2020
DOI: 10.1109/access.2020.2971528
|View full text |Cite
|
Sign up to set email alerts
|

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

Abstract: Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the steganographic image quality needs to be improved for the Human Visual System(HVS). Therefore, in this work, we propose a new high capacity image steganography method based on deep learning. The Discrete Cosine Transform(DCT) is used to transform the secret image, and the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(41 citation statements)
references
References 40 publications
0
40
0
1
Order By: Relevance
“…In 2020, Xintao Duan et al [1] proposed a novel high capacity image steganography method on the basis of deep learning. The DCT was exploited to convert the concealed image, and subsequently the transformed image was encrypted through ECC to enhance the anti-detection property of the attained image.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2020, Xintao Duan et al [1] proposed a novel high capacity image steganography method on the basis of deep learning. The DCT was exploited to convert the concealed image, and subsequently the transformed image was encrypted through ECC to enhance the anti-detection property of the attained image.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Steganography hides huge numbers of data within a congregation media. For embedment of concealed data, the selected image is called cover or host image, where the ensuing image using embedded concealed data is termed as the stego image [1]. Steganography has three objectives: initially, a huge concealed data is needed; the expression payload indicates concealed data size which might be concealed in a host.…”
Section: Introductionmentioning
confidence: 99%
“…This trait is because of their success in exploiting the human visual system (HVS) [74][75][76][77], contrary to the text where a single bit change results in an erroneous character. Further, their layout provides several redundant and partisan areas such as edges that serve as regions of interest (ROI) [77][78][79] for embedding information, which most of the contributions on the subject [80][81][82] have exploited for increased payload.…”
Section: A Steganalysismentioning
confidence: 99%
“…Once discovered, the attacker can use various approaches and tools such as brute force cracking to destroy the cipher text, which greatly increases the risks with secret communication. In short, encryption technology hides the content of covert communication [7,8], while steganography technology hides the "behavior" of covert communication, so steganography technology is able to provide better concealment and security [9,10]. Table 1 compares the differences between steganography and encryption in five aspects [11].…”
Section: Introductionmentioning
confidence: 99%