scholarly journals A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 38303-38314 ◽  
Author(s):  
Donghui Hu ◽  
Liang Wang ◽  
Wenjie Jiang ◽  
Shuli Zheng ◽  
Bin Li
IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 168166-168176 ◽  
Author(s):  
Qi Li ◽  
Xingyuan Wang ◽  
Xiaoyu Wang ◽  
Bin Ma ◽  
Chunpeng Wang ◽  
...  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 60575-60597
Author(s):  
Jia Liu ◽  
Yan Ke ◽  
Zhuo Zhang ◽  
Yu Lei ◽  
Jun Li ◽  
...  

2021 ◽  
Author(s):  
Raj chaganti ◽  
vinayakumar R ◽  
Mamoun Alazab ◽  
Tuan Pham

<div>Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage sophisticated techniques such as signature-based or anomaly-based, machine learning techniques. The well-known file formats Portable Executable (PE) for Windows and Executable and Linkable Format (ELF) for Linux based operating system are used for malware analysis and the malware detection capabilities of these files has been well advanced for real time detection. But the malware payload hiding in multimedia like cover images using steganography detection has been a challenge for enterprises, as these are rarely seen and usually act as a stager in sophisticated attacks. In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and the review of the stegomalware (malware payload hiding in images) targeting enterprises with cyberattacks current status. We present the stegomalware history, generation tools, file format specification description. Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including the Deep Learning opportunities and challenges in stegomalware generation and detection are presented based on our findings.</div>


2020 ◽  
Vol 21 (1) ◽  
pp. 63-72
Author(s):  
P G Kuppusamy ◽  
K C Ramya ◽  
S Sheebha Rani ◽  
M Sivaram ◽  
Vigneswaran Dhasarathan

Image steganography aims at hiding information in a cover medium in an imperceptible way. While traditionalsteganography methods used invisible inks and microdots, digital world started using images and video files for hiding the secret content in it. Steganalysis is a closely related field for detecting hidden information in these multimedia files. There are many steganography algorithms implemented and tested but most of them fail during Steganalysis. To overcome this issue, in this paper, we are proposing to use generative adversarial networks for image steganography which include discriminative models to identify steganography image during training stage and that helps us to reduce the error rate later during Steganalysis. The proposed modified cycle Generative Adversarial Networks (Mod Cycle GAN) algorithm is tested using the USC-SIPI database and the experimentation results were better when compared with the algorithms in the literature. Because the discriminator block evaluates the image authenticity, we could modify the embedding algorithm until the discriminator could not identify the change made and thereby increasing the robustness.


2021 ◽  
Author(s):  
Raj chaganti ◽  
vinayakumar R ◽  
Mamoun Alazab ◽  
Tuan Pham

<div>Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage sophisticated techniques such as signature-based or anomaly-based, machine learning techniques. The well-known file formats Portable Executable (PE) for Windows and Executable and Linkable Format (ELF) for Linux based operating system are used for malware analysis and the malware detection capabilities of these files has been well advanced for real time detection. But the malware payload hiding in multimedia like cover images using steganography detection has been a challenge for enterprises, as these are rarely seen and usually act as a stager in sophisticated attacks. In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and the review of the stegomalware (malware payload hiding in images) targeting enterprises with cyberattacks current status. We present the stegomalware history, generation tools, file format specification description. Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including the Deep Learning opportunities and challenges in stegomalware generation and detection are presented based on our findings.</div>


Sign in / Sign up

Export Citation Format

Share Document