ADAPTIVE HYBRID STEGANOGRAPHY: A MULTI-DOMAIN APPROACH FOR ENHANCED SECURITY AND IMPERCEPTIBILITY IN DIGITAL COMMUNICATION
Keywords:
Steganography, Steganalysis, Digital Media, Information Hiding, SecurityAbstract
Steganography, the art and science of hiding information within other non-secret text or data, has evolved significantly with advancements in digital technology. This technique leverages various media formats such as images, audio, video, and text to conceal data, making it an essential tool for secure communication in an increasingly interconnected world. This comprehensive review explores the fundamental principles of steganography, highlighting its historical evolution, methodologies, and contemporary applications. We delve into the different steganographic techniques, including spatial domain, transform domain, and adaptive methods, emphasizing their strengths and weaknesses in terms of capacity, imperceptibility, and robustness. The review also addresses the critical aspect of security in steganography, discussing the potential threats and countermeasures associated with steganalysis, the process of detecting hidden information. We examine various steganalysis techniques, from basic statistical analysis to advanced machine learning algorithms, assessing their efficacy in different scenarios. Furthermore, the ethical and legal implications of steganography are considered, given its dual-use nature in both protecting privacy and facilitating malicious activities. The review concludes with an overview of emerging trends and future directions in the field, including the integration of artificial intelligence and the development of novel steganographic frameworks that promise enhanced security and efficiency. By providing a holistic understanding of steganography and its security aspects, this review aims to inform researchers and practitioners about the current state and future prospects of this intriguing discipline.
References
Amrit, P., & Singh, A. K. (2023). AutoCRW: Learning based robust watermarking for smart city applications. Software - Practice and Experience. https://doi.org/10.1002/SPE.3197
Evsutin, O., & Dzhanashia, K. (2022). Watermarking schemes for digital images: Robustness overview. Signal Processing: Image Communication, 100. https://doi.org/10.1016/j.image.2021.116523
Fang, H., Jia, Z., Qiu, Y., Zhang, J., Zhang, W., & Chang, E.-C. (2022). De-END: Decoder-driven Watermarking Network. http://arxiv.org/abs/2206.13032
Fang, H., Jia, Z., Zhou, H., Ma, Z., & Zhang, W. (2023). Encoded Feature Enhancement in Watermarking Network for Distortion in Real Scenes. IEEE
Transactions on Multimedia, 25, 2648–2660. https://doi.org/10.1109/TMM.2022.3149641
Fernandez, P., Sablayrolles, A., Furon, T., Jégou, H., & Douze, M. (2022). WATERMARKING IMAGES IN SELF-SUPERVISED LATENT SPACES. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2022-May, 3054–3058. https://doi.org/10.1109/ICASSP43922.2022.9746058
Ge, S., Fei, J., Xia, Z., Tong, Y., Weng, J., & Liu, J. (2023). A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Processing, 17(2), 323–336. https://doi.org/10.1049/IPR2.12653
Hu, K., Wang, M., Ma, X., Chen, J., Wang, X., & Wang, X. (2024). Learning-based image steganography and watermarking: A survey. Expert Systems with Applications, 249, 123715. https://doi.org/10.1016/J.ESWA.2024.123715
Huang, J., Luo, T., Li, L., Yang, G., Xu, H., & Chang, C. C. (2023). ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN. IEEE Transactions on Instrumentation and Measurement, 72. https://doi.org/10.1109/TIM.2023.3285981
Janu, N., Kumar, A., Dadheech, P., Sharma, G., Kumar, A., & Raja, L. (2021). Multiple Watermarking Scheme for Video & Image for Authentication & Copyright Protection. IOP Conference Series: Materials Science and Engineering, 1131(1), 012020. https://doi.org/10.1088/1757-899X/1131/1/012020
Kandi, H., Mishra, D., & Gorthi, S. R. K. S. (2017). Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Computers and Security, 65, 247–268. https://doi.org/10.1016/j.cose.2016.11.016
Li, L., & Li, X. (2010). Watermarking protocol for broadcast monitoring. Proceedings of the International Conference on E-Business and E-Government, ICEE 2010, 1634–1637. https://doi.org/10.1109/ICEE.2010.414
Li, Y., Wang, H., & Barni, M. (2021). A survey of Deep Neural Network watermarking techniques. Neurocomputing, 461, 171–193. https://doi.org/10.1016/j.neucom.2021.07.051
Li, Y., Zhang, W., Fang, H., Yang, X., Ma, Z., & Yu, N. (2022). Font Watermarking Network for Text Images. Proceedings - International Conference on Image Processing, ICIP, 486–490. https://doi.org/10.1109/ICIP46576.2022.9897724
Plata, M., & Syga, P. (2020a). Robust spatial-spread deep neural image watermarking. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 62–70. https://doi.org/10.1109/TRUSTCOM50675.2020.00022
Plata, M., & Syga, P. (2020b). Robust watermarking with double detector-discriminator approach. http://arxiv.org/abs/2006.03921
Qin, C., Li, X., Zhang, Z., Li, F., Zhang, X., & Feng, G. (2024). Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning. IEEE Transactions on Multimedia, 26, 2164–2177. https://doi.org/10.1109/TMM.2023.3293272
Sridhar, B., & Syambabu, V. (2021). An importance of Crypto-watermarking techniques for secure transmission of multimedia information. 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, 64–66. https://doi.org/10.1109/ICSPC51351.2021.9451766
Wang, Z., Byrnes, O., Wang, H., Sun, R., Ma, C., Chen, H., Wu, Q., & Xue, M. (2023). Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography. IEEE Transactions on Computational Social Systems, 10(6), 2985–2999. https://doi.org/10.1109/TCSS.2023.3268950
Wen, B., & Aydore, S. (2019). ROMark: A Robust Watermarking System Using Adversarial Training. http://arxiv.org/abs/1910.01221
Wu, X., Liao, X., & Ou, B. (2023). SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection. MM 2023 - Proceedings of the 31st ACM International Conference on Multimedia, 1190–1201. https://doi.org/10.1145/3581783.3612471
Xu, H.-B., Wang, R., Wei, J., & Lu, S.-P. (2021). A Compact Neural Network-based Algorithm for Robust Image Watermarking. http://arxiv.org/abs/2112.13491
Ye, G., Gao, J., Yin, B., Xie, W., & Wei, X. (2023). Deep Boosting Robustness of DNN-Based Image Watermarking via Dbmark. Proceedings - 2023 International Conference on Culture-Oriented Science and Technology, CoST 2023, 186–191. https://doi.org/10.1109/CoST60524.2023.00046
Zhang, B., Wu, Y., & Chen, B. (2022). Embedding Guided End-to-End Framework for Robust Image Watermarking. Security and Communication Networks, 2022. https://doi.org/10.1155/2022/7259469