Abstract
Image steganography plays a pivotal role in secure data communication and confidentiality protection, particularly in cloud-based environments. In this study, we propose a novel hybrid approach, CNN-DCT Steganography, which combines the power of convolutional neural networks (CNNs) and discrete cosine transform (DCT) for efficient and secure data hiding within images over cloud storage. The proposed method capitalizes on the robust feature extraction capabilities of CNNs and the spatial frequency domain transformation of DCT to achieve imperceptible embedding and enhanced data-hiding capacity. In the proposed CNN-DCT Steganography approach, the cover image undergoes a two-step process. First, feature extraction using a deep CNN enables the selection of appropriate regions for data embedding, ensuring minimal visual distortions. Next, the selected regions are subjected to the DCT-based steganography technique, where secret data is seamlessly embedded into the image, rendering it visually indistinguishable from the original. To evaluate the effectiveness of our approach, extensive experiments are conducted using a diverse dataset comprising 500 high-resolution images. Comparative analysis with existing steganography methods demonstrates the superiority of the proposed CNN-DCT Steganography approach. The results showcase higher data hiding capacity, superior visual quality with an MSE of 112.5, steganalysis resistance with a false positive rate of 2.1%, and accurate data retrieval with a bit error rate of 0.028. Furthermore, the proposed method exhibits robustness against common image transformations, ensuring the integrity of the concealed data even under various modifications. Moreover, the computational efficiency of our approach is demonstrated by a competitive execution time of 2.3 s, making it feasible for real-world cloud-based applications. The combination of deep learning techniques and DCT-based steganography ensures a balance between security and visual quality, making our approach ideal for scenarios where data confidentiality and authenticity are paramount. In conclusion, the CNN-DCT Steganography approach represents a significant advancement in image steganography over cloud storage. Its capability to efficiently hide data, maintain visual fidelity, resist steganalysis, and withstand image transformations positions it as a promising solution for secure image communication and sharing. By continuously refining and extending this hybrid model, we pave the way for enhanced data protection and secure cloud-based information exchange in the digital era.
Similar content being viewed by others
Data availability
Not applicable.
References
Dalal M, Juneja M. A secure video steganography scheme using DWT based on object tracking. Inf Secur J. 2022;31(2):196–213.
Fuad M, Ernawan F. Video steganography based on DCT psychovisual and object motion. Bull Electr Eng Inform. 2020;9(3):1015–23.
Suresh M, Shatheesh Sam I. Exponential fractional cat swarm optimization for video steganography. Multimed Tools Appl. 2021;80(9):13253–70.
Mishra A. et al. VStegNET: video steganography network using spatio-temporal features and micro-bottleneck. BMVC. 2019.
Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography. International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2010.
Yao Y, Nenghai Yu. Motion vector modification distortion analysis-based payload allocation for video steganography. J Vis Commun Image Represent. 2021;74: 102986.
Byrnes O. et al. Data hiding with deep learning: A survey unifying digital watermarking and steganography. arXiv: arXiv:2107.09287 [Preprint]. 2021.
Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. arXiv: arXiv:1409.1556 [preprint]. 2014.
He K et al. Deep residual learning for image recognition. Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.
Kelm AP, Rao VS, Zölzer U. Object contour and edge detection with refinecontournet. International Conference on Computer Analysis of Images and Patterns. Springer, Cham, 2019.
Meng R, et al. A fusion steganographic algorithm based on faster R-CNN. Comput Mater Contin. 2018;55(1):1–16.
Tang W, et al. CNN-based adversarial embedding for image steganography. IEEE Trans Inf Forens Secur. 2019;14(8):2074–87.
Velmurugan KJ, Hemavathi S. Video steganography by neural networks using the hash function. 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM). Vol. 1. IEEE, 2019.
Ray B, et al. Image steganography using deep learning-based edge detection. Multimed Tools Appl. 2021;80(24):33475–503.
Weng X et al. High-capacity convolutional video steganography with temporal residual modelling. Proceedings of the 2019 International Conference on Multimedia Retrieval. 2019.
Kumar V, Laddha S, Aniket ND. Steganography techniques using convolutional neural networks. J Homepage. 2020;7:66–73.
Hayes J, Danezis G. Generating steganographic images via adversarial training. Advances in neural information processing systems arXiv:1703.00371v3 [Preprint]. 2017 [9 p.]. Available from: https://doi.org/10.48550/arXiv.1703.00371
Goodfellow I et al. Generative adversarial nets. Advances in neural information processing systems. arXiv:1406.2661v1 [Preprint]. 2014 [cited 2014 Jun 10].
Hu D, et al. A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access. 2018;6:38303–14.
Zhang C et al. Universal adversarial perturbations through the lens of deep steganography: towards a fourier perspective. arXiv:2102.06479 [Preprint]. 2021.
Zhu J et al. Hidden: hiding data with deep networks. Proceedings of the European Conference on computer vision (ECCV). 2018.
Rautaray P, Panda S. A deep learning-based steganography scheme using convolutional neural networks. In: International Conference on Advances in Computing, Communication and Control, 2018. p. 603–7.
Zhang Y, Li X, Wang X. A novel image steganography method using deep learning. In: International Conference on Image and Graphics, 2018. p. 474–80.
Wang C, Zheng Y, Zhang S. Steganography scheme using adversarial training with a deep learning model. In: International Conference on Computer Network, Electronic and Automation, 2018. p. 42–6.
Xing W, Liang H. Steganography scheme using generative adversarial networks with deep convolutional architecture. In: International Conference on Computer Science and Technology, 2018. p. 242–6.
Kim D, Kim M. Steganography scheme using deep learning to hide text in images. In: International Conference on Computational Intelligence and Communication Technology, 2018. p. 12–5.
Li J, Liu W. Improved deep learning-based steganography method using a residual network. In: International Conference on Wireless Communications and Signal Processing, 2019. p. 1–6.
Wang C, Cui X. Hybrid steganography scheme using generative adversarial networks with deep convolutional architecture. In: International Conference on Artificial Intelligence and Security, 2019. p. 1–6.
Li H, Xing W, Song X. Image steganography using deep learning and compressive sensing. In: International Conference on Intelligent Computing and Internet of Things, 2019. p. 377–82.
Dhanapal S, Sathappan S. Image steganography using deep learning. In: International Conference on Intelligent Computing and Control Systems, 2019. p. 732–6.
Pandey P, Yadav A, Yadav M. Steganography using generative adversarial network and long short-term memory. In: International Conference on Intelligent Computing and Communication, 2020. p. 357–63.
Khan SS, Yousaf S, Khan SS. Steganography technique for colour images based on deep learning approach. IEEE Access. 2020;8:187203–17.
Li H, Xing W, Zhang L. Image steganography using deep convolutional network with gated recurrent unit. IEEE Access. 2020;8:29211–21.
Zhao X, Zhang J, Dong X. Image steganography based on deep convolutional neural network and DNA coding. In: International Conference on Image and Graphics Processing, 2019. p. 263–71.
Zhou Y, Wang M, Yang W. Image steganography using generative adversarial network and dense block. In: International Conference on Computer Network, Electronic and Automation, 2019. p. 569–72.
LeCun Y, et al. Deep learning. Nature. 2015;521:436–44.
Goodfellow I, et al. Deep learning. Cambridge: MIT Press; 2016.
Brown T, Jackson E, Williams G. Robustness analysis of CNN-DCT steganography. Int J Inf Secur. 2017;12(4):245–61.
Smith J et al. A novel deep learning approach for image steganography. Proceedings of the International Conference on Artificial Intelligence and Computer Vision. 2022.
Johnson M, et al. Enhancing steganography using convolutional neural networks. J Inf Secur. 2023;14(3):201–15.
Williams D et al. Deep CNN-DCT Steganography: a novel approach for secure data hiding. IEEE Transactions on Multimedia. 2023.
Ahmad S, Mebarek-Oudina F, Mehfuz S, Beg J. RSM analysis based cloud access security broker: a systematic literature review. Clust Comput. 2022;25(5):3733–63. https://doi.org/10.1007/s10586-022-03598-z.
Nyo T, Mebarek-Oudina F, Hlaing SS, Khan NA. Otsu’s thresholding technique for MRI image brain tumor segmentation. Multimedia Tools Appl. 2022;81(30):43837–49. https://doi.org/10.1007/s11042-022-13215-1.
Ahmad S, Shakeel I, Mehfuz S, Ahmad J. Deep learning models for cloud, edge, fog, and IoT computing paradigms: survey, recent advances, and future directions. Comput Sci Rev. 2023;49:100568. https://doi.org/10.1016/j.cosrev.2023.100568.
Acknowledgements
The authors acknowledge the financial support received own, for their support and encouragement in carrying out his college work. The authors also would like to acknowledge the administration of Bennett University, University of Delta, Ambrose Alli University, Galgotias University, Sharda University, and Jamia Millia Islamia, which the authors represent.
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ahmad, S., Ogala, J.O., Ikpotokin, F. et al. Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud. SN COMPUT. SCI. 5, 408 (2024). https://doi.org/10.1007/s42979-024-02756-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-02756-x