A deep learning-driven multi-layered steganographic approach for enhanced data security

被引:2
作者
Sanjalawe, Yousef [1 ]
Al-E'mari, Salam [2 ]
Fraihat, Salam [3 ]
Abualhaj, Mosleh [4 ]
Alzubi, Emran [5 ]
机构
[1] Univ Jordan JU, King AbdullahSchool Informat Technol 2, Dept Informat Technol, Amman 11942, Jordan
[2] Univ Petra UoP, Fac Informat Technol, Dept Informat Secur, Amman 11196, Jordan
[3] Ajman Univ, Coll Engn & Informat Technol, Artificial Intelligence Res Ctr AIRC, Ajman, U Arab Emirates
[4] Al Ahliyya Amman Univ, Fac Informat Technol, Dept Networks & Informat Secur, Amman 19328, Jordan
[5] Northern Border Univ NBU, Coll Business Adm, Ar Ar 91431, Saudi Arabia
关键词
Data security; Huffman encoding; Image embedding; Steganography; LSB embedding; IMAGE STEGANOGRAPHY;
D O I
10.1038/s41598-025-89189-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the digital era, ensuring data integrity, authenticity, and confidentiality is critical amid growing interconnectivity and evolving security threats. This paper addresses key limitations of traditional steganographic methods, such as limited payload capacity, susceptibility to detection, and lack of robustness against attacks. A novel multi-layered steganographic framework is proposed, integrating Huffman coding, Least Significant Bit (LSB) embedding, and a deep learning-based encoder-decoder to enhance imperceptibility, robustness, and security. Huffman coding compresses data and obfuscates statistical patterns, enabling efficient embedding within cover images. At the same time, the deep learning encoder adds layer of protection by concealing an image within another. Extensive evaluations using benchmark datasets, including Tiny ImageNet, COCO, and CelebA, demonstrate the approach's superior performance. Key contributions include achieving high visual fidelity with Structural Similarity Index Metrics (SSIM) consistently above 99%, robust data recovery with text recovery accuracy reaching 100% under standard conditions, and enhanced resistance to common attacks such as noise and compression. The proposed framework significantly improves robustness, security, and computational efficiency compared to traditional methods. By balancing imperceptibility and resilience, this paper advances secure communication and digital rights management, addressing modern challenges in data hiding through an innovative combination of compression, adaptive embedding, and deep learning techniques.
引用
收藏
页数:30
相关论文
共 60 条
[1]   Arabic Text Steganography Based on Deep Learning Methods [J].
Adeeb, Omer Farooq Ahmed ;
Kabudian, Seyed Jahanshah .
IEEE ACCESS, 2022, 10 :94403-94416
[2]  
Akhtar Nadeem, 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), P385, DOI 10.1109/CICN.2013.85
[3]  
Al-Husainy MAF, 2012, INT J ADV COMPUT SC, V3, P57
[4]  
Al-Yousuf FQA, 2020, Indonesian Journal of Electrical Engineering and Computer Science, V17, P1053, DOI 10.11591/ijeecs.v17.i2.pp1053-1058
[5]  
Alabdali N., 2021, Int. J. Sci. Eng. Sci, V5, P41
[6]  
Amirtharajan R., 2010, INT J COMPUT APPL, V2, P41
[7]  
Ansari AS, 2020, International Journal of Engineering Research and Technology, V13, P345, DOI [10.37624/ijert/13.2.2020.345-354, 10.37624/IJERT/13.2.2020.345-354, DOI 10.37624/IJERT/13.2.2020.345-354]
[8]   A New Method to Estimate Peak Signal to Noise Ratio for Least Significant Bit Modification Audio Steganography [J].
Azam, Muhammad Harith Noor ;
Ridzuan, Farida ;
Sayuti, M. Norazizi Sham Mohd .
PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2022, 30 (01) :497-511
[9]  
Baluja S, 2017, ADV NEUR IN, V30
[10]   ENCRYPTION IN EDGAR ALLAN POE'S FICTION: A TRANSACTIONAL READING OF SECRET WRITING [J].
Chaouachi, Bessem .
BRITISH AND AMERICAN STUDIES, 2022, 28 :97-104