Acknowledgement
This research was financially supported by Hansung University.
References
- DJEBBAR, Fatiha, "Securing IoT Data Using Steganography: A Practical Implementation Approach," Electronics, 10.21: 2707, 2021.
- KHARI, Manju, et al., "Securing data in Internet of Things (IoT) using cryptography and steganography techniques," IEEE Transactions on Systems, Man, and Cybernetics: Systems, Vol. 50, Issue 1, PP. 73-80, Jan. 2020. https://doi.org/10.1109/TSMC.2019.2903785
- Akhtar, Nadeem, Pragati Johri, and Shahbaaz Khan. "Enhancing the security and quality of LSB based image steganography," 2013 5th International Conference and Computational Intelligence and Communication Networks, Mathura, India, Sep. 2013.
- Jian, Chua Teck, et al., "Audio steganography with embedded text," IOP Conference Series: Materials Science and Engineering, Vol. 226. No. 1, Aug. 2017.
- Kim, Jaeyoung, et al., "A statistical approach for improving the embedding capacity of block matching based image steganography," Journal of Broadcast Engineering, Vol. 22, Issue 5, pp. 643-651, 2017.
- Kavitha, Kavita Kadam, Ashwini Koshti, and Priya Dunghav, "Steganography using least significant bit algorithm," International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, pp. 2248-9622, May-Jun 2012.
- Gupta, Shailender, Ankur Goyal, and Bharat Bhushan, "Information hiding using least significant bit steganography and cryptography," International Journal of Modern Education and Computer Science, 4.6: 27, Jun. 2012.
- Wu, Da-Chun, and Wen-Hsiang Tsai, "A steganographic method for images by pixel-value differencing," Pattern recognition letters, Vol. 24, Issues 9-10, pp. 1613-1626, Jun. 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
- Nurdiyanto, Heri, et al., "Enhanced pixel value differencing steganography with government standard algorithm," 2017 3rd International Conference on Science in Information Technology (ICSITech), Bandung, Indonesia, Oct. 2017.
- H.-C. Wu, et al., "Image steganographic scheme based on pixel-value differencing and LSB replacement methods," IEE Proceedings-Vision, Image and Signal Processing, Vol. 152, Issues 5, pp. 611-615, Oct. 2005. https://doi.org/10.1049/ip-vis:20059022
- C.-H. Yang, et al., "Capacity-raising steganography using multi-pixel differencing and pixel-value shifting operations," Fundamenta Informaticae, vol. 98, no. 2-3, pp. 321- 336, 2010. https://doi.org/10.3233/FI-2010-229
- V. Holub and J. Fridrich, "Designing steganographic distortion using directional filters," 2012 IEEE International Workshop on Information Forensics and Security(WIFS), Vol.2, pp. 234-239, 2012.
- Holub, V., Fridrich, J., "Digital image steganography using universal distortion," Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 59-68, Montpellier, France, Jun. 2013.
- Nam, Soo-Tai and Chan-Yong Jin, "Rebuilding of Image Compression Algorithm Based on the DCT (discrete cosine transform)," Journal of the Korea Institute of Information and Communication Engineering, vol. 23, no. 1, pp. 84-89, 2019.
- Sahar A. El_Rahman, "A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information," Computers &Electrical Engineering, Vol. 70, pp. 380-399, Aug. 2018. https://doi.org/10.1016/j.compeleceng.2016.09.001
- Dr. Ekta Walia, Payal Jain, Navdeep, "An Analysis of LSB & DCT based Steganography," Global Journal of Computer Science and Technology, Vol. 10, Issue 1, pp.4-8, Apr. 2010.
- A.M.Raid, W.M.Khedr, M. A. El-dosuky and Wesam Ahmed, "Jpeg Image Compression Using Discrete Cosine Transform - A Survey," International Journal of Computer Science & Engineering Survey(IJCSES), Vol. 5, No. 2, Apr. 2014.
- R. Reininger and J. Gibson, "Distributions of the Two-Dimensional DCT Coefficients for Images," IEEE Transactions on Communications, Vol. 31, Issue 6, pp. 835-839, Jun. 1983. https://doi.org/10.1109/TCOM.1983.1095893
- Ken Cabeen, Peter Gent, "Image Compression and the Discrete Cosine Transform,"
- Baluja, Shumeet, "Hiding images in plain sight: Deep steganography," Advances in neural information processing systems 30, 2017.
- Albawi, Saad, Tareq Abed Mohammed and Saad Al-Zawi, "Understanding of a convolutional neural network," 2017 international conference on engineering and technology (ICET). pp. 1-6, Antalya, Turkey, Aug. 2017.
- Volkhonskiy, Denis, Ivan Nazarov and Evgeny Burnaev, "Steganographic generative adversarial networks," Twelfth international conference on machine vision (ICMV 2019), Vol. 11433, pp. 991-1005, Jan. 2020.
- Goodfellow, Ian, et al., "Generative adversarial networks," Communications of the ACM, Vol. 63, no. 11, pp. 139-144, Oct. 2020. https://doi.org/10.1145/3422622
- Wu, Pin, Yang Yang and Xiaoqiang Li, "Stegnet: Mega image steganography capacity with deep convolutional network," Future Internet, Vol. 10, Issue 6, pp. 54, Jun. 2018.
- Srivastava, et al., "Highway networks," arXiv:1505.00387, Nov. 2015.
- He, Kaiming, et al., "Deep residual learning for image recognition," Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770-778, Las Vegas, NV, USA, Jun. 2016.
- Szegedy, Christian, et al., "Rethinking the inception architecture for computer vision," 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2818-2826, Las Vegas, NV, USA, Jun. 2016.
- Kingma, Diederik P. and Max Welling, "An introduction to variational autoencoders," Foundations and Trends® in Machine Learning, Vol. 12, No. 4, pp. 307-392, Nov. 2019. https://doi.org/10.1561/2200000056
- Baluja, Shumeet, "Hiding images within images," IEEE transactions on pattern analysis and machine intelligence, Vol. 42, Issue 7, pp. 1685-1697, Feb. 2019. https://doi.org/10.1109/TPAMI.2019.2901877
- Shi, Haichao, et al., "SSGAN: Secure steganography based on generative adversarial networks," Advances in Multimedia Information Processing-PCM 2017, pp. 534-544, Harbin, China, September 28-29, 2017.
- WANG, Yaojie, Ke NIU and Xiaoyuan YANG, "Information hiding scheme based on generative adversarial network," Journal of Computer Applications, Vol. 38, Issue 10, pp. 2923-2928, 2018.
- Zhang, Kevin Alex, et al., "SteganoGAN: High capacity image steganography with GANs," arXiv:1901.03892, 2019.