2020
DOI: 10.3837/tiis.2020.03.017
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis

Abstract: Steganalysis & steganography have witnessed immense progress over the past few years by the advancement of deep convolutional neural networks (DCNN). In this paper, we analyzed current research states from the latest image steganography and steganalysis frameworks based on deep learning. Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques. The result of this s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(3 citation statements)
references
References 62 publications
0
3
0
Order By: Relevance
“…Since this is a relatively new area of research, current surveys on data hiding primarily concentrate on traditional algorithms. There are existing works examining deep learning-based techniques for steganography and cryptography [38,45], but there is a lack of works examining deep watermarking techniques. There is an existing survey looking at deep learning-based watermarking and steganography [89]; however, a comprehensive survey regarding deep data hiding models unifying digital watermarking and steganography is still lacking.…”
Section: Introductionmentioning
confidence: 99%
“…Since this is a relatively new area of research, current surveys on data hiding primarily concentrate on traditional algorithms. There are existing works examining deep learning-based techniques for steganography and cryptography [38,45], but there is a lack of works examining deep watermarking techniques. There is an existing survey looking at deep learning-based watermarking and steganography [89]; however, a comprehensive survey regarding deep data hiding models unifying digital watermarking and steganography is still lacking.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, given this prevalent electronic warfare on open networks, securing and protecting the information exchanged has become a crucial priority. Organizations and individuals are therefore resorting to relying on techniques such as encryption and information concealment algorithms to overcome security problems [1].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years there have been several fields of use of CNNs that, nowadays, allow the development of important applications. Some examples are: the antispoofing of the face and iris [11], recognition of highway traffic congestion [12], the image steganography and steganalysis [13], the galaxy morphology classification [14], drone detection, and classification [15,16]. However, the analysis of IIF images, as a whole, and in particular, in regards to the analysis of intensity, is extremely complex and linked to the experience of the immunologist [4].…”
Section: Introductionmentioning
confidence: 99%