Robust steganography with boundary-preserving overflow alleviation and adaptive error correction

With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques. However, traditional steganography faces challenges in social networks due to lossy operations such as spatial truncation during JPEG recompression,...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Expert systems with applications Ročník 281; s. 127598
Hlavní autoři: Cheng, Yu, Luo, Zhenlin, Yin, Zhaoxia
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier Ltd 01.07.2025
Témata:
ISSN:0957-4174
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques. However, traditional steganography faces challenges in social networks due to lossy operations such as spatial truncation during JPEG recompression, with limited research on their effects. Existing methods aim to ensure the stability of the quantized coefficients by reducing the effects of spatial truncation. Nevertheless, these approaches may induce notable alterations to image pixels, potentially compromising anti-steganalysis performance. In this study, we analyze the overflow characteristics of spatial blocks and observe that pixel values at the boundaries of spatial blocks are more prone to overflow. Based on this observation, we propose a preprocessing method that performs overflow removal operations according to the actual overflow conditions of spatial blocks, enhancing coefficient stability while minimizing modifications to spatial block boundaries, thereby ensuring image quality. Subsequently, we employ adaptive error correction coding to reduce coding redundancy, thereby augmenting robustness and mitigating its impact on anti-steganalysis performance. The experimental results indicate that the proposed method possesses a strong embedding capacity, maintaining a high level of robustness while enhancing security. [Display omitted] •Spatial block boundaries are more prone to overflow in JPEG recompression.•Preprocessing minimizes block modifications, enhancing stability and performance.•Adaptive error correction promptly saves the optimal scheme to enhance performance.•Method demonstrates significant advantages in anti-steganalysis performance.
AbstractList With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques. However, traditional steganography faces challenges in social networks due to lossy operations such as spatial truncation during JPEG recompression, with limited research on their effects. Existing methods aim to ensure the stability of the quantized coefficients by reducing the effects of spatial truncation. Nevertheless, these approaches may induce notable alterations to image pixels, potentially compromising anti-steganalysis performance. In this study, we analyze the overflow characteristics of spatial blocks and observe that pixel values at the boundaries of spatial blocks are more prone to overflow. Based on this observation, we propose a preprocessing method that performs overflow removal operations according to the actual overflow conditions of spatial blocks, enhancing coefficient stability while minimizing modifications to spatial block boundaries, thereby ensuring image quality. Subsequently, we employ adaptive error correction coding to reduce coding redundancy, thereby augmenting robustness and mitigating its impact on anti-steganalysis performance. The experimental results indicate that the proposed method possesses a strong embedding capacity, maintaining a high level of robustness while enhancing security. [Display omitted] •Spatial block boundaries are more prone to overflow in JPEG recompression.•Preprocessing minimizes block modifications, enhancing stability and performance.•Adaptive error correction promptly saves the optimal scheme to enhance performance.•Method demonstrates significant advantages in anti-steganalysis performance.
ArticleNumber 127598
Author Cheng, Yu
Yin, Zhaoxia
Luo, Zhenlin
Author_xml – sequence: 1
  givenname: Yu
  orcidid: 0009-0005-3128-5613
  surname: Cheng
  fullname: Cheng, Yu
  email: 10212140443@stu.ecnu.edu.cn
– sequence: 2
  givenname: Zhenlin
  orcidid: 0009-0001-3596-8009
  surname: Luo
  fullname: Luo, Zhenlin
  email: 10212140438@stu.ecnu.edu.cn
– sequence: 3
  givenname: Zhaoxia
  orcidid: 0000-0003-0387-4806
  surname: Yin
  fullname: Yin, Zhaoxia
  email: zxyin@cee.ecnu.edu.cn
BookMark eNp9kD1PwzAQQD0UibbwB5j8BxLsxIkbiQVVfEmVkBDM5mJfWlfBrmw3Vf89DWViYLrh9E733oxMnHdIyA1nOWe8vt3mGA-QF6yocl7IqllMyJQ1lcwEl-KSzGLcMsYlY3JKPt98u4-JxoRrcH4dYLc50oNNG9r6vTMQjtkuYMQwWLemfsDQ9f5Aoe9xsJCsdxScoWBgl-yAFEPwgWofAupxe0UuOugjXv_OOfl4fHhfPmer16eX5f0q02XJUlYgk5ozrIXhJXBhpBS6KutGM13rRtYtQlcXoq1BgxGlYFUFFZasYVJ2QpRzUpzv6uBjDNipXbBfp_cVZ2rsorZq7KLGLurc5QQt_kDaph-pFMD2_6N3ZxRPUoPFoKK26DQaO5or4-1_-Dc7m4VZ
CitedBy_id crossref_primary_10_1016_j_sigpro_2025_110088
Cites_doi 10.1109/TCSVT.2018.2881118
10.1145/1597817.1597830
10.1016/j.eswa.2023.121955
10.1109/TSIPN.2021.3081373
10.1016/j.eswa.2024.124903
10.1109/TIFS.2011.2134094
10.1109/18.923725
10.1016/j.eswa.2010.04.071
10.1109/TIFS.2014.2364918
10.1016/j.eswa.2024.123420
10.1016/j.sigpro.2019.107343
10.1109/TIFS.2020.3029908
10.1186/1687-417X-2014-1
10.1016/j.eswa.2024.124574
10.1109/TCSVT.2019.2923980
10.1016/j.eswa.2024.123715
10.1109/TCSVT.2023.3250750
10.1016/j.eswa.2024.124338
10.1016/j.eswa.2024.124390
10.1016/j.patrec.2005.09.008
10.1109/TMM.2023.3264628
10.1109/TIFS.2018.2885438
10.1007/s11042-017-4506-3
10.1016/j.jvcir.2024.104291
10.1016/j.eswa.2023.120416
10.1016/j.eswa.2024.124796
10.1016/j.ins.2024.120225
10.1016/j.eswa.2024.123540
10.1109/TIFS.2011.2175919
10.1109/TIFS.2018.2871749
ContentType Journal Article
Copyright 2025
Copyright_xml – notice: 2025
DBID AAYXX
CITATION
DOI 10.1016/j.eswa.2025.127598
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_eswa_2025_127598
S0957417425012205
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 62172001
  funderid: http://dx.doi.org/10.13039/501100001809
GroupedDBID --K
--M
.DC
.~1
0R~
13V
1B1
1RT
1~.
1~5
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
9JO
AAAKF
AABNK
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
ABBOA
ABFNM
ABJNI
ABMAC
ABMVD
ABUCO
ACDAQ
ACGFS
ACHRH
ACNTT
ACRLP
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AFXIZ
AGCQF
AGHFR
AGRNS
AGUBO
AGUMN
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALEQD
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APLSM
APXCP
AXJTR
BJAXD
BKOJK
BLXMC
BNPGV
BNSAS
CS3
DU5
EBS
EFJIC
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HAMUX
IHE
J1W
JJJVA
KOM
LG9
LY1
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
ROL
RPZ
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SSB
SSD
SSH
SSL
SST
SSV
SSZ
T5K
TN5
~G-
29G
9DU
AAAKG
AAQXK
AAYXX
ABKBG
ABUFD
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ADJOM
ADMUD
ADNMO
AGQPQ
ASPBG
AVWKF
AZFZN
CITATION
EFKBS
EFLBG
EJD
FEDTE
FGOYB
G-2
HLZ
HVGLF
HZ~
R2-
SBC
SET
WUQ
XPP
ZMT
~HD
ID FETCH-LOGICAL-c330t-2e07c10e64d13a14d774c5369c0c6c976beaf624b6acad434055a5e309077f443
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001474169600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0957-4174
IngestDate Tue Nov 18 22:29:01 EST 2025
Sat Nov 29 07:54:41 EST 2025
Sat Jun 14 16:54:30 EDT 2025
IsPeerReviewed true
IsScholarly true
Keywords Adaptive error correction
Robust steganography
Social networks
Dither modulation
Overflow
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c330t-2e07c10e64d13a14d774c5369c0c6c976beaf624b6acad434055a5e309077f443
ORCID 0009-0001-3596-8009
0000-0003-0387-4806
0009-0005-3128-5613
ParticipantIDs crossref_primary_10_1016_j_eswa_2025_127598
crossref_citationtrail_10_1016_j_eswa_2025_127598
elsevier_sciencedirect_doi_10_1016_j_eswa_2025_127598
PublicationCentury 2000
PublicationDate 2025-07-01
PublicationDateYYYYMMDD 2025-07-01
PublicationDate_xml – month: 07
  year: 2025
  text: 2025-07-01
  day: 01
PublicationDecade 2020
PublicationTitle Expert systems with applications
PublicationYear 2025
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Holub, Fridrich, Denemark (b9) 2014; 2014
Zeng, Chen, Zhang, Wang, Yu (b30) 2023; 33
Zhang, Sun, Meng (b33) 2024; 254
Filler, Judas, Fridrich (b5) 2011; 6
Kodovsky, Fridrich, Holub (b12) 2011; 7
MacWilliams, Sloane (b15) 1977
(pp. 63–74).
Kong, Zhang, Huang, Zhou, Chen, Qin (b13) 2024; 256
Yao, Wang, Chang, Ren, Meng (b26) 2024; 249
Kodovskỳ, J., & Fridrich, J. (2009). Calibration revisited. In
Hu, Wang, Ma, Chen, Wang, Wang (b10) 2024; 249
Pevny, Fridrich (b18) 2007; vol. 6505
Zhang, Feng, Xia, Weng, Lu, Chen (b31) 2024; 662
Xiao, Wang, Shen, Yao (b25) 2024; 104
Rehman, Bajwa, Raza, Alfarhood, Safran, Zhang (b19) 2024; 248
Zeng, Chen, Zhang, Wang (b29) 2024; 26
Guo, Sun, Weng, Yu, He (b7) 2024; 255
Noda, Niimi, Kawaguchi (b17) 2006; 27
Sajedi, Jamzad (b21) 2010; 37
Duan, Li, Yin, Zhang, Luo (b4) 2023; 229
Gan, Yau, Gan, Salam, Guo, Chang (b6) 2024; 238
Tao, Li, Zhang, Wang (b23) 2018; 29
Holub, Fridrich (b8) 2014; 10
Song, Wei, Wu, Lin, Zhou (b22) 2024; 254
Wang, Zhang, Li, Yu (b24) 2020; 16
Yu, Chen, Wang, Li, Zhang, Yu (b28) 2020; 168
Meng, Jiang, Sun, Zhao, Xu (b16) 2023
Zhao, Guan, Zhang, Zhao (b35) 2018; 14
Yin, Ke (b27) 2021; 7
Li, Cui, Wang, Zhang, Xiang (b14) 2024; 255
Chen, Wornell (b3) 2001; 47
Zhang, Luo, Guo, Qin, Liu (b32) 2019; 30
Rustad, Andono, Shidik (b20) 2023; 206
Zhang, Zhu, Qin, Yang, Luo (b34) 2018; 77
Boroumand, Chen, Fridrich (b2) 2019; 14
Bas, Filler, Pevnỳ (b1) 2011
Zhang (10.1016/j.eswa.2025.127598_b33) 2024; 254
Kong (10.1016/j.eswa.2025.127598_b13) 2024; 256
Wang (10.1016/j.eswa.2025.127598_b24) 2020; 16
Pevny (10.1016/j.eswa.2025.127598_b18) 2007; vol. 6505
MacWilliams (10.1016/j.eswa.2025.127598_b15) 1977
Zeng (10.1016/j.eswa.2025.127598_b30) 2023; 33
Holub (10.1016/j.eswa.2025.127598_b9) 2014; 2014
Zhang (10.1016/j.eswa.2025.127598_b31) 2024; 662
Zhao (10.1016/j.eswa.2025.127598_b35) 2018; 14
Boroumand (10.1016/j.eswa.2025.127598_b2) 2019; 14
Yao (10.1016/j.eswa.2025.127598_b26) 2024; 249
Chen (10.1016/j.eswa.2025.127598_b3) 2001; 47
Rehman (10.1016/j.eswa.2025.127598_b19) 2024; 248
Guo (10.1016/j.eswa.2025.127598_b7) 2024; 255
Zeng (10.1016/j.eswa.2025.127598_b29) 2024; 26
Yin (10.1016/j.eswa.2025.127598_b27) 2021; 7
Bas (10.1016/j.eswa.2025.127598_b1) 2011
10.1016/j.eswa.2025.127598_b11
Xiao (10.1016/j.eswa.2025.127598_b25) 2024; 104
Hu (10.1016/j.eswa.2025.127598_b10) 2024; 249
Yu (10.1016/j.eswa.2025.127598_b28) 2020; 168
Duan (10.1016/j.eswa.2025.127598_b4) 2023; 229
Gan (10.1016/j.eswa.2025.127598_b6) 2024; 238
Kodovsky (10.1016/j.eswa.2025.127598_b12) 2011; 7
Rustad (10.1016/j.eswa.2025.127598_b20) 2023; 206
Sajedi (10.1016/j.eswa.2025.127598_b21) 2010; 37
Filler (10.1016/j.eswa.2025.127598_b5) 2011; 6
Meng (10.1016/j.eswa.2025.127598_b16) 2023
Holub (10.1016/j.eswa.2025.127598_b8) 2014; 10
Noda (10.1016/j.eswa.2025.127598_b17) 2006; 27
Song (10.1016/j.eswa.2025.127598_b22) 2024; 254
Tao (10.1016/j.eswa.2025.127598_b23) 2018; 29
Li (10.1016/j.eswa.2025.127598_b14) 2024; 255
Zhang (10.1016/j.eswa.2025.127598_b34) 2018; 77
Zhang (10.1016/j.eswa.2025.127598_b32) 2019; 30
References_xml – volume: 27
  start-page: 455
  year: 2006
  end-page: 461
  ident: b17
  article-title: High-performance JPEG steganography using quantization index modulation in DCT domain
  publication-title: Pattern Recognition Letters
– volume: 33
  start-page: 4893
  year: 2023
  end-page: 4906
  ident: b30
  article-title: Robust steganography for high quality images
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
– volume: 256
  year: 2024
  ident: b13
  article-title: Neural network-based reversible data hiding for medical image
  publication-title: Expert Systems with Applications
– volume: 26
  start-page: 299
  year: 2024
  end-page: 312
  ident: b29
  article-title: Upward robust steganography based on overflow alleviation
  publication-title: IEEE Transactions on Multimedia
– volume: 249
  year: 2024
  ident: b10
  article-title: Learning-based image steganography and watermarking: A survey
  publication-title: Expert Systems with Applications
– volume: 168
  year: 2020
  ident: b28
  article-title: Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
  publication-title: Signal Processing
– volume: 229
  year: 2023
  ident: b4
  article-title: Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction
  publication-title: Expert Systems with Applications
– volume: 248
  year: 2024
  ident: b19
  article-title: Leveraging coverless image steganography to hide secret information by generating anime characters using GAN
  publication-title: Expert Systems with Applications
– volume: 10
  start-page: 219
  year: 2014
  end-page: 228
  ident: b8
  article-title: Low-complexity features for JPEG steganalysis using undecimated DCT
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 14
  start-page: 1181
  year: 2019
  end-page: 1193
  ident: b2
  article-title: Deep residual network for steganalysis of digital images
  publication-title: IEEE Transactions on Information Forensics and Security
– year: 1977
  ident: b15
  publication-title: The theory of error-correcting codes
– volume: 29
  start-page: 594
  year: 2018
  end-page: 600
  ident: b23
  article-title: Towards robust image steganography
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
– volume: vol. 6505
  start-page: 28
  year: 2007
  end-page: 40
  ident: b18
  article-title: Merging Markov and DCT features for multi-class JPEG steganalysis
  publication-title: Security, steganography, and watermarking of multimedia contents IX
– volume: 77
  start-page: 17913
  year: 2018
  end-page: 17935
  ident: b34
  article-title: Dither modulation based adaptive steganography resisting jpeg compression and statistic detection
  publication-title: Multimedia Tools and Applications
– volume: 238
  year: 2024
  ident: b6
  article-title: DSteganoM: Deep steganography for motion capture data
  publication-title: Expert Systems with Applications
– volume: 662
  year: 2024
  ident: b31
  article-title: Conditional image hiding network based on style transfer
  publication-title: Information Sciences
– volume: 30
  start-page: 2750
  year: 2019
  end-page: 2764
  ident: b32
  article-title: Multiple robustness enhancements for image adaptive steganography in lossy channels
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
– volume: 254
  year: 2024
  ident: b33
  article-title: Adaptive reversible data hiding scheme based on difference division interpolation
  publication-title: Expert Systems with Applications
– start-page: 1
  year: 2023
  end-page: 16
  ident: b16
  article-title: A robust coverless video steganography based on the similarity of inter-frames
  publication-title: IEEE Transactions on Multimedia
– volume: 6
  start-page: 920
  year: 2011
  end-page: 935
  ident: b5
  article-title: Minimizing additive distortion in steganography using syndrome-trellis codes
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 7
  start-page: 432
  year: 2011
  end-page: 444
  ident: b12
  article-title: Ensemble classifiers for steganalysis of digital media
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 254
  year: 2024
  ident: b22
  article-title: A survey on deep-learning-based image steganography
  publication-title: Expert Systems with Applications
– volume: 37
  start-page: 7703
  year: 2010
  end-page: 7710
  ident: b21
  article-title: BSS: Boosted steganography scheme with cover image preprocessing
  publication-title: Expert Systems with Applications
– volume: 249
  year: 2024
  ident: b26
  article-title: High invisibility image steganography with wavelet transform and generative adversarial network
  publication-title: Expert Systems with Applications
– volume: 16
  start-page: 1117
  year: 2020
  end-page: 1130
  ident: b24
  article-title: Non-additive cost functions for JPEG steganography based on block boundary maintenance
  publication-title: IEEE Transactions on Information Forensics and Security
– reference: (pp. 63–74).
– volume: 206
  year: 2023
  ident: b20
  article-title: Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
  publication-title: Signal Processing
– reference: Kodovskỳ, J., & Fridrich, J. (2009). Calibration revisited. In
– volume: 47
  start-page: 1423
  year: 2001
  end-page: 1443
  ident: b3
  article-title: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
  publication-title: Institute of Electrical and Electronics Engineers. Transactions on Information Theory
– volume: 2014
  start-page: 1
  year: 2014
  end-page: 13
  ident: b9
  article-title: Universal distortion function for steganography in an arbitrary domain
  publication-title: EURASIP Journal on Information Security
– volume: 255
  year: 2024
  ident: b14
  article-title: FTPE-BC: Fast thumbnail-preserving image encryption using block-churning
  publication-title: Expert Systems with Applications
– volume: 255
  year: 2024
  ident: b7
  article-title: A two-stream-network based steganalysis network: TSNet
  publication-title: Expert Systems with Applications
– volume: 14
  start-page: 1843
  year: 2018
  end-page: 1856
  ident: b35
  article-title: Improving the robustness of adaptive steganographic algorithms based on transport channel matching
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 104
  year: 2024
  ident: b25
  article-title: High-capacity reversible data hiding in encrypted images based on adaptive block coding selection
  publication-title: Journal of Visual Communication and Image Representation
– start-page: 59
  year: 2011
  end-page: 70
  ident: b1
  article-title: ”Break our steganographic system”: The ins and outs of organizing BOSS
  publication-title: International workshop on information hiding
– volume: 7
  start-page: 336
  year: 2021
  end-page: 345
  ident: b27
  article-title: Robust adaptive steganography based on dither modulation and modification with re-compression
  publication-title: IEEE Transactions on Signal and Information Processing over Networks
– volume: 29
  start-page: 594
  issue: 2
  year: 2018
  ident: 10.1016/j.eswa.2025.127598_b23
  article-title: Towards robust image steganography
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
  doi: 10.1109/TCSVT.2018.2881118
– ident: 10.1016/j.eswa.2025.127598_b11
  doi: 10.1145/1597817.1597830
– volume: 238
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b6
  article-title: DSteganoM: Deep steganography for motion capture data
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2023.121955
– volume: 7
  start-page: 336
  year: 2021
  ident: 10.1016/j.eswa.2025.127598_b27
  article-title: Robust adaptive steganography based on dither modulation and modification with re-compression
  publication-title: IEEE Transactions on Signal and Information Processing over Networks
  doi: 10.1109/TSIPN.2021.3081373
– volume: 256
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b13
  article-title: Neural network-based reversible data hiding for medical image
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.124903
– volume: 6
  start-page: 920
  issue: 3
  year: 2011
  ident: 10.1016/j.eswa.2025.127598_b5
  article-title: Minimizing additive distortion in steganography using syndrome-trellis codes
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2134094
– volume: 47
  start-page: 1423
  issue: 4
  year: 2001
  ident: 10.1016/j.eswa.2025.127598_b3
  article-title: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
  publication-title: Institute of Electrical and Electronics Engineers. Transactions on Information Theory
  doi: 10.1109/18.923725
– volume: 37
  start-page: 7703
  issn: 0957-4174
  issue: 12
  year: 2010
  ident: 10.1016/j.eswa.2025.127598_b21
  article-title: BSS: Boosted steganography scheme with cover image preprocessing
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2010.04.071
– volume: 10
  start-page: 219
  issue: 2
  year: 2014
  ident: 10.1016/j.eswa.2025.127598_b8
  article-title: Low-complexity features for JPEG steganalysis using undecimated DCT
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2014.2364918
– volume: 248
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b19
  article-title: Leveraging coverless image steganography to hide secret information by generating anime characters using GAN
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.123420
– volume: 168
  year: 2020
  ident: 10.1016/j.eswa.2025.127598_b28
  article-title: Robust adaptive steganography based on generalized dither modulation and expanded embedding domain
  publication-title: Signal Processing
  doi: 10.1016/j.sigpro.2019.107343
– volume: 16
  start-page: 1117
  year: 2020
  ident: 10.1016/j.eswa.2025.127598_b24
  article-title: Non-additive cost functions for JPEG steganography based on block boundary maintenance
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2020.3029908
– volume: 206
  year: 2023
  ident: 10.1016/j.eswa.2025.127598_b20
  article-title: Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
  publication-title: Signal Processing
– volume: 2014
  start-page: 1
  year: 2014
  ident: 10.1016/j.eswa.2025.127598_b9
  article-title: Universal distortion function for steganography in an arbitrary domain
  publication-title: EURASIP Journal on Information Security
  doi: 10.1186/1687-417X-2014-1
– year: 1977
  ident: 10.1016/j.eswa.2025.127598_b15
– volume: 255
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b14
  article-title: FTPE-BC: Fast thumbnail-preserving image encryption using block-churning
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.124574
– volume: 30
  start-page: 2750
  issue: 8
  year: 2019
  ident: 10.1016/j.eswa.2025.127598_b32
  article-title: Multiple robustness enhancements for image adaptive steganography in lossy channels
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
  doi: 10.1109/TCSVT.2019.2923980
– volume: 249
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b10
  article-title: Learning-based image steganography and watermarking: A survey
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.123715
– volume: 33
  start-page: 4893
  issue: 9
  year: 2023
  ident: 10.1016/j.eswa.2025.127598_b30
  article-title: Robust steganography for high quality images
  publication-title: IEEE Transactions on Circuits and Systems for Video Technology
  doi: 10.1109/TCSVT.2023.3250750
– start-page: 1
  year: 2023
  ident: 10.1016/j.eswa.2025.127598_b16
  article-title: A robust coverless video steganography based on the similarity of inter-frames
  publication-title: IEEE Transactions on Multimedia
– volume: 254
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b33
  article-title: Adaptive reversible data hiding scheme based on difference division interpolation
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.124338
– volume: 254
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b22
  article-title: A survey on deep-learning-based image steganography
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.124390
– start-page: 59
  year: 2011
  ident: 10.1016/j.eswa.2025.127598_b1
  article-title: ”Break our steganographic system”: The ins and outs of organizing BOSS
– volume: 27
  start-page: 455
  issue: 5
  year: 2006
  ident: 10.1016/j.eswa.2025.127598_b17
  article-title: High-performance JPEG steganography using quantization index modulation in DCT domain
  publication-title: Pattern Recognition Letters
  doi: 10.1016/j.patrec.2005.09.008
– volume: 26
  start-page: 299
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b29
  article-title: Upward robust steganography based on overflow alleviation
  publication-title: IEEE Transactions on Multimedia
  doi: 10.1109/TMM.2023.3264628
– volume: 14
  start-page: 1843
  issue: 7
  year: 2018
  ident: 10.1016/j.eswa.2025.127598_b35
  article-title: Improving the robustness of adaptive steganographic algorithms based on transport channel matching
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2018.2885438
– volume: vol. 6505
  start-page: 28
  year: 2007
  ident: 10.1016/j.eswa.2025.127598_b18
  article-title: Merging Markov and DCT features for multi-class JPEG steganalysis
– volume: 77
  start-page: 17913
  year: 2018
  ident: 10.1016/j.eswa.2025.127598_b34
  article-title: Dither modulation based adaptive steganography resisting jpeg compression and statistic detection
  publication-title: Multimedia Tools and Applications
  doi: 10.1007/s11042-017-4506-3
– volume: 104
  issn: 1047-3203
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b25
  article-title: High-capacity reversible data hiding in encrypted images based on adaptive block coding selection
  publication-title: Journal of Visual Communication and Image Representation
  doi: 10.1016/j.jvcir.2024.104291
– volume: 229
  year: 2023
  ident: 10.1016/j.eswa.2025.127598_b4
  article-title: Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2023.120416
– volume: 255
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b7
  article-title: A two-stream-network based steganalysis network: TSNet
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.124796
– volume: 662
  issn: 0020-0255
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b31
  article-title: Conditional image hiding network based on style transfer
  publication-title: Information Sciences
  doi: 10.1016/j.ins.2024.120225
– volume: 249
  issn: 0957-4174
  year: 2024
  ident: 10.1016/j.eswa.2025.127598_b26
  article-title: High invisibility image steganography with wavelet transform and generative adversarial network
  publication-title: Expert Systems with Applications
  doi: 10.1016/j.eswa.2024.123540
– volume: 7
  start-page: 432
  issue: 2
  year: 2011
  ident: 10.1016/j.eswa.2025.127598_b12
  article-title: Ensemble classifiers for steganalysis of digital media
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2011.2175919
– volume: 14
  start-page: 1181
  issue: 5
  year: 2019
  ident: 10.1016/j.eswa.2025.127598_b2
  article-title: Deep residual network for steganalysis of digital images
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2018.2871749
SSID ssj0017007
Score 2.483109
Snippet With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques....
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 127598
SubjectTerms Adaptive error correction
Dither modulation
Overflow
Robust steganography
Social networks
Title Robust steganography with boundary-preserving overflow alleviation and adaptive error correction
URI https://dx.doi.org/10.1016/j.eswa.2025.127598
Volume 281
WOSCitedRecordID wos001474169600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  issn: 0957-4174
  databaseCode: AIEXJ
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0017007
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3LTttAFB2VwKIbyqMVAVrNgl00yG_HywiloqhCqKJVYGPG45lCFNmR40D4e-54Hg6PorJg40SWPXFyTq7vXJ-5B6EDmG_RnHougVSWkkD0XQJpREwykXHucZGIRuX752d8etofjZIzXcqeNXYCcVH0F4tk-q5Qwz4AWy6dfQPcdlDYAe8BdNgC7LD9L-B_ldl8VvcAvb-00A2pVbk1ayyUqnsixa8yRkjBM3w_MSnvetJT5VbhpBq45nTayIp4VZVVj0kXD2ZRHFsFH69q3Q7aLJRbeiTeige4iikXc6sAmjdF2strWU6xDL1QLQ0ur2m5uKHLJQkvtPLVtrYYk8BV9jsmzHrKmkUHStlXXtlPP4vhqpwwPuSzO9kYygsP24MfN8x-ciOz8kKjXBuncoxUjpGqMVbQavPaQauDH8PRiX3gFDtqZb25cr2-SkkBn17JyznMUl5yvoHW9YQCDxQRNtEHXmyhT8asA-vYvY2uFC_wI15giRh-gRfY8AIv8QIDL7DhBW54gVtefEa_vw_Pj46JttcgzPedmnjciZnr8CjIXZ-6QQ4zARb6UcIcFjFIUzNOReQFWUQZzQMfUvuQhtx34P8diyDwv6BOURZ8B2Ev9yMBubl0MJKP0vuCJ7mbSSfrHG4YYRe55gdLme49Ly1QJum_oeqinj1nqjqvvHp0aHBIde6ocsIUaPXKebtv-pQ99LHl-z7q1NWcf0Vr7La-mVXfNKceAFh5lLg
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Robust+steganography+with+boundary-preserving+overflow+alleviation+and+adaptive+error+correction&rft.jtitle=Expert+systems+with+applications&rft.au=Cheng%2C+Yu&rft.au=Luo%2C+Zhenlin&rft.au=Yin%2C+Zhaoxia&rft.date=2025-07-01&rft.issn=0957-4174&rft.volume=281&rft.spage=127598&rft_id=info:doi/10.1016%2Fj.eswa.2025.127598&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_eswa_2025_127598
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon