161 research outputs found
Deep Learning for Reversible Steganography: Principles and Insights
Deep-learning\textendash{centric} reversible steganography has emerged as a
promising research paradigm. A direct way of applying deep learning to
reversible steganography is to construct a pair of encoder and decoder, whose
parameters are trained jointly, thereby learning the steganographic system as a
whole. This end-to-end framework, however, falls short of the reversibility
requirement because it is difficult for this kind of monolithic system, as a
black box, to create or duplicate intricate reversible mechanisms. In response
to this issue, a recent approach is to carve up the steganographic system and
work on modules independently. In particular, neural networks are deployed in
an analytics module to learn the data distribution, while an established
mechanism is called upon to handle the remaining tasks. In this paper, we
investigate the modular framework and deploy deep neural networks in a
reversible steganographic scheme referred to as prediction-error modulation, in
which an analytics module serves the purpose of pixel intensity prediction. The
primary focus of this study is on deep-learning\textendash{based} context-aware
pixel intensity prediction. We address the unsolved issues reported in related
literature, including the impact of pixel initialisation on prediction accuracy
and the influence of uncertainty propagation in dual-layer embedding.
Furthermore, we establish a connection between context-aware pixel intensity
prediction and low-level computer vision and analyse the performance of several
advanced neural networks
A combination of least significant bit and deflate compression for image steganography
Steganography is one of the cryptography techniques where secret information can be hidden through multimedia files such as images and videos. Steganography can offer a way of exchanging secret and encrypted information in an untypical mechanism where communicating parties can only interpret the secret message. The literature has shown a great interest in the least significant bit (LSB) technique which aims at embedding the secret message bits into the most insignificant bits of the image pixels. Although LSB showed a stable performance of image steganography yet, many works should be done on the message part. This paper aims to propose a combination of LSB and Deflate compression algorithm for image steganography. The proposed Deflate algorithm utilized both LZ77 and Huffman coding. After compressing the message text, LSB has been applied to embed the text within the cover image. Using benchmark images, the proposed method demonstrated an outperformance over the state of the art. This can proof the efficacy of using Deflate as a data compression prior to the LSB embedding
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Data hiding is the process of embedding information into a noise-tolerant
signal such as a piece of audio, video, or image. Digital watermarking is a
form of data hiding where identifying data is robustly embedded so that it can
resist tampering and be used to identify the original owners of the media.
Steganography, another form of data hiding, embeds data for the purpose of
secure and secret communication. This survey summarises recent developments in
deep learning techniques for data hiding for the purposes of watermarking and
steganography, categorising them based on model architectures and noise
injection methods. The objective functions, evaluation metrics, and datasets
used for training these data hiding models are comprehensively summarised.
Finally, we propose and discuss possible future directions for research into
deep data hiding techniques
Enhancing steganography for hiding pixels inside audio signals
Multimodal steganography consists of concealing a signal into another one of a different medium, such that the latter is only very slightly distorted and the hidden information can be later recovered. A previous work employed deep learning techniques to this end by hiding an image inside an audio signal's spectrogram in a way that the encoding of one is independent of the other. In this work we explore the way in which images were being encoded previously and present a collection of improvements that produce a significant increase in the quality of the system. These mainly consist in encoding the image in a smarter way such that more information is able to be transmitted in a container of the same size. We also explore the possibility of using the short-time Fourier transform phase as an alternative to the magnitude and to randomly permute the signal to break the structure of the noise. Finally, we report results when using a larger container signal and outline possible directions for future work
A New Steganography Algorithm Using Hybrid Fuzzy Neural Networks
AbstractIn recent years, image steganography has been one of the emerging research areas. As the field of information technology is advancing, the need of information security is increasing day by day. Steganography is a widely used communication method in today's scenario which involves sending secret information in appropriate carriers. Since it have an interesting property of concealing the message as well as the existence of the message, steganography is on its evolutionary path to unearth new platforms. As the field of steganalysis is growing exponentially, the need of developing strong steganographic algorithms is also growing. Since the use of steganography is spreading across various fields, the goal of increasing the embedding capacity, security and image quality is being major concerns. We propose a new image steganographic method which is based on random selection of pixels for secret data embedding and post processing the stego-image using Hybrid Fuzzy Neural Networks. The pixels where secret data is to be embedded is selected randomly using a pseudo random key. In the selected pixels the last 2 or 3 bits are used for hiding. The resultant degradation in the quality of stego-image is handled by an efficient pixel adjustment process with the use of fuzzy neural networks.. The experimental results reveal that this method can achieve an embedding capacity of 3 bits per byte with excellent stego-image quality and high imperceptibility
Hide text depending on the three channels of pixels in color images using the modified LSB algorithm
At the moment, with the great development of information and communications technology, the transfer of confidential and sensitive data through public communications such as the Internet is very difficult to keep them from hackers and attackers. Therefore, it is necessary to work on the development of new and innovative ways to transfer such information and protect it to ensure that it reaches the desired goal. The goal of a new technique to hide information design not only hides the secret message behind the center cover, but it also provides increased security. The most common way to transfer important and confidential data is through embedding it into cover medium files in a way that does not affect the accuracy of the carrier file, which is known as hiding. In this paper, encryption and concealment techniques were used to protect data transferred from attackers. The proposed method relied on encryption of confidential information using the encryption key and the Xnor gate, after which the encrypted information was hidden in a color image using the LSB algorithm. The method of concealment depends on the extraction of chromatic channels of three RGB for each pixel and specifying the channel in which the bit of the encryption message will be hidden. Some metrics have been adopted to measure the quality of the resulting picture after hiding as PSNR and MSE, and achieve good results
Towards Blind Watermarking: Combining Invertible and Non-invertible Mechanisms
Blind watermarking provides powerful evidence for copyright protection, image
authentication, and tampering identification. However, it remains a challenge
to design a watermarking model with high imperceptibility and robustness
against strong noise attacks. To resolve this issue, we present a framework
Combining the Invertible and Non-invertible (CIN) mechanisms. The CIN is
composed of the invertible part to achieve high imperceptibility and the
non-invertible part to strengthen the robustness against strong noise attacks.
For the invertible part, we develop a diffusion and extraction module (DEM) and
a fusion and split module (FSM) to embed and extract watermarks symmetrically
in an invertible way. For the non-invertible part, we introduce a
non-invertible attention-based module (NIAM) and the noise-specific selection
module (NSM) to solve the asymmetric extraction under a strong noise attack.
Extensive experiments demonstrate that our framework outperforms the current
state-of-the-art methods of imperceptibility and robustness significantly. Our
framework can achieve an average of 99.99% accuracy and 67.66 dB PSNR under
noise-free conditions, while 96.64% and 39.28 dB combined strong noise attacks.
The code will be available in https://github.com/rmpku/CIN.Comment: 9 pages, 9 figures, 5 table
Lagrangian Recurrent Steganalysis and Hyper Elliptic Certificateless Signcryption for Secure Image Transmission
Present-day evolution in communication and information technology dispenses straightforward and effortless access to data, but the most noteworthy condition is the formation of secure communication. Numerous approaches were designed for safety communication. One of the crucial approaches is image steganography. Moreover, provisioning of information security services is arrived at via cryptosystems where cryptosystems make certain the secure messages transmission between the users in an untrustworthy circumstance. The conventional method of providing encryption and signature is said to be first signing and then encryption, but both the computation and communication costs are found to be high. A certificateless signcryption mechanism is designed to transfer the medical data or images securely. This mechanism will minimize the storage and verification costs of public key certificates. The author of this article proposes a method named Lagrangian recurrent Steganalysis and Hyper Elliptic Certificateless Signcryption for transferring the medical data or images securely. In two sections the LRS-HECS method is split. They are medical image steganalysis and certificateless signcryption. First with the Chest X-Ray images obtained as input, a Codeword Correlated Lagrangian Recurrent Neural Network-based image steganography model is applied to generate steg images. Second, to transfer the medical images securely the steg images provided as input is designed a model named a Hyper Elliptic Curve-based Certificateless Signcryption. The issue of providing the integrity and validity of the transmitted medical images and receiver anonymity is addressed by the application of Hyper Elliptic Curve. Chest X-Ray pictures were used in experimental simulations, and the findings showed that the LRS-HECS approach had more advantages over existing state-of-the-art methods in terms of higher peak signal to noise ratio with data integrity and with reduced encryption time and transmission cost
Pixinwav: Residual steganography for hiding pixels in audio
Steganography comprises the mechanics of hiding data in a host media that may be publicly available. While previous works focused on unimodal setups (e.g., hiding images in images, or hiding audio in audio), PixInWav targets the multimodal case of hiding images in audio. To this end, we propose a novel residual architecture operating on top of short-time discrete cosine transform (STDCT) audio spectrograms. Among our results, we find that the residual steganography setup we propose allows an encoding of the hidden image that is independent from the host audio without compromising quality. Accordingly, while previous works require both host and hidden signals to hide a signal, PixInWav can encode images offline—which can be later hidden, in a residual fashion, into any audio signal.Work partially supported by the European Union through the Erasmus+ student mobility program, Science Foundation Ireland (SFI) under grant numbers SFI/15/SIRG/3283 and SFI/12/RC/2289 P2, and the Spanish Research Agency (AEI) under project PID2020117142GB-I00 of the call MCIN/ AEI /10.13039/501100011033.Peer ReviewedPostprint (author's final draft
- …