2019
DOI: 10.1016/j.neucom.2018.06.075
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
147
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 299 publications
(148 citation statements)
references
References 131 publications
0
147
0
1
Order By: Relevance
“…Steganography has been the focus of much research interest over the past few decades, as well as increasing applicability into the real world [6]. A multitude of papers (e.g., [3], [4], [12], [14]- [22]), have reviewed the various techniques proposed in the literature for different types of steganography such as text, image, audio, video, or network steganography. Analysing those papers, one can note that past research works have mainly focused on specialised steganography and steganalysis techniques, with few generic models having been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Steganography has been the focus of much research interest over the past few decades, as well as increasing applicability into the real world [6]. A multitude of papers (e.g., [3], [4], [12], [14]- [22]), have reviewed the various techniques proposed in the literature for different types of steganography such as text, image, audio, video, or network steganography. Analysing those papers, one can note that past research works have mainly focused on specialised steganography and steganalysis techniques, with few generic models having been proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Steganography is the art of hiding information in such a way that, keeps the existence of the message secret [1,2]. The wavelet domain is growing up very quickly.…”
Section: Introductionmentioning
confidence: 99%
“…The use of such transform mainly increases the capacity and robustness of the Information Hiding system. Here the steganography is implemented in the Wavelet domain [1][2][3][4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In general, the quality of the stego image is inversely proportional to the amount of data hidden in the cover [1]. The characteristics of a suitable steganography method are represented by its capability to balance between the amount of data that can be hidden and the quality of stego images [2]. During the data extraction process, not all cover images must be returned to their original state.…”
Section: Introductionmentioning
confidence: 99%