change [4][5][6], increasing the possibility of secret communication exposure. With the development of deep learning techniques, people started to use deep neural networks to minimize the loss between cover image and stego image and use a large amount of data to automate the process of finding a suitable steganography strategy.…”
Section: Introductionmentioning
confidence: 99%
“…For a color image, it has three elements of R, G, and B, so it contains more information than grayscale images, its original features, large amount of data, high redundancy, high correlation between pixels. In order to protect image information, major contributions have been made in the fields of steganography 1 , 2 , and encryption 3 5 . In recent years, chaos has some ideal cryptographic characteristics such as initial value sensitivity and pseudo-randomness, which makes the chaotic encryption scheme widely used 6 – 17 .…”
Section: Introductionmentioning
confidence: 99%