期刊文献+

A Survey on Digital Image Steganography

下载PDF
导出
摘要 Internet brings us not only the convenience of communication but also some security risks,such as intercepting information and stealing information.Therefore,some important information needs to be hidden during communication.Steganography is the most common information hiding technology.This paper provides a literature review on digital image steganography.The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms.Moreover,their advantages and weaknesses are pointed out.Finally,further research directions are discussed.
出处 《Journal of Information Hiding and Privacy Protection》 2019年第2期87-93,共7页 信息隐藏与隐私保护杂志(英文)
基金 This work was supported by the Natural Science Foundation of the Jiangsu Higher Education Institutions of China under Grant 17KJB520021,the PAPD fund,sponsored by Qing Lan Project.
  • 相关文献

参考文献2

二级参考文献16

  • 1Nell F J. Steganography Tools [ EB/OL ]. http://www. jjtc. com/ Security/ stegtools. htm, 2005-08-16/2008-01-08.
  • 2Shih F Y, Wu S Y T. Combinational image watermarking in the spatial and frequency domains [ J]. Pattern Recognition, 2003, 36(4) : 969-975.
  • 3Munuera C. Steganography and error-correcting codes [J]. Signal Processing, 2007, 87(6):1528-1533.
  • 4Jain A K. Fundamentals of Digital Image Processing [ M ]. Upper Saddle River, N J, USA : Prentice Hall, 1989.
  • 5Smoot S R. Rowe L A. Study of DCT coefficient distributions [ A ]. In :Proceedings of the SPIE Symposium on Electronic Imaging [ C ], San Jose, CA,USA,1996: 403-411.
  • 6Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia [ J ]. IEEE Transactions on Image Processing, 1997, 6 ( 12 ) : 1673-1687.
  • 7Koch E ,Zhao J. Toward robust hidden image copyright labeling [A ]. In:Proceedings of IEEE Workshop on Nonlinear Signal and Image Processing[C ], Neos Marmaras, Greece, 1995:452-455.
  • 8Pennebaker W B,Mitchell J L.JPEG:Still Image Data Compression Standard[M].New York:Van Nostrand Reinhold,1993.
  • 9Moulin P,Koetter R.Data-hiding codes[J].Proceedings of the IEEE,2005,93(12):2083 -2125.
  • 10Chang C C,Chen T S,Chung L Z.A steganographic method based upon JPEG and quantization table modification[J].Information Science,2002,141(1):123 - 138.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部