Survey in Image and Audio Steganography by using the Deep Learning Methods
Keywords:Image Steganography, Deep Learning, GAN, Audio Steganography
Steganography is the practise of secretly encoding information into another medium (called a cover media) such that its existence cannot be identified. Steganography is the method that is utilised to successfully do this task. Through the use of digital image steganography, one is able to achieve the capacity of secure communication, which is vital in the bulk of the applications that are now being created. The use of steganography is applicable in a wide variety of advantageous settings. Its ascent to the forefront of current security systems may be attributed to a confluence of factors, including a phenomenal rise in processing power and a heightened awareness among individuals of the need of safeguarding their personal information. When it comes to the creation of a steganographic method, the most significant challenge that must be surmounted is finding the optimal balance between quality and quantity. The method is distinguished from linked systems like encryption and watermarking by its ability to embed information, as well as by the fact that it cannot be seen by the human eye. This article presents a thorough examination and analysis of some contemporary steganographic methods that are regarded as state-of-the-art approaches. In addition, we have included an in-depth discussion of the most important steganographic technologies now available. Recent steganographic techniques that are based on deep learning have been enhanced, which has enabled the resolution of issues that were previously present
O. N. Kadhim, "A Chaos-Based Steganographic Approach for Information Hiding," Master, Faculty of Computer Science and Mathematics / University of Kufa, 2018.
Alfred J. Menezes, Paul C. van Oorschot, and S. A. Vanstone, Handbook of applied cryptography. Handb. Appl. Cryptogr., 1996.
W. Stallings, Cryptography and Network Security: Principles and Practice, International Edition. Principles and Practice, 2014.
S. Pal and S. K. Bandyopadhyay, "VARIOUS METHODS OF VIDEO STEGANOGRAPHY," International Journal of Information Research and Review, vol. 3, no. 6, pp. 2569- 2573, 2016.
W. Luo, F. Huang, and J. Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 5, no. 2, pp. 2201-214, 2010.
K. Kaur and B. Kaur, "DWT-LSB Approach for Video Steganography using Artificial Neural Network," International Advanced Research Journal in Science, Engineering, and Technology, vol. 5, no. 7, pp. 20-25, 2018.
C.-K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
S. e. Abed, M. Al-Mutairi, A. Al-Watyan, O. Al- Mutairi, W. AlEnizy, and A. Al-Noori, "An Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation," Journal of Circuits, Systems and Computers, vol. 28, no. 05, 2019.
Jiaohua Qin et al . [ Coverless Image Steganography Based on Generative Adversarial Network] 2020.
LANG CHEN et al . [ Learning to Generate Steganographic Cover for Audio Steganography Using GAN
Dengpan Ye et al [ Heard More Than Heard: An Audio Steganography Method Based on GAN ] 2019.
Hariom Dudhwal, Asst. in [Audio Steganography Based on LSB Method ] 2021.
Gali Dileep kumar . et al in [ Multi-Stage Residual Hiding for Image-Into-Audio Steganography ] 2022.
Azza Dandooh. et al [ Secure audio signal transmission based on color image watermarking ] 2021.  Fang Cao. et al [ Separable Reversible Data Hiding
in Encrypted VQ-Encoded Images ] 2022 .
Roshidi Din, Alaa Jabbar Qasim in [ Steganography analysis techniques applied to audio and image files ] 2019
Z. Fouroozesh, "Image Steganography based on LSB in Spatial Domain," Master, Department of Computer Science & Engineering College of Engineering Qatar University, 2014.
M. S. Sharbaf, "Quantum Cryptography: An Emerging Technology in Network Security," presented at the IEEE International Conference on Technologies for Homeland Security, 2011.
F. Twum, J. B, and R. Apau, "Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion," International Journal of Computer Applications, vol. 143, no. 4, pp. 28-36, 2016.
L. Jiang, L. Rui, Y. Zhanxin, and H. Yahui, "The Research on the Digital Short Radio Covert Communication Based on Audio Signal Information Hiding Technology," presented at the Proc. - Int. Conf. Manag. Serv. Sci. MASS, 2009.
R. Roy, S. Changder, A. Sarkar, and N. C. Debnath, "Evaluating Image Steganography Techniques: Future Research Challenges," presented at the Int. Conf. Comput. Manag. Telecommun., 2013.
A. Ibaida, I. Khalil, and D. Al-Shammary, "Embedding Patients Confidential Data in ECG Signal For HealthCare Information Systems," presented at the 32nd Annual International Conference of the IEEE EMBS, 2010.
X. Wang and J. Ye, "Information Hiding Technology in Electronic Notes System," presented at the 2010 International Conference on E-Business and E-Government, 2010.
H. Almara'beh, "Steganography Techniques - Data Security Using Audio and Video," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 6, no. 2, pp. 45-50, 2016.
How to Cite
Copyright (c) 2023 Zeina Al Hadad, Ibtisam Hassoun Ali
This work is licensed under a Creative Commons Attribution 4.0 International License.