2018
DOI: 10.2139/ssrn.3171494
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Digital Image Steganography: Current Trends and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…This measurement is developed to enhance the traditional measurements such as MSE and PSNR that have proven inconsistent for human eye perception 1 . Therefore, SSIM is more adaptable with nature of HVS 8 . The maximum value of SSIM is equal to 1 and it represents the identical between the cover image and the stego image.…”
Section: Figure 4 the Block Diagram For Extraction Process Experimental Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This measurement is developed to enhance the traditional measurements such as MSE and PSNR that have proven inconsistent for human eye perception 1 . Therefore, SSIM is more adaptable with nature of HVS 8 . The maximum value of SSIM is equal to 1 and it represents the identical between the cover image and the stego image.…”
Section: Figure 4 the Block Diagram For Extraction Process Experimental Resultsmentioning
confidence: 99%
“…Where BC is the coefficient of blue layer (original cover), BC' is the coefficient of blue layer (stego) and S1 is the bit of secret share one, 1≤ i ≤ 128, and 1≤ j ≤ 256. The secret share one can be extracted (8) times from the stego image of size (512x512). The extracted secret share one is XORed with a secret share two to obtain the original secret logo.…”
Section: Open Accessmentioning
confidence: 99%
See 1 more Smart Citation
“…8 . In the following sections, this later classification will be discussed more in-depth with some recent research [ 96 ].
Fig.
…”
Section: Steganographymentioning
confidence: 99%
“…These techniques are commonly referred as steganalyses. For an in-depth discussion of modern steganalysis and steganography techniques we refer the reader to [8,15,21], where several approaches and trade-offs are discussed. In this paper, we do not impose any constraint on the steganography technique or on the stego medium, leaving wide room for an attacker to choose among the latest techniques that do not raise alerts in the state-of-the-art steganalysis systems.…”
Section: Related Workmentioning
confidence: 99%