Meike Helena Kombrink, Zeno Jean Marius Hubert Geradts, Marcel Worring
{"title":"图像隐写术方法及其检测策略概览","authors":"Meike Helena Kombrink, Zeno Jean Marius Hubert Geradts, Marcel Worring","doi":"10.1145/3694965","DOIUrl":null,"url":null,"abstract":"Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of images, videos, audio and text files are tweaked to represent the information to hide. This paper covers the current methods for hiding information in images, alongside steganalysis methods which aim to detect the presence of steganography. By reviewing 456 references, this paper discusses the different approaches that can be taken toward steganography and its much less widely studied counterpart. Currently in research older steganography approaches are more widely used than newer methods even though these show greater potential. New methods do have flaws, therefore more research is needed to make these practically applicable. For steganalysis one of the greatest challenges is the generalisability. Often one scheme can detect the presence of one specific hiding method. More research is needed to combine current schemes and/or create new generalisable schemes. To allow readers to compare results between different papers in our work performance indications of all steganalysis methods are outlined and a comparison of performance is included. This comparison is given using ’topological sorting’ graphs, which compares detection results from all papers (as stated in the papers themselves) on different steganographic schemes.","PeriodicalId":50926,"journal":{"name":"ACM Computing Surveys","volume":"5 1","pages":""},"PeriodicalIF":23.8000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Image steganography approaches and their detection strategies: a survey\",\"authors\":\"Meike Helena Kombrink, Zeno Jean Marius Hubert Geradts, Marcel Worring\",\"doi\":\"10.1145/3694965\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of images, videos, audio and text files are tweaked to represent the information to hide. This paper covers the current methods for hiding information in images, alongside steganalysis methods which aim to detect the presence of steganography. By reviewing 456 references, this paper discusses the different approaches that can be taken toward steganography and its much less widely studied counterpart. Currently in research older steganography approaches are more widely used than newer methods even though these show greater potential. New methods do have flaws, therefore more research is needed to make these practically applicable. For steganalysis one of the greatest challenges is the generalisability. Often one scheme can detect the presence of one specific hiding method. More research is needed to combine current schemes and/or create new generalisable schemes. To allow readers to compare results between different papers in our work performance indications of all steganalysis methods are outlined and a comparison of performance is included. This comparison is given using ’topological sorting’ graphs, which compares detection results from all papers (as stated in the papers themselves) on different steganographic schemes.\",\"PeriodicalId\":50926,\"journal\":{\"name\":\"ACM Computing Surveys\",\"volume\":\"5 1\",\"pages\":\"\"},\"PeriodicalIF\":23.8000,\"publicationDate\":\"2024-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Computing Surveys\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1145/3694965\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Computing Surveys","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1145/3694965","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
Image steganography approaches and their detection strategies: a survey
Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of images, videos, audio and text files are tweaked to represent the information to hide. This paper covers the current methods for hiding information in images, alongside steganalysis methods which aim to detect the presence of steganography. By reviewing 456 references, this paper discusses the different approaches that can be taken toward steganography and its much less widely studied counterpart. Currently in research older steganography approaches are more widely used than newer methods even though these show greater potential. New methods do have flaws, therefore more research is needed to make these practically applicable. For steganalysis one of the greatest challenges is the generalisability. Often one scheme can detect the presence of one specific hiding method. More research is needed to combine current schemes and/or create new generalisable schemes. To allow readers to compare results between different papers in our work performance indications of all steganalysis methods are outlined and a comparison of performance is included. This comparison is given using ’topological sorting’ graphs, which compares detection results from all papers (as stated in the papers themselves) on different steganographic schemes.
期刊介绍:
ACM Computing Surveys is an academic journal that focuses on publishing surveys and tutorials on various areas of computing research and practice. The journal aims to provide comprehensive and easily understandable articles that guide readers through the literature and help them understand topics outside their specialties. In terms of impact, CSUR has a high reputation with a 2022 Impact Factor of 16.6. It is ranked 3rd out of 111 journals in the field of Computer Science Theory & Methods.
ACM Computing Surveys is indexed and abstracted in various services, including AI2 Semantic Scholar, Baidu, Clarivate/ISI: JCR, CNKI, DeepDyve, DTU, EBSCO: EDS/HOST, and IET Inspec, among others.