StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, supplementary material.

  • Yang H Xu Y Liu X Ma X (2024) PRIS Engineering Applications of Artificial Intelligence 10.1016/j.engappai.2024.108419 133 :PD Online publication date: 1-Jul-2024 https://dl.acm.org/doi/10.1016/j.engappai.2024.108419
  • Wu T Hu X Hu Y Wang Y Liu C Zhu Y (2024) Robust Generative Steganography via Intermediate State Normal Distribution Advanced Intelligent Computing Technology and Applications 10.1007/978-981-97-5603-2_34 (416-426) Online publication date: 1-Aug-2024 https://doi.org/10.1007/978-981-97-5603-2_34

Index Terms

Information systems

Information systems applications

Multimedia information systems

Security and privacy

Security services

Recommendations

Generative steganography network.

Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...

Lossless image steganography: Regard steganography as super-resolution

Image steganography attempts to imperceptibly hide the secret image within the cover image. Most of the existing deep learning-based steganography approaches have excelled in payload capacity, visual quality, and steganographic security. However, ...

  • A novel INN-based framework is proposed for secure and lossless image steganography.
  • It solves the problem of lost information in traditional INN-based image steganography methods.
  • A secret projection module is designed to enhance ...

LSB based non blind predictive edge adaptive image steganography

Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data is embedded in ...

Information

Published in.

cover image ACM Conferences

  • General Chairs:

Author Picture

University of Ottawa, Canada & MBZUAI, UAE

HiDream.ai, China

University of Modena and Reggio Emilia, Italy

  • Program Chairs:

Author Picture

University of Florence, Italy

Unversidad de Medellin, Colombia

University at Albany, State University of New York, USA

M. Shamim Hossain (King Saud University, KSA

  • SIGMM: ACM Special Interest Group on Multimedia

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates, author tags.

  • diffusion model
  • generative image steganography
  • large-capacity
  • Research-article

Funding Sources

  • Anhui Science and Technology Key Special Program
  • the Natural Science Foundation of China

Acceptance Rates

Upcoming conference, contributors, other metrics, bibliometrics, article metrics.

  • 1 Total Citations View Citations
  • 747 Total Downloads
  • Downloads (Last 12 months) 747
  • Downloads (Last 6 weeks) 52

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

IMAGES

  1. Thesis On Steganography

    thesis on steganography

  2. How to Write a High-Quality Steganography Thesis? [Expert Guidance

    thesis on steganography

  3. Steganography encryption [9]

    thesis on steganography

  4. (PDF) Steganography is the art of Hiding Data

    thesis on steganography

  5. Thesis Report On Image Steganography Using Wavelet Transform

    thesis on steganography

  6. A Sesure Image Steganography Using LSB Technique and ...

    thesis on steganography

VIDEO

  1. Stegnography using Steghide

  2. Image Steganography Projects

  3. Audio Steganography MATLAB Code Projects

  4. Audio Steganography Project in Java Report and PPT

  5. Simulink project for A video watermarking technique using DWT & SVD

  6. Audio Steganography Hiding Secret Text In Audio

COMMENTS

  1. Image steganography approaches and their detection strategies: a survey

    Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of images, videos, audio and text files are tweaked to represent the information to hide. This paper covers the current methods for hiding ...

  2. Thesis

    Adaptive spatial image steganography and steganalysis using perceptual modelling and machine learning. ... and generating stego images from the knowledge of the CNNs.Several contributions are made for both image steganography and steganalysis in this thesis. Firstly, inspired by the Ranking Priority Profile (RPP), a new cost function for ...

  3. Steganalysis and steganography by deep learning

    Our proposed steganography system is based on the use of generative adversarial networks. The training of this steganographic system is conducted using three neural networks that compete against ...

  4. Image Steganography: A Review of the Recent Advances

    Image Steganography: A Review of the Recent Advances

  5. Current status and key issues in image steganography: A survey

    Image steganography can be broadly classified into spatial domain, transform domain, spread spectrum and model based steganography as depicted in Fig. 4.In spatial domain, secret message is embedded in pixel value directly whereas transform domain methods achieve embedding by first transforming the image from spatial to frequency domain using any one of the transforms such as discrete cosine ...

  6. Comprehensive survey of image steganography: Techniques, Evaluations

    Comprehensive survey of image steganography

  7. PDF Studies on Image Steganography

    Image Steganography works in two different domains; Spatial Domain and Transform Domain where each of them has its techniques and methods. In this thesis two methods will be studied, one from each domain. Least Significant Bit (LSB) is an image steganography technique that will be studied in spatial domain, and Discrete Wavelet Transformation ...

  8. Spatial-Domain Image Steganalysis using Deep Learning Techniques

    Thesis submitted to the Indian Institute of Technology Guwahati for the award of the degree of Doctor of Philosophy in Computer Science and Engineering ... Indian Institute of Technology Guwahati Feb, 2021. Abstract Steganography is an art of covert communication where a message is hidden in some natural-looking objects such that no one can ...

  9. Image steganalysis using deep learning: a systematic review and open

    Image steganography involves the process of concealing sensitive information in the cover image to achieve secret communication. The counterpart of steganography is image steganalysis, which is used to detect any hidden information that is being communicated among different entities. The image steganalysis has gained much attention in the recent past from the information law enforcement as ...

  10. A Comprehensive Review of Image Steganography Techniques

    The review includes a classification of the different steganography methods, including spatial domain, frequency domain, and transform domain techniques. Each method studied providing ability to go through any image processing operations, security, robustness, and ability to detect the hidden information. To assess the benefits and drawbacks of ...

  11. Exploring the Effectiveness of Steganography Techniques: A Comparative

    This research paper explores the use of image steganography for data communication. It provides an overview of data communication and steganography and focuses on the specific area of image steganography. It surveys various algorithms, including traditional and recent techniques, such as least significant bit insertion and neural network-based approaches. The importance of security ...

  12. [PDF] An overview of image steganography

    This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications. : Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many ...

  13. A review on image steganographic techniques based on optimization

    This review paper explores the use of optimization techniques in steganography, the art of hiding secret information within other data. Steganography is a field that has gained significant attention in recent years due to the increasing need for secure communication and data protection. Optimization techniques have been shown to be effective in improving the performance of steganography ...

  14. A Study and Review on Image Steganography

    Abstract. Steganography is the science that involves encrypting data in a suitable multimedia carrier, such as image, audio, and video files. The main purpose of image steganography is to hide the data in images. This means that it encrypts the text in the form of an icon. Steganography is done when there is communication takes place between ...

  15. StegaDDPM: Generative Image Steganography based on Denoising Diffusion

    Image steganography is the technology of concealing secret messages within an image. Recently, generative image steganography has been developed, which conceals secret messages during image generation. However, existing generative image steganography schemes are often criticized for their poor steganographic capacity and extraction accuracy.

  16. (PDF) STEGANOGRAPHY: AN OVERVIEW

    Abstract and Figures. Steganography is a technique of hiding information in digital media in such a way that no one apart from the intended recipient knows the existence of the information ...

  17. PDF Library of Ph.D. Theses

    Library of Ph.D. Theses | EURASIP

  18. Steganography and Steganalysis (in digital forensics): a Cybersecurity

    Steganography and steganalysis is a relatively new-fangled scientific discipline in security systems and digital forensics, respectively, but one that has matured greatly over the past two decades. In any specialism of human endeavour, it is imperative to periodically pause and review the state of the discipline for what has been achieved till date. This article scrutinizes where the ...

  19. PDF A Comprehensive Review of Audio Steganalysis Methods

    3 Department of Biomedical Engineering, Amirkabir University of Technology, Tehran, Iran. *[email protected]. Abstract: Recently, merging signal processing techniques with information security services has found a lot of attention. Steganography and steganalysis are among those trends.

  20. Sensitive Data Steganography in Medical Images

    This technique is the most v aluable as steganography becomes a part of the image. and it's based on embedding the data by image marking. As the secret data will. be hidden in the part of the ...

  21. PDF Security Enhancement of Image Steganography Using

    Steganography is a security method that hides secret data inside cover media where the very existence of the embedded secret data is not perceptible. The cover object can be image, audio or video; the most commonly used is an image file. This thesis presents a model for protecting the security and integrity of secret data

  22. Introduction to Steganography

    And the processing of an image and the efforts of statistical analysis needed for breaking steganography algorithms are known as "steganalysis" or "attacks.". The classical model for modern steganography was proposed by Simmons in 1984 as "the prisoners' problem" (Simmons, 1984). An example is illustrated in Fig. 1.1 ...

  23. Thesis On Steganography

    Thesis on steganography - Free ebook download as Word Doc (.doc / .docx), PDF File (.pdf), Text File (.txt) or read book online for free. Description about steganogrphy

  24. A Review on Text Steganography Techniques

    Steganography is an appropriate method, in which the user is able to conceal a message inside another message (cover media). Most of the research on steganography utilizes cover media, such as ...