Volume 18 , Issue 2 , PP: 21-232, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Ayyah Abdulhafidh Mahmoud Fadhl 1 , Bander Ali Saleh Al-rimy 2 , Sultan Ahmed Almalki 3 * , Tami Abdulrahman Alghamdi 4 , Azan Hamad Alkhorem 5 , Frederick T. Sheldon 6
Doi: https://doi.org/10.54216/FPA.180216
Steganography conceals ”secrets” within an convenient and expedient multimedia carrier. The carrier could be text (i.e., not plain text), images, audio and/or video files (i.e., carrier channels). The fact that concealed information is contained in the otherwise ordinary and mundane carrier file is known only by the sender-receiver pair. Only they share the existence of the secret. Images are the most popular (i.e., multimedia) carriers because of their inherent property that enables better obfuscation. Content adaptive image steganography is a new trend in the field for messaging secrets inside unsuspected image file transfers. As the name suggests, the embedding locations are altered adaptively depending on the image content that optimizes the decision of choosing a location inside the carrier so that an embedding is not discernible (i.e., additive distortion is minimized). Herein, we critique the various approaches used for content-adaptive image steganography which can be broadly categorized as CNNbased, GAN-based, along with minimizing additive distortion function-based. We provide a brief historical account toward better anticipating the future research opportunities in terms of properties, and evaluation metrics. A summary table of these past and future directions is provided. Moreover, we highlight trends along with their concomitant advantages and disadvantages toward identifying opportunity gaps.
Content Adaptive Image Steganography , Deep learning-based steganography , Steganalysis , Additive distortion
[1] Beijing Chen, Jiaxin Wang, Yingyue Chen, Zilong Jin, Hiuk Jae Shim, and Yun-Qing Shi. High-capacity robust image steganography via adversarial network. KSII Transactions on Internet and Information Systems (TIIS), 14(1):366–381, 2020.
[2] Jifeng Dai, Yi Li, Kaiming He, and Jian Sun. R-fcn: Object detection via region-based fully convolutional networks. Advances in neural information processing systems, 29, 2016.
[3] Tomas Denemark, Vahid Sedighi, Vojtech Holub, R´emi Cogranne, and Jessica Fridrich. Selection-channelaware rich model for steganalysis of digital images. In 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pages 48–53. IEEE, 2014.
[4] Xintao Duan, Kai Jia, Baoxia Li, Daidou Guo, En Zhang, and Chuan Qin. Reversible image steganography scheme based on a u-net structure. IEEE Access, 7:9314–9323, 2019.
[5] Xintao Duan, Nao Liu, Mengxiao Gou, Wenxin Wang, and Chuan Qin. Steganocnn: image steganography with generalization ability based on convolutional neural network. Entropy, 22(10):1140, 2020.
[6] Xintao Duan, Liu Nao, Gou Mengxiao, Dongli Yue, Zimei Xie, Yuanyuan Ma, and Chuan Qin. Highcapacity image steganography based on improved fc-densenet. IEEE Access, 8:170174–170182, 2020.
[7] Xintao Duan, Haoxian Song, Chuan Qin, and Muhammad Khurram Khan. Coverless steganography for digital images based on a generative model. Computers, Materials & Continua, 55(3):483–493, 2018.
[8] Tom´aˇs Filler, Jan Judas, and Jessica Fridrich. Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Transactions on Information Forensics and Security, 6(3):920–935, 2011.
[9] Jessica Fridrich and Jan Kodovsky. Rich models for steganalysis of digital images. IEEE Transactions on information Forensics and Security, 7(3):868–882, 2012.
[10] Despoina Giarimpampa. Blind image steganalytic optimization by using machine learning, 2018.
[11] Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. Advances in neural information processing systems, 27, 2014.
[12] Jamie Hayes and George Danezis. Generating steganographic images via adversarial training. Advances in neural information processing systems, 30, 2017.
[13] Vojtˇech Holub and Jessica Fridrich. Designing steganographic distortion using directional filters. In 2012 IEEE International workshop on information forensics and security (WIFS), pages 234–239. IEEE, 2012.
[14] Vojtˇech Holub, Jessica Fridrich, and Tom´aˇs Denemark. Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security, 2014(1):1–13, 2014.
[15] Israr Hussain, Jishen Zeng, Xinhong Qin, and Shunquan Tan. A survey on deep convolutional neural networks for image steganography and steganalysis. KSII Transactions on Internet and Information Systems (TIIS), 14(3):1228–1248, 2020.
[16] Daniel Jiwoong Im, Chris Dongjoo Kim, Hui Jiang, and Roland Memisevic. Generating images with recurrent adversarial networks. arXiv preprint arXiv:1602.05110, 2016.
[17] Simon J´egou, Michal Drozdzal, David Vazquez, Adriana Romero, and Yoshua Bengio. The one hundred layers tiramisu: Fully convolutional densenets for semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 11–19, 2017.
[18] Neil F Johnson and Sushil Jajodia. Exploring steganography: Seeing the unseen. Computer, 31(2):26–34, 1998.
[19] Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial, and Brendan Halloran. Comprehensive survey of image steganography: Techniques, evaluations, and trends in future research. Neurocomputing, 335:299– 326, 2019.
[20] Yann LeCun, Bernhard Boser, John S Denker, Donnie Henderson, Richard E Howard, Wayne Hubbard, and Lawrence D Jackel. Backpropagation applied to handwritten zip code recognition. Neural computation, 1(4):541–551, 1989.
[21] Bin Li, Ming Wang, Jiwu Huang, and Xiaolong Li. A new cost function for spatial image steganography. In
2014 IEEE International Conference on Image Processing (ICIP), pages 4206–4210. IEEE, 2014.
[22] Wen-Nung Lie, TC-I Lin, and Chia-Wen Lin. Enhancing video error resilience by using data-embedding techniques. IEEE Transactions on Circuits and Systems for Video Technology, 16(2):300–308, 2006.
[23] Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. Ssd: Single shot multibox detector. In European conference on computer vision, pages 21–37. Springer, 2016.
[24] Ruohan Meng, Steven G Rice, Jin Wang, and Xingming Sun. A fusion steganographic algorithm based on faster r-cnn. Computers, Materials & Continua, 55(1):1–16, 2018.
[25] Tom´aˇs Pevn`y, Tom´aˇs Filler, and Patrick Bas. Using high-dimensional image models to perform highly undetectable steganography. In International workshop on information hiding, pages 161–177. Springer, 2010.
[26] Alec Radford, Luke Metz, and Soumith Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015.
[27] Rafia Rahim, Shahroz Nadeem, et al. End-to-end trained cnn encoder-decoder networks for image steganography. In Proceedings of the European Conference on Computer Vision (ECCV) Workshops, pages 0–0, 2018.
[28] Tabares-Soto Reinel, Arteaga-Arteaga Harold Brayan, Bravo-Ortiz Mario Alejandro, Mora-Rubio Alejandro, Arias-Garzon Daniel, Alzate-Grisales Jes´us Alejandro, Burbano-Jacome Alejandro Buenaventura, Orozco- Arias Simon, Isaza Gustavo, and Ramos-Pollan Raul. Gbras-net: a convolutional neural network architecture for spatial image steganalysis. IEEE Access, 9:14340–14350, 2021.
[29] Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. Faster r-cnn: Towards real-time object detection with region proposal networks. Advances in neural information processing systems, 28, 2015.
[30] David L Robie and Russell M Mersereau. Video error correction using steganography. EURASIP Journal on Advances in Signal Processing, 2002(2):1–10, 2002.
[31] Vahid Sedighi, R´emi Cogranne, and Jessica Fridrich. Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security, 11(2):221–234, 2015.
[32] De Rosal Igantius Moses Setiadi. Psnr vs ssim: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 80(6):8423–8444, 2021.
[33] Haichao Shi, Xiao-Yu Zhang, Shupeng Wang, Ge Fu, and Jianqi Tang. Synchronized detection and recovery of steganographic messages with adversarial learning. In International Conference on Computational Science, pages 31–43. Springer, 2019.
[34] Alan Siper, Roger Farley, and Craig Lombardo. The rise of steganography. Proceedings of student/faculty research day, CSIS, Pace University, 2005.
[35] Nandhini Subramanian, Omar Elharrouss, Somaya Al-Maadeed, and Ahmed Bouridane. Image steganography: A review of the recent advances. IEEE access, 9:23409–23423, 2021.
[36] Shunquan Tan and Bin Li. Stacked convolutional auto-encoders for steganalysis of digital images. In Signal and information processing association annual summit and conference (APSIPA), 2014 Asia-Pacific, pages 1–4. IEEE, 2014.
[37] Weixuan Tang, Shunquan Tan, Bin Li, and Jiwu Huang. Automatic steganographic distortion learning using a generative adversarial network. IEEE Signal Processing Letters, 24(10):1547–1551, 2017.
[38] Denis Volkhonskiy, Boris Borisenko, and Evgeny Burnaev. Generative adversarial networks for image steganography. 2016.
[39] Zhou Wang, Alan C Bovik, Hamid R Sheikh, and Eero P Simoncelli. Image quality assessment: from error visibility to structural similarity. IEEE transactions on image processing, 13(4):600–612, 2004.
[40] Guanshuo Xu, Han-Zhou Wu, and Yun-Qing Shi. Structural design of convolutional neural networks for steganalysis. IEEE Signal Processing Letters, 23(5):708–712, 2016.
[41] Jianhua Yang, Kai Liu, Xiangui Kang, Edward K Wong, and Yun-Qing Shi. Spatial image steganography based on generative adversarial network. arXiv preprint arXiv:1804.07939, 2018.
[42] Kevin Alex Zhang, Alfredo Cuesta-Infante, Lei Xu, and Kalyan Veeramachaneni. Steganogan: High capacity image steganography with gans. arXiv preprint arXiv:1901.03892, 2019.
[43] Ru Zhang, Shiqi Dong, and Jianyi Liu. Invisible steganography via generative adversarial networks. Multimedia tools and applications, 78(7):8559–8575, 2019.
[44] Wei Zhang, Sen-Ching S Cheung, and Minghua Chen. Hiding privacy information in video surveillance system. In IEEE International Conference on Image Processing 2005, volume 3, pages II–868. IEEE, 2005.
[45] Jiren Zhu, Russell Kaplan, Justin Johnson, and Li Fei-Fei. Hidden: Hiding data with deep networks. In Proceedings of the European conference on computer vision (ECCV), pages 657–672, 2018.