APSIPA Transactions on Signal and Information Processing > Vol 13 > Issue 1

A Comprehensive Survey of Digital Image Steganography and Steganalysis

Weiqi Luo, Sun Yat-sen University, China, Kangkang Wei, Nanchang University, China, Qiushi Li, Shenzhen University, China, Miaoxin Ye, Sun Yat-sen University, China, Shunquan Tan, Shenzhen University, China, tansq@szu.edu.cn , Weixuan Tang, Guangzhou University, China, Jiwu Huang, Shenzhen MSU-BIT University, China
 
Suggested Citation
Weiqi Luo, Kangkang Wei, Qiushi Li, Miaoxin Ye, Shunquan Tan, Weixuan Tang and Jiwu Huang (2024), "A Comprehensive Survey of Digital Image Steganography and Steganalysis", APSIPA Transactions on Signal and Information Processing: Vol. 13: No. 1, e30. http://dx.doi.org/10.1561/116.20240038

Publication Date: 25 Nov 2024
© 2024 W. Luo, K. Wei, Q. Li, M. Ye, S. Tan, W. Tang and J. Huang
 
Subjects
Application security,  Artificial intelligence methods in security and privacy,  Forensics,  Web security and pirivacy,  Cryptography and information security,  Cryptology and data security,  Image and video processing,  Signal processing for security and forensic analysis
 
Keywords
Steganalysissteganography
 

Share

Open Access

This is published under the terms of CC BY-NC.

Downloaded: 104 times

In this article:
Introduction 
Preliminaries 
Image Steganography 
Image Steganalysis 
Challenges and Future Research Prospects 
Conclusion 
References 

Abstract

In the realm of digital communications, steganography and steganalysis have become a solution for securely exchanging covert information. This survey initiates with an exploration of the widely used passive-warden scenario model, analyzing its significance, key performance indicators, relevant databases, and clarifying some commonly misunderstood fundamental concepts associated with this model. Subsequently, the paper comprehensively examines the evolution and current state of digital image steganography and steganalysis, highlighting the transition from traditional handcrafted based methods to sophisticated deep learning based techniques developed over the past two decades. It offers thorough descriptions and evaluations of typical methods in both steganography and steganalysis, with a particular emphasis on deep learning-based techniques that have emerged in recent years. Furthermore, the survey identifies significant challenges currently faced in translating theoretical research into practical applications. By integrating these insights, the survey not only charts the historical development and technological advancements in steganography and steganalysis but also establishes a proactive agenda for future research aimed at enhancing security in covert communications.

DOI:10.1561/116.20240038