2021
DOI: 10.1049/ipr2.12161
|View full text |Cite
|
Sign up to set email alerts
|

CSIS: Compressed sensing‐based enhanced‐embedding capacity image steganography scheme

Abstract: Image steganography plays a vital role in securing secret data by embedding it in the cover images. Usually, these images are communicated in a compressed format. Existing techniques achieve this but have low embedding capacity. Hence, the goal here is to enhance the embedding capacity while preserving the visual quality of the stego-image. It is also intended to ensure that the scheme is resistant to steganalysis attacks. This paper proposes a compressed sensing image steganography (CSIS) scheme to achieve th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 51 publications
(153 reference statements)
0
9
0
Order By: Relevance
“…end for 10: end for 11: return t ′ î from subsection 2.1 that the size of the DCT sparsified vectors is (p 1 + p 2 ) × 1 with p 1 + p 2 = b 2 (here, b 2 = 64). Applying DCT on images results in a sparse vector where more than half of the coefficients have values that are either very small or zero (Agrawal and Ahuja, 2021;Pal et al, 2019). This is the case here as well.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…end for 10: end for 11: return t ′ î from subsection 2.1 that the size of the DCT sparsified vectors is (p 1 + p 2 ) × 1 with p 1 + p 2 = b 2 (here, b 2 = 64). Applying DCT on images results in a sparse vector where more than half of the coefficients have values that are either very small or zero (Agrawal and Ahuja, 2021;Pal et al, 2019). This is the case here as well.…”
Section: Resultsmentioning
confidence: 99%
“…For ADMM, we set the maximum number of iterations as 500, the absolute stopping tolerance as 1 × 10 −4 , and the relative stopping tolerance as 1 × 10 −2 . These values are again taken based upon our experience with a similar algorithm (Agrawal and Ahuja, 2021). Eventually, our ADMM almost always converges in 10 to 15 iterations.…”
Section: Resultsmentioning
confidence: 99%
“…In order to improve the persuasiveness of the proposed method, we compare HCISNet with the state-of-the-are methods and similar works, such as HiDDeN [20], SteganoGAN [23], CSIS [44], SteGAN [45] and HidingGAN [51]. We reproduce the HiDDeN and SteganoGAN, where the training batch sizes are set to six.…”
Section: Settingsmentioning
confidence: 99%
“…Besides, the other parameters are same as papers. However, since there are uncertain parameters in CSIS, SteGAN and HidingGAN, we refer to the results of papers [44,45,51].…”
Section: Settingsmentioning
confidence: 99%
See 1 more Smart Citation