Deep learning approach and cover image transportation: a multi-security adaptive image steganography scheme

被引:1
作者
Sultan, Laman R. [1 ]
机构
[1] Southern Tech Univ, Basra Tech Inst, Dept Power Mech, Al Basrah, Iraq
关键词
Information hiding; image steganography; edge detection; Knight tour; RSA; Huffman;
D O I
10.1080/23080477.2023.2239611
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this era of information security and communication, a major priority is the achievement of a robust and secure steganography system when thinking about information concealment. The development of such an information-hiding scheme demands that the scheme be able to hide a secret message within the cover media. The most vexing issues in existing steganography protocols are imperceptibility, security, and capacity, and researchers have frequently emphasized a trade-off between these issues. Scholars have consistently ignored the balance between security and payload because resolving one problem has been shown to have an impact on the other, and vice versa. To overcome these problems, an effective method known as the Conventional Neural Network based Edge Detection Method (CNN-EDM) has been presented for image steganography in this study. The CNN-EDM is used to improve the contributions of the proposed scheme. Four main stages were used to achieve the objectives in this research, beginning with the cover image and secret image preparation, followed by embedding, and culminating in extraction. The last stage is the evaluation stage, which employs several evaluations to benchmark the obtained results. A standard database from the Signal and Image Processing Institute (SIPI) containing color and grayscale images with 512 x 512 pixels was utilized in this study. Different parameters were used to test the performance of the suggested scheme based on security and imperceptibility (image quality). The image quality was evaluated using three important metrics: histogram analysis, peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM). Furthermore, two metrics were used to evaluate the security properties of the proposed system: the Human Visual System (HVS) and Chi-square (X2) attacks. The evaluations showed that the proposed scheme can enhance the capacity, invisibility, and security features and address the already existing problems in this domain.
引用
收藏
页码:677 / 694
页数:18
相关论文
共 29 条
  • [1] Efficient High Capacity Steganography Technique
    Abdulla, Alan Anwer
    Jassim, Sabah A.
    Sellahewa, Harin
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [2] Alsaffawi ZSY., 2016, J AL QADISIYAH COMPU, V8, P1
  • [3] Das A., ARXIV
  • [4] Dube RR., 2016, INT J SCI RES, V5, P1976, DOI DOI 10.21275/V5I6.NOV164686
  • [5] A PVD based high capacity steganography algorithm with embedding in non-sequential position
    Mukherjee, Nabanita
    Paul, Goutam
    Saha, Sanjoy Kumar
    Burman, Debanjan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 13449 - 13479
  • [6] High payload image steganography based on Laplacian of Gaussian (LoG) edge detector
    Ghosal, S. K.
    Mandal, J. K.
    Sarkar, R.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 30403 - 30418
  • [7] Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing
    Gutub, Adnan
    Al-Ghamdi, Maimoona
    [J]. 3D RESEARCH, 2019, 10 (01):
  • [8] Hameed RS., 2022, INT J ADV COMPUT SC, V13, DOI [10.14569/IJACSA.2022.0130814, DOI 10.14569/IJACSA.2022.0130814]
  • [9] Adaptive block-based pixel value differencing steganography
    Hosam, Osama
    Ben Halima, Nadhir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5036 - 5050
  • [10] Image steganography in spatial domain: A survey
    Hussain, Mehdi
    Wahab, Ainuddin Wahid Abdul
    Bin Idris, Yamani Idna
    Ho, Anthony T. S.
    Jung, Ki-Hyun
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 : 46 - 66