Robust steganography with boundary-preserving overflow alleviation and adaptive error correction
With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques. However, traditional steganography faces challenges in social networks due to lossy operations such as spatial truncation during JPEG recompression,...
Gespeichert in:
| Veröffentlicht in: | Expert systems with applications Jg. 281; S. 127598 |
|---|---|
| Hauptverfasser: | , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Elsevier Ltd
01.07.2025
|
| Schlagworte: | |
| ISSN: | 0957-4174 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques. However, traditional steganography faces challenges in social networks due to lossy operations such as spatial truncation during JPEG recompression, with limited research on their effects. Existing methods aim to ensure the stability of the quantized coefficients by reducing the effects of spatial truncation. Nevertheless, these approaches may induce notable alterations to image pixels, potentially compromising anti-steganalysis performance. In this study, we analyze the overflow characteristics of spatial blocks and observe that pixel values at the boundaries of spatial blocks are more prone to overflow. Based on this observation, we propose a preprocessing method that performs overflow removal operations according to the actual overflow conditions of spatial blocks, enhancing coefficient stability while minimizing modifications to spatial block boundaries, thereby ensuring image quality. Subsequently, we employ adaptive error correction coding to reduce coding redundancy, thereby augmenting robustness and mitigating its impact on anti-steganalysis performance. The experimental results indicate that the proposed method possesses a strong embedding capacity, maintaining a high level of robustness while enhancing security.
[Display omitted]
•Spatial block boundaries are more prone to overflow in JPEG recompression.•Preprocessing minimizes block modifications, enhancing stability and performance.•Adaptive error correction promptly saves the optimal scheme to enhance performance.•Method demonstrates significant advantages in anti-steganalysis performance. |
|---|---|
| AbstractList | With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques. However, traditional steganography faces challenges in social networks due to lossy operations such as spatial truncation during JPEG recompression, with limited research on their effects. Existing methods aim to ensure the stability of the quantized coefficients by reducing the effects of spatial truncation. Nevertheless, these approaches may induce notable alterations to image pixels, potentially compromising anti-steganalysis performance. In this study, we analyze the overflow characteristics of spatial blocks and observe that pixel values at the boundaries of spatial blocks are more prone to overflow. Based on this observation, we propose a preprocessing method that performs overflow removal operations according to the actual overflow conditions of spatial blocks, enhancing coefficient stability while minimizing modifications to spatial block boundaries, thereby ensuring image quality. Subsequently, we employ adaptive error correction coding to reduce coding redundancy, thereby augmenting robustness and mitigating its impact on anti-steganalysis performance. The experimental results indicate that the proposed method possesses a strong embedding capacity, maintaining a high level of robustness while enhancing security.
[Display omitted]
•Spatial block boundaries are more prone to overflow in JPEG recompression.•Preprocessing minimizes block modifications, enhancing stability and performance.•Adaptive error correction promptly saves the optimal scheme to enhance performance.•Method demonstrates significant advantages in anti-steganalysis performance. |
| ArticleNumber | 127598 |
| Author | Cheng, Yu Yin, Zhaoxia Luo, Zhenlin |
| Author_xml | – sequence: 1 givenname: Yu orcidid: 0009-0005-3128-5613 surname: Cheng fullname: Cheng, Yu email: 10212140443@stu.ecnu.edu.cn – sequence: 2 givenname: Zhenlin orcidid: 0009-0001-3596-8009 surname: Luo fullname: Luo, Zhenlin email: 10212140438@stu.ecnu.edu.cn – sequence: 3 givenname: Zhaoxia orcidid: 0000-0003-0387-4806 surname: Yin fullname: Yin, Zhaoxia email: zxyin@cee.ecnu.edu.cn |
| BookMark | eNp9kD1PwzAQQD0UibbwB5j8BxLsxIkbiQVVfEmVkBDM5mJfWlfBrmw3Vf89DWViYLrh9E733oxMnHdIyA1nOWe8vt3mGA-QF6yocl7IqllMyJQ1lcwEl-KSzGLcMsYlY3JKPt98u4-JxoRrcH4dYLc50oNNG9r6vTMQjtkuYMQwWLemfsDQ9f5Aoe9xsJCsdxScoWBgl-yAFEPwgWofAupxe0UuOugjXv_OOfl4fHhfPmer16eX5f0q02XJUlYgk5ozrIXhJXBhpBS6KutGM13rRtYtQlcXoq1BgxGlYFUFFZasYVJ2QpRzUpzv6uBjDNipXbBfp_cVZ2rsorZq7KLGLurc5QQt_kDaph-pFMD2_6N3ZxRPUoPFoKK26DQaO5or4-1_-Dc7m4VZ |
| CitedBy_id | crossref_primary_10_1016_j_sigpro_2025_110088 |
| Cites_doi | 10.1109/TCSVT.2018.2881118 10.1145/1597817.1597830 10.1016/j.eswa.2023.121955 10.1109/TSIPN.2021.3081373 10.1016/j.eswa.2024.124903 10.1109/TIFS.2011.2134094 10.1109/18.923725 10.1016/j.eswa.2010.04.071 10.1109/TIFS.2014.2364918 10.1016/j.eswa.2024.123420 10.1016/j.sigpro.2019.107343 10.1109/TIFS.2020.3029908 10.1186/1687-417X-2014-1 10.1016/j.eswa.2024.124574 10.1109/TCSVT.2019.2923980 10.1016/j.eswa.2024.123715 10.1109/TCSVT.2023.3250750 10.1016/j.eswa.2024.124338 10.1016/j.eswa.2024.124390 10.1016/j.patrec.2005.09.008 10.1109/TMM.2023.3264628 10.1109/TIFS.2018.2885438 10.1007/s11042-017-4506-3 10.1016/j.jvcir.2024.104291 10.1016/j.eswa.2023.120416 10.1016/j.eswa.2024.124796 10.1016/j.ins.2024.120225 10.1016/j.eswa.2024.123540 10.1109/TIFS.2011.2175919 10.1109/TIFS.2018.2871749 |
| ContentType | Journal Article |
| Copyright | 2025 |
| Copyright_xml | – notice: 2025 |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.eswa.2025.127598 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_eswa_2025_127598 S0957417425012205 |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 62172001 funderid: http://dx.doi.org/10.13039/501100001809 |
| GroupedDBID | --K --M .DC .~1 0R~ 13V 1B1 1RT 1~. 1~5 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9JO AAAKF AABNK AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABFNM ABJNI ABMAC ABMVD ABUCO ACDAQ ACGFS ACHRH ACNTT ACRLP ACVFH ACZNC ADBBV ADCNI ADEZE ADTZH AEBSH AECPX AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AFXIZ AGCQF AGHFR AGRNS AGUBO AGUMN AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALEQD ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APLSM APXCP AXJTR BJAXD BKOJK BLXMC BNPGV BNSAS CS3 DU5 EBS EFJIC EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HAMUX IHE J1W JJJVA KOM LG9 LY1 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 ROL RPZ SDF SDG SDP SDS SES SEW SPC SPCBC SSB SSD SSH SSL SST SSV SSZ T5K TN5 ~G- 29G 9DU AAAKG AAQXK AAYXX ABKBG ABUFD ABWVN ABXDB ACLOT ACNNM ACRPL ADJOM ADMUD ADNMO AGQPQ ASPBG AVWKF AZFZN CITATION EFKBS EFLBG EJD FEDTE FGOYB G-2 HLZ HVGLF HZ~ R2- SBC SET WUQ XPP ZMT ~HD |
| ID | FETCH-LOGICAL-c330t-2e07c10e64d13a14d774c5369c0c6c976beaf624b6acad434055a5e309077f443 |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001474169600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0957-4174 |
| IngestDate | Tue Nov 18 22:29:01 EST 2025 Sat Nov 29 07:54:41 EST 2025 Sat Jun 14 16:54:30 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Adaptive error correction Robust steganography Social networks Dither modulation Overflow |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c330t-2e07c10e64d13a14d774c5369c0c6c976beaf624b6acad434055a5e309077f443 |
| ORCID | 0009-0001-3596-8009 0000-0003-0387-4806 0009-0005-3128-5613 |
| ParticipantIDs | crossref_primary_10_1016_j_eswa_2025_127598 crossref_citationtrail_10_1016_j_eswa_2025_127598 elsevier_sciencedirect_doi_10_1016_j_eswa_2025_127598 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-07-01 |
| PublicationDateYYYYMMDD | 2025-07-01 |
| PublicationDate_xml | – month: 07 year: 2025 text: 2025-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationTitle | Expert systems with applications |
| PublicationYear | 2025 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Holub, Fridrich, Denemark (b9) 2014; 2014 Zeng, Chen, Zhang, Wang, Yu (b30) 2023; 33 Zhang, Sun, Meng (b33) 2024; 254 Filler, Judas, Fridrich (b5) 2011; 6 Kodovsky, Fridrich, Holub (b12) 2011; 7 MacWilliams, Sloane (b15) 1977 (pp. 63–74). Kong, Zhang, Huang, Zhou, Chen, Qin (b13) 2024; 256 Yao, Wang, Chang, Ren, Meng (b26) 2024; 249 Kodovskỳ, J., & Fridrich, J. (2009). Calibration revisited. In Hu, Wang, Ma, Chen, Wang, Wang (b10) 2024; 249 Pevny, Fridrich (b18) 2007; vol. 6505 Zhang, Feng, Xia, Weng, Lu, Chen (b31) 2024; 662 Xiao, Wang, Shen, Yao (b25) 2024; 104 Rehman, Bajwa, Raza, Alfarhood, Safran, Zhang (b19) 2024; 248 Zeng, Chen, Zhang, Wang (b29) 2024; 26 Guo, Sun, Weng, Yu, He (b7) 2024; 255 Noda, Niimi, Kawaguchi (b17) 2006; 27 Sajedi, Jamzad (b21) 2010; 37 Duan, Li, Yin, Zhang, Luo (b4) 2023; 229 Gan, Yau, Gan, Salam, Guo, Chang (b6) 2024; 238 Tao, Li, Zhang, Wang (b23) 2018; 29 Holub, Fridrich (b8) 2014; 10 Song, Wei, Wu, Lin, Zhou (b22) 2024; 254 Wang, Zhang, Li, Yu (b24) 2020; 16 Yu, Chen, Wang, Li, Zhang, Yu (b28) 2020; 168 Meng, Jiang, Sun, Zhao, Xu (b16) 2023 Zhao, Guan, Zhang, Zhao (b35) 2018; 14 Yin, Ke (b27) 2021; 7 Li, Cui, Wang, Zhang, Xiang (b14) 2024; 255 Chen, Wornell (b3) 2001; 47 Zhang, Luo, Guo, Qin, Liu (b32) 2019; 30 Rustad, Andono, Shidik (b20) 2023; 206 Zhang, Zhu, Qin, Yang, Luo (b34) 2018; 77 Boroumand, Chen, Fridrich (b2) 2019; 14 Bas, Filler, Pevnỳ (b1) 2011 Zhang (10.1016/j.eswa.2025.127598_b33) 2024; 254 Kong (10.1016/j.eswa.2025.127598_b13) 2024; 256 Wang (10.1016/j.eswa.2025.127598_b24) 2020; 16 Pevny (10.1016/j.eswa.2025.127598_b18) 2007; vol. 6505 MacWilliams (10.1016/j.eswa.2025.127598_b15) 1977 Zeng (10.1016/j.eswa.2025.127598_b30) 2023; 33 Holub (10.1016/j.eswa.2025.127598_b9) 2014; 2014 Zhang (10.1016/j.eswa.2025.127598_b31) 2024; 662 Zhao (10.1016/j.eswa.2025.127598_b35) 2018; 14 Boroumand (10.1016/j.eswa.2025.127598_b2) 2019; 14 Yao (10.1016/j.eswa.2025.127598_b26) 2024; 249 Chen (10.1016/j.eswa.2025.127598_b3) 2001; 47 Rehman (10.1016/j.eswa.2025.127598_b19) 2024; 248 Guo (10.1016/j.eswa.2025.127598_b7) 2024; 255 Zeng (10.1016/j.eswa.2025.127598_b29) 2024; 26 Yin (10.1016/j.eswa.2025.127598_b27) 2021; 7 Bas (10.1016/j.eswa.2025.127598_b1) 2011 10.1016/j.eswa.2025.127598_b11 Xiao (10.1016/j.eswa.2025.127598_b25) 2024; 104 Hu (10.1016/j.eswa.2025.127598_b10) 2024; 249 Yu (10.1016/j.eswa.2025.127598_b28) 2020; 168 Duan (10.1016/j.eswa.2025.127598_b4) 2023; 229 Gan (10.1016/j.eswa.2025.127598_b6) 2024; 238 Kodovsky (10.1016/j.eswa.2025.127598_b12) 2011; 7 Rustad (10.1016/j.eswa.2025.127598_b20) 2023; 206 Sajedi (10.1016/j.eswa.2025.127598_b21) 2010; 37 Filler (10.1016/j.eswa.2025.127598_b5) 2011; 6 Meng (10.1016/j.eswa.2025.127598_b16) 2023 Holub (10.1016/j.eswa.2025.127598_b8) 2014; 10 Noda (10.1016/j.eswa.2025.127598_b17) 2006; 27 Song (10.1016/j.eswa.2025.127598_b22) 2024; 254 Tao (10.1016/j.eswa.2025.127598_b23) 2018; 29 Li (10.1016/j.eswa.2025.127598_b14) 2024; 255 Zhang (10.1016/j.eswa.2025.127598_b34) 2018; 77 Zhang (10.1016/j.eswa.2025.127598_b32) 2019; 30 |
| References_xml | – volume: 27 start-page: 455 year: 2006 end-page: 461 ident: b17 article-title: High-performance JPEG steganography using quantization index modulation in DCT domain publication-title: Pattern Recognition Letters – volume: 33 start-page: 4893 year: 2023 end-page: 4906 ident: b30 article-title: Robust steganography for high quality images publication-title: IEEE Transactions on Circuits and Systems for Video Technology – volume: 256 year: 2024 ident: b13 article-title: Neural network-based reversible data hiding for medical image publication-title: Expert Systems with Applications – volume: 26 start-page: 299 year: 2024 end-page: 312 ident: b29 article-title: Upward robust steganography based on overflow alleviation publication-title: IEEE Transactions on Multimedia – volume: 249 year: 2024 ident: b10 article-title: Learning-based image steganography and watermarking: A survey publication-title: Expert Systems with Applications – volume: 168 year: 2020 ident: b28 article-title: Robust adaptive steganography based on generalized dither modulation and expanded embedding domain publication-title: Signal Processing – volume: 229 year: 2023 ident: b4 article-title: Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction publication-title: Expert Systems with Applications – volume: 248 year: 2024 ident: b19 article-title: Leveraging coverless image steganography to hide secret information by generating anime characters using GAN publication-title: Expert Systems with Applications – volume: 10 start-page: 219 year: 2014 end-page: 228 ident: b8 article-title: Low-complexity features for JPEG steganalysis using undecimated DCT publication-title: IEEE Transactions on Information Forensics and Security – volume: 14 start-page: 1181 year: 2019 end-page: 1193 ident: b2 article-title: Deep residual network for steganalysis of digital images publication-title: IEEE Transactions on Information Forensics and Security – year: 1977 ident: b15 publication-title: The theory of error-correcting codes – volume: 29 start-page: 594 year: 2018 end-page: 600 ident: b23 article-title: Towards robust image steganography publication-title: IEEE Transactions on Circuits and Systems for Video Technology – volume: vol. 6505 start-page: 28 year: 2007 end-page: 40 ident: b18 article-title: Merging Markov and DCT features for multi-class JPEG steganalysis publication-title: Security, steganography, and watermarking of multimedia contents IX – volume: 77 start-page: 17913 year: 2018 end-page: 17935 ident: b34 article-title: Dither modulation based adaptive steganography resisting jpeg compression and statistic detection publication-title: Multimedia Tools and Applications – volume: 238 year: 2024 ident: b6 article-title: DSteganoM: Deep steganography for motion capture data publication-title: Expert Systems with Applications – volume: 662 year: 2024 ident: b31 article-title: Conditional image hiding network based on style transfer publication-title: Information Sciences – volume: 30 start-page: 2750 year: 2019 end-page: 2764 ident: b32 article-title: Multiple robustness enhancements for image adaptive steganography in lossy channels publication-title: IEEE Transactions on Circuits and Systems for Video Technology – volume: 254 year: 2024 ident: b33 article-title: Adaptive reversible data hiding scheme based on difference division interpolation publication-title: Expert Systems with Applications – start-page: 1 year: 2023 end-page: 16 ident: b16 article-title: A robust coverless video steganography based on the similarity of inter-frames publication-title: IEEE Transactions on Multimedia – volume: 6 start-page: 920 year: 2011 end-page: 935 ident: b5 article-title: Minimizing additive distortion in steganography using syndrome-trellis codes publication-title: IEEE Transactions on Information Forensics and Security – volume: 7 start-page: 432 year: 2011 end-page: 444 ident: b12 article-title: Ensemble classifiers for steganalysis of digital media publication-title: IEEE Transactions on Information Forensics and Security – volume: 254 year: 2024 ident: b22 article-title: A survey on deep-learning-based image steganography publication-title: Expert Systems with Applications – volume: 37 start-page: 7703 year: 2010 end-page: 7710 ident: b21 article-title: BSS: Boosted steganography scheme with cover image preprocessing publication-title: Expert Systems with Applications – volume: 249 year: 2024 ident: b26 article-title: High invisibility image steganography with wavelet transform and generative adversarial network publication-title: Expert Systems with Applications – volume: 16 start-page: 1117 year: 2020 end-page: 1130 ident: b24 article-title: Non-additive cost functions for JPEG steganography based on block boundary maintenance publication-title: IEEE Transactions on Information Forensics and Security – reference: (pp. 63–74). – volume: 206 year: 2023 ident: b20 article-title: Digital image steganography survey and investigation (goal, assessment, method, development, and dataset) publication-title: Signal Processing – reference: Kodovskỳ, J., & Fridrich, J. (2009). Calibration revisited. In – volume: 47 start-page: 1423 year: 2001 end-page: 1443 ident: b3 article-title: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding publication-title: Institute of Electrical and Electronics Engineers. Transactions on Information Theory – volume: 2014 start-page: 1 year: 2014 end-page: 13 ident: b9 article-title: Universal distortion function for steganography in an arbitrary domain publication-title: EURASIP Journal on Information Security – volume: 255 year: 2024 ident: b14 article-title: FTPE-BC: Fast thumbnail-preserving image encryption using block-churning publication-title: Expert Systems with Applications – volume: 255 year: 2024 ident: b7 article-title: A two-stream-network based steganalysis network: TSNet publication-title: Expert Systems with Applications – volume: 14 start-page: 1843 year: 2018 end-page: 1856 ident: b35 article-title: Improving the robustness of adaptive steganographic algorithms based on transport channel matching publication-title: IEEE Transactions on Information Forensics and Security – volume: 104 year: 2024 ident: b25 article-title: High-capacity reversible data hiding in encrypted images based on adaptive block coding selection publication-title: Journal of Visual Communication and Image Representation – start-page: 59 year: 2011 end-page: 70 ident: b1 article-title: ”Break our steganographic system”: The ins and outs of organizing BOSS publication-title: International workshop on information hiding – volume: 7 start-page: 336 year: 2021 end-page: 345 ident: b27 article-title: Robust adaptive steganography based on dither modulation and modification with re-compression publication-title: IEEE Transactions on Signal and Information Processing over Networks – volume: 29 start-page: 594 issue: 2 year: 2018 ident: 10.1016/j.eswa.2025.127598_b23 article-title: Towards robust image steganography publication-title: IEEE Transactions on Circuits and Systems for Video Technology doi: 10.1109/TCSVT.2018.2881118 – ident: 10.1016/j.eswa.2025.127598_b11 doi: 10.1145/1597817.1597830 – volume: 238 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b6 article-title: DSteganoM: Deep steganography for motion capture data publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2023.121955 – volume: 7 start-page: 336 year: 2021 ident: 10.1016/j.eswa.2025.127598_b27 article-title: Robust adaptive steganography based on dither modulation and modification with re-compression publication-title: IEEE Transactions on Signal and Information Processing over Networks doi: 10.1109/TSIPN.2021.3081373 – volume: 256 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b13 article-title: Neural network-based reversible data hiding for medical image publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.124903 – volume: 6 start-page: 920 issue: 3 year: 2011 ident: 10.1016/j.eswa.2025.127598_b5 article-title: Minimizing additive distortion in steganography using syndrome-trellis codes publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2134094 – volume: 47 start-page: 1423 issue: 4 year: 2001 ident: 10.1016/j.eswa.2025.127598_b3 article-title: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding publication-title: Institute of Electrical and Electronics Engineers. Transactions on Information Theory doi: 10.1109/18.923725 – volume: 37 start-page: 7703 issn: 0957-4174 issue: 12 year: 2010 ident: 10.1016/j.eswa.2025.127598_b21 article-title: BSS: Boosted steganography scheme with cover image preprocessing publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2010.04.071 – volume: 10 start-page: 219 issue: 2 year: 2014 ident: 10.1016/j.eswa.2025.127598_b8 article-title: Low-complexity features for JPEG steganalysis using undecimated DCT publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2014.2364918 – volume: 248 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b19 article-title: Leveraging coverless image steganography to hide secret information by generating anime characters using GAN publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.123420 – volume: 168 year: 2020 ident: 10.1016/j.eswa.2025.127598_b28 article-title: Robust adaptive steganography based on generalized dither modulation and expanded embedding domain publication-title: Signal Processing doi: 10.1016/j.sigpro.2019.107343 – volume: 16 start-page: 1117 year: 2020 ident: 10.1016/j.eswa.2025.127598_b24 article-title: Non-additive cost functions for JPEG steganography based on block boundary maintenance publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2020.3029908 – volume: 206 year: 2023 ident: 10.1016/j.eswa.2025.127598_b20 article-title: Digital image steganography survey and investigation (goal, assessment, method, development, and dataset) publication-title: Signal Processing – volume: 2014 start-page: 1 year: 2014 ident: 10.1016/j.eswa.2025.127598_b9 article-title: Universal distortion function for steganography in an arbitrary domain publication-title: EURASIP Journal on Information Security doi: 10.1186/1687-417X-2014-1 – year: 1977 ident: 10.1016/j.eswa.2025.127598_b15 – volume: 255 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b14 article-title: FTPE-BC: Fast thumbnail-preserving image encryption using block-churning publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.124574 – volume: 30 start-page: 2750 issue: 8 year: 2019 ident: 10.1016/j.eswa.2025.127598_b32 article-title: Multiple robustness enhancements for image adaptive steganography in lossy channels publication-title: IEEE Transactions on Circuits and Systems for Video Technology doi: 10.1109/TCSVT.2019.2923980 – volume: 249 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b10 article-title: Learning-based image steganography and watermarking: A survey publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.123715 – volume: 33 start-page: 4893 issue: 9 year: 2023 ident: 10.1016/j.eswa.2025.127598_b30 article-title: Robust steganography for high quality images publication-title: IEEE Transactions on Circuits and Systems for Video Technology doi: 10.1109/TCSVT.2023.3250750 – start-page: 1 year: 2023 ident: 10.1016/j.eswa.2025.127598_b16 article-title: A robust coverless video steganography based on the similarity of inter-frames publication-title: IEEE Transactions on Multimedia – volume: 254 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b33 article-title: Adaptive reversible data hiding scheme based on difference division interpolation publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.124338 – volume: 254 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b22 article-title: A survey on deep-learning-based image steganography publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.124390 – start-page: 59 year: 2011 ident: 10.1016/j.eswa.2025.127598_b1 article-title: ”Break our steganographic system”: The ins and outs of organizing BOSS – volume: 27 start-page: 455 issue: 5 year: 2006 ident: 10.1016/j.eswa.2025.127598_b17 article-title: High-performance JPEG steganography using quantization index modulation in DCT domain publication-title: Pattern Recognition Letters doi: 10.1016/j.patrec.2005.09.008 – volume: 26 start-page: 299 year: 2024 ident: 10.1016/j.eswa.2025.127598_b29 article-title: Upward robust steganography based on overflow alleviation publication-title: IEEE Transactions on Multimedia doi: 10.1109/TMM.2023.3264628 – volume: 14 start-page: 1843 issue: 7 year: 2018 ident: 10.1016/j.eswa.2025.127598_b35 article-title: Improving the robustness of adaptive steganographic algorithms based on transport channel matching publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2018.2885438 – volume: vol. 6505 start-page: 28 year: 2007 ident: 10.1016/j.eswa.2025.127598_b18 article-title: Merging Markov and DCT features for multi-class JPEG steganalysis – volume: 77 start-page: 17913 year: 2018 ident: 10.1016/j.eswa.2025.127598_b34 article-title: Dither modulation based adaptive steganography resisting jpeg compression and statistic detection publication-title: Multimedia Tools and Applications doi: 10.1007/s11042-017-4506-3 – volume: 104 issn: 1047-3203 year: 2024 ident: 10.1016/j.eswa.2025.127598_b25 article-title: High-capacity reversible data hiding in encrypted images based on adaptive block coding selection publication-title: Journal of Visual Communication and Image Representation doi: 10.1016/j.jvcir.2024.104291 – volume: 229 year: 2023 ident: 10.1016/j.eswa.2025.127598_b4 article-title: Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2023.120416 – volume: 255 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b7 article-title: A two-stream-network based steganalysis network: TSNet publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.124796 – volume: 662 issn: 0020-0255 year: 2024 ident: 10.1016/j.eswa.2025.127598_b31 article-title: Conditional image hiding network based on style transfer publication-title: Information Sciences doi: 10.1016/j.ins.2024.120225 – volume: 249 issn: 0957-4174 year: 2024 ident: 10.1016/j.eswa.2025.127598_b26 article-title: High invisibility image steganography with wavelet transform and generative adversarial network publication-title: Expert Systems with Applications doi: 10.1016/j.eswa.2024.123540 – volume: 7 start-page: 432 issue: 2 year: 2011 ident: 10.1016/j.eswa.2025.127598_b12 article-title: Ensemble classifiers for steganalysis of digital media publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2011.2175919 – volume: 14 start-page: 1181 issue: 5 year: 2019 ident: 10.1016/j.eswa.2025.127598_b2 article-title: Deep residual network for steganalysis of digital images publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2018.2871749 |
| SSID | ssj0017007 |
| Score | 2.483109 |
| Snippet | With the rapid evolution of the Internet, the vast amount of data has created opportunities for fostering the development of steganographic techniques.... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 127598 |
| SubjectTerms | Adaptive error correction Dither modulation Overflow Robust steganography Social networks |
| Title | Robust steganography with boundary-preserving overflow alleviation and adaptive error correction |
| URI | https://dx.doi.org/10.1016/j.eswa.2025.127598 |
| Volume | 281 |
| WOSCitedRecordID | wos001474169600001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 issn: 0957-4174 databaseCode: AIEXJ dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0017007 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtZ3Pb9MwFMet0nHgMn6LbQz5wK3K5MR2fhynaYgBmhAM1O0SHMdmq6qkStOu_Pc8x3ZaxjQBEpeoimIn9cd6-ubl_UDotdYllaqMAyFYFjDOVVBEhAYyArGhMsVJ1wzm64fk9DQdj7OPg8F7nwuznCZVla5W2ey_ooZzANukzv4F7n5SOAG_ATocATsc_wj8p7pYzNsR0PsuKleQ2rpbi66FUvMjMMGvxkaYgGf4f3paX49MT5Wl5WQLuJZi1oUVqaapm5E0XTxkT3HSR_CppnXloH2i3MYn8XXwgLI25XzRRwAtOiftxaVxp_Q79NyWNLi4FPXqSmy6JCLeh686P5nPlVkHJlmHYxKw0Pbk8bY3sv1afrPj1qUwOVDza1McKuIHphC97Vd9oz72ZzOxmRfEXGjShu-hre7aIdo6PDkev-s_KiXEZs_7B3E5VDbc7-adbtcpG9rj7BHadi8N-NDCfowGqnqCHvqGHNjZ56fom2WPf2GPDRV8C3vs2eMN9hjYY88ed-zxmv0z9OXN8dnR28C10AgkpaQNIkUSGRIVszKkImQlqH3JaZxJImMJUrRQQscRK2IhRckoyHcuuKIkI0miGaPP0bCqK_UCYSGyNDVeS001o5oXRIHWTyXjQkcgondQ6Bcsl66-vGlzMs19IOEkN4ucm0XO7SLvoFE_Zmarq9x5NfcccqcPre7LYdvcMW73H8ftoQfr3f0SDdtmofbRfblsr-bNK7e7fgJL_5A0 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Robust+steganography+with+boundary-preserving+overflow+alleviation+and+adaptive+error+correction&rft.jtitle=Expert+systems+with+applications&rft.au=Cheng%2C+Yu&rft.au=Luo%2C+Zhenlin&rft.au=Yin%2C+Zhaoxia&rft.date=2025-07-01&rft.pub=Elsevier+Ltd&rft.issn=0957-4174&rft.volume=281&rft_id=info:doi/10.1016%2Fj.eswa.2025.127598&rft.externalDocID=S0957417425012205 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0957-4174&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0957-4174&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0957-4174&client=summon |