2022
DOI: 10.1016/j.sigpro.2022.108711
|View full text |Cite
|
Sign up to set email alerts
|

The infinite race between steganography and steganalysis in images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 79 publications
0
2
0
Order By: Relevance
“…Leading AI systems and anti-virus tools currently struggle to identify steganography-based malware. While a significant volume of prior research has honed in on image steganalysis [46], there is an emerging necessity to pivot attention toward AI models. Given the soaring popularity of AI models and Large Language Models (LLM), there is potential for malevolent actors to disseminate deceptive models crafted for malware distribution.…”
Section: Discussionmentioning
confidence: 99%
“…Leading AI systems and anti-virus tools currently struggle to identify steganography-based malware. While a significant volume of prior research has honed in on image steganalysis [46], there is an emerging necessity to pivot attention toward AI models. Given the soaring popularity of AI models and Large Language Models (LLM), there is potential for malevolent actors to disseminate deceptive models crafted for malware distribution.…”
Section: Discussionmentioning
confidence: 99%
“…The paper work concentrates on the process of steganalysis, application and limitations of Steganography (AlSabhany et al, 2020;Dhawan & Gupta, 2021;Muralidharan et al, 2022). It presents a deliberation on diverse steganography image file formats like JPEG, BMP, PNG and TIFF along with color models for image formats like CMYK model, RGB model, HSL, HSV, NCS, DCT, DWT, LSB, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Image steganography is the science and art of covert communication, which embeds secret messages into cover images to generate the corresponding stego images that can be transmitted through open channels without drawing suspicion [1][2][3][4][5][6]. By using the advantages of steganography, people can achieve secure communication without being detected by network monitors, and it is worth noting that the steganography is not the same as but is supplementary to cryptography, because the former emphasizes the undetectability of communication while the latter emphasizes the secrecy of data.…”
Section: Introductionmentioning
confidence: 99%