2022
DOI: 10.3390/app122110793
|View full text |Cite
|
Sign up to set email alerts
|

Steganalysis of Context-Aware Image Steganography Techniques Using Convolutional Neural Network

Abstract: Image steganography is applied to hide some secret information. Occasionally, steganography is used for malicious purposes to hide inappropriate information. In this paper, a new deep neural network was proposed to detect context-aware steganography techniques. In the proposed scheme, a high-boost filter was applied to alleviate the high-frequency while retaining the low-frequency details. The high-boost image was processed by thirty SRM high-pass filters to obtain thirty high-boost SRM filtered images. In the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Compared to state-of-the-art methods, the proposed method performed better in terms of detection accuracy and computational cost in the experiments. The HILL, S-UNIWARD, and WOW context-aware steganography algorithms were tested on the BOWS2 and BOSS base datasets, validating the suggested scheme [15].…”
Section: Literature Reviewmentioning
confidence: 85%
See 1 more Smart Citation
“…Compared to state-of-the-art methods, the proposed method performed better in terms of detection accuracy and computational cost in the experiments. The HILL, S-UNIWARD, and WOW context-aware steganography algorithms were tested on the BOWS2 and BOSS base datasets, validating the suggested scheme [15].…”
Section: Literature Reviewmentioning
confidence: 85%
“…In [15], the authors presented a novel deep neural network for identifying contextual steganography methods. The suggested method employed a high-boost filter to reduce high-frequency noise while keeping low-frequency information intact.…”
Section: Literature Reviewmentioning
confidence: 99%
“…An image BOWS2 dataset [6] is considered in the first row of Figure 1 to study the behavior of the schemes. Residual arrays are created by taking the difference between cover and stego-images [7]. It is apparent from the residual arrays that the number of modified elements is also amplified as the payload increases.…”
Section: Introductionmentioning
confidence: 99%