2020
DOI: 10.1007/s11042-020-09929-9
|View full text |Cite
|
Sign up to set email alerts
|

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
22
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 58 publications
(22 citation statements)
references
References 173 publications
0
22
0
Order By: Relevance
“…Some authors focused on passive techniques to detect forgery [101], or carving on specific file formats such as JPEG [102]. Other image forensics surveys analysed topics such as hyperspectral image [88], [103], image authentication [104], the affectation of noise in images [105] and image steganalysis [106]- [110]. Another set of surveys focus on the specific context of child abuse material and its detection through image and video analysis [111]- [114].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…Some authors focused on passive techniques to detect forgery [101], or carving on specific file formats such as JPEG [102]. Other image forensics surveys analysed topics such as hyperspectral image [88], [103], image authentication [104], the affectation of noise in images [105] and image steganalysis [106]- [110]. Another set of surveys focus on the specific context of child abuse material and its detection through image and video analysis [111]- [114].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…To the best of our knowledge, the research on image steganography mostly focuses on preserving secret information through the content of the image or adding redundancy information, while the research on information hiding from the image file storage structure has rarely been proposed [15][16][17][18]. Based on the storage structure of the image file, this paper reports a novel proposal of image steganography and the feasibility of this proposal is verified by experiments.…”
Section: Introductionmentioning
confidence: 99%
“…PSIRS can remove up to 80% of the stego without affecting the visual appearance and video quality. The authors of [108] analyzed cutting-edge techniques for steganography and steganalysis. The authors have identified various areas/applications that can use steganography in real life.…”
mentioning
confidence: 99%
“…In addition, there are reversibility, encryption, computational complexity and other requirements for better technology. Multimedia, archives, networks, Skype, medical videos, and DNA are some of the latest steganography patterns [108]. The author of [113] demonstrates the classification of steganography based on technical and non-technical steganography.…”
mentioning
confidence: 99%