Convolutional Neural Network Based Data Security in Image Steganography

International Journal of Electrical and Electronics Engineering
© 2023 by SSRG - IJEEE Journal
Volume 10 Issue 7
Year of Publication : 2023
Authors : Sriram K. V, R. H. Havaldar
pdf
How to Cite?

Sriram K. V, R. H. Havaldar, "Convolutional Neural Network Based Data Security in Image Steganography," SSRG International Journal of Electrical and Electronics Engineering, vol. 10,  no. 7, pp. 102-109, 2023. Crossref, https://doi.org/10.14445/23488379/IJEEE-V10I7P109

Abstract:

Steganography has made significant progress in recent years but struggles with various obstacles and hurdles. Image steganography refers to the technique of maintaining privacy under a cover picture. This data might take the shape of words, pictures, or videos. This research offers a compact, simple, and fully convolutional design to incorporate a hidden picture within a cover picture and to recover the contained hidden picture from the input image. The paper bases its proposal on an in-depth learning approach and picture-based general steganography techniques. The proposed method uses Convolutional Neural Network (CNN) based steganography to hide the secret information and steganalysis to recover the secret information. Also, it focuses on performance metrics like Peak Signal Noise Ratio (PSNR), Universal Image Quality Index (UQI) and Spatial Correlation Co-efficient (SCC). The outcomes of the experiments have shown that the presented scheme has superior outcomes in terms of concealing capability, confidentiality and resilience and interpretability compared to previous deep-learning picture steganographic techniques.

Keywords:

Steganography, Deep learning, Convolutional Neural Network, Peak Signal Noise Ratio, Universal Image Quality Index, Spatial Correlation Co-efficient.

References:

[1] Zulfiqar Ali Solangi et al., “The Future of Data Privacy and Security Concerns in Internet of Things,” 2018 IEEE International Conference on Innovative Research and Development (ICIRD), pp. 1-4, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] C. Sushama, M. Sunil Kumar, and P. Neelima, “Privacy and Security Issues in the Future: A Social Media,” Materials Today: Proceedings, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Dhuha Khalid Alferidah, and N. Z. Jhanjh, “A Review on Security and Privacy Issues and Challenges in Internet of Things,” International Journal of Computer Science Network Security (IJCSNS), vol. 20, no. 4, pp. 263-286, 2020.
[Google Scholar] [Publisher Link]
[4] Mirza Abdur Razzaq et al., “Digital Image Security: Fusion of Encryption, Steganography and Watermarking,” International Journal of Advanced Computer Science Applications, vol. 8, no. 5, pp. 224-228, 2017.
[Google Scholar] [Publisher Link]
[5] Anirban Sengupta, Secured Hardware Accelerators for DSP and Image Processing Applications, Institution of Engineering and Technology, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Donghui Hu et al., “A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks,” IEEE Access, vol. 6, pp. 38303-38314, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Stuti Goel, Arun Rana, and Manpreet Kaur, “A Review of Comparison Techniques of Image Steganography,” Global Journal of Computer Science Technology Graphics and Vision, vol. 13, no. 4, pp. 8-14, 2013.
[Google Scholar] [Publisher Link]
[8] Jessica Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge University Press, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Andreas Westfeld, “F5-A Steganographic Algorithm,” IH 2001: Information Hiding, Pittsburgh, PA, USA, pp. 289-302, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Xinpeng Zhang, and Shuozhong Wang, “Efficient Steganographic Embedding by Exploiting Modification Direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Hao-tian Wu, and Jiwu Huang, “Secure JPEG Steganography by LSB+ Matching and Multi-Band Embedding,” 2011 18th IEEE International Conference on Image Processing, pp. 2737-2740, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Nandhini Subramanian et al., “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409-23423, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Ru Zhang, Shiqi Dong, and Jianyi Liu, “Invisible Steganography via Generative Adversarial Networks,” Multimedia Tools and Applications, vol. 78, no. 7, pp. 8559-8575, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Jia Liu et al., “Recent Advances of Image Steganography with Generative Adversarial Networks,” IEEE Access, vol. 8, pp. 60575- 60597, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Denis Volkhonskiy, Ivan Nazarov, and Evgeny Burnaev, “Steganographic Generative Adversarial Networks,” Twelfth International Conference on Machine Vision (ICMV 2019), Amsterdam, Netherlands, vol. 11433, pp. 991-1005, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Xintao Duan et al., “Reversible Image Steganography Scheme Based on a U-Net Structure,” IEEE Access, vol. 7, pp. 9314-9323, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Tomáš Filler, Jan Judas, and Jessica Fridrich, “Minimizing Additive Distortion in Steganography using Syndrome-Trellis Codes,” IEEE Transactions on Information Forensics Security, vol. 6, no. 3, pp. 920-935, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Linjie Guo et al., “Using Statistical Image Model for JPEG Steganography: Uniform Embedding Revisited,” IEEE Transactions on Information Forensics Security, vol. 10, no. 12, pp. 2669-2680, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Weiming Zhang et al., “Decomposing Joint Distortion for Adaptive Steganography,” IEEE Transactions on Circuits Systems for Video Technology, vol. 27, no. 10, pp. 2274-2280, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Nikhil Patel, and Shweta Meena, “LSB Based Image Steganography using Dynamic Key Cryptography,” 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), pp. 1-5, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Shruti Sekra, Samta Balpande, and Karishma Mulani, “Steganography using Genetic Encryption along with Visual Cryptography,” SSRG International Journal of Computer Science and Engineering, vol. 2, no. 1, pp. 1-5, 2015.
[Google Scholar] [Publisher Link]
[22] Anqi Qiu et al., “Coverless Image Steganography Method Based on Feature Selection,” Journal of Information Hiding Privacy Protection, vol. 1, no. 2, pp. 49-60, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] B. A. Usha et al., “Cognitive Prediction of the Most Appropriate Image Steganography Approach,” International Journal of Computer Applications, vol. 121, no. 8, pp. 42-45, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Chenggong Zhang et al., “Compressive Optical Steganography via Single-Pixel Imaging,” Optics Express, vol. 27, no. 9, pp. 13469- 13478, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[25] N. F. Johnson, and S. Jajodia, “Steganalysis: The Investigation of Hidden Information,” 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No. 98EX228), pp. 113-116, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[26] P. Karthiga Lakshmi, “An Efficient Data Hiding Technique for Steganography,” International Journal of P2P Network Trends and Technology (IJPTT), vol. 4, no. 1, pp. 17-20, 2014.
[Publisher Link]
[27] Jiong Si, Sarah L. Harris, and Evangelos Yfantis, “A Dynamic ReLU on Neural Network,” 2018 IEEE 13th Dallas Circuits and Systems Conference (DCAS), pp. 1-6, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Lakshmanan Nataraj, Anindya Sarkar, and B. S. Manjunath, “Improving Re-Sampling Detection by Adding Noise,” Media Forensics and Security II, San Jose, California, United States, vol. 7541, pp. 177-187, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Zijun Zhang, “Improved Adam Optimizer for Deep Neural Networks,” 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), pp. 1-2, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Umme Sara, Morium Akter, and Mohammad Shorif Uddin, “Image Quality Assessment through FSIM, SSIM, MSE and PSNR-A Comparative Study,” Journal of Computer Communications, vol. 7, no. 3, pp. 8-18, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Atique Ur Rehman et al., “End-to-End Trained CNN Encoder-Decoder Networks for Image Steganography,” Computer Vision – ECCV 2018 Workshops, pp. 723-729, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Yogesh Kumar Sharma, Amit Mishra, and Amit Sharma, “An Advanced Approach for Image Steganography Method,” International Journal of Computer and Organization Trends, vol. 9, no. 4, pp. 1-4, 2019.
[CrossRef] [Publisher Link]
[33] Nandhini Subramanian et al., “End-to-End Image Steganography using Deep Convolutional Autoencoders,” IEEE Access, vol. 9, pp. 135585-135593, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Zhou Wang, and A. C. Bovik, “A Universal Image Quality Index,” IEEE Signal Processing Letters, vol. 9, no. 3, pp. 81-84, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[35] J. Zhou, D. L. Civco, and J. Silander, “A Wavelet Transform Method to Merge Landsat TM and SPOT Panchromatic Data,” International Journal of Remote Sensing, vol. 19, no. 4, pp. 743-757, 1998.
[CrossRef] [Google Scholar] [Publisher Link]