Skip to main content
Log in

Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Image steganography plays a pivotal role in secure data communication and confidentiality protection, particularly in cloud-based environments. In this study, we propose a novel hybrid approach, CNN-DCT Steganography, which combines the power of convolutional neural networks (CNNs) and discrete cosine transform (DCT) for efficient and secure data hiding within images over cloud storage. The proposed method capitalizes on the robust feature extraction capabilities of CNNs and the spatial frequency domain transformation of DCT to achieve imperceptible embedding and enhanced data-hiding capacity. In the proposed CNN-DCT Steganography approach, the cover image undergoes a two-step process. First, feature extraction using a deep CNN enables the selection of appropriate regions for data embedding, ensuring minimal visual distortions. Next, the selected regions are subjected to the DCT-based steganography technique, where secret data is seamlessly embedded into the image, rendering it visually indistinguishable from the original. To evaluate the effectiveness of our approach, extensive experiments are conducted using a diverse dataset comprising 500 high-resolution images. Comparative analysis with existing steganography methods demonstrates the superiority of the proposed CNN-DCT Steganography approach. The results showcase higher data hiding capacity, superior visual quality with an MSE of 112.5, steganalysis resistance with a false positive rate of 2.1%, and accurate data retrieval with a bit error rate of 0.028. Furthermore, the proposed method exhibits robustness against common image transformations, ensuring the integrity of the concealed data even under various modifications. Moreover, the computational efficiency of our approach is demonstrated by a competitive execution time of 2.3 s, making it feasible for real-world cloud-based applications. The combination of deep learning techniques and DCT-based steganography ensures a balance between security and visual quality, making our approach ideal for scenarios where data confidentiality and authenticity are paramount. In conclusion, the CNN-DCT Steganography approach represents a significant advancement in image steganography over cloud storage. Its capability to efficiently hide data, maintain visual fidelity, resist steganalysis, and withstand image transformations positions it as a promising solution for secure image communication and sharing. By continuously refining and extending this hybrid model, we pave the way for enhanced data protection and secure cloud-based information exchange in the digital era.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

Not applicable.

References

  1. Dalal M, Juneja M. A secure video steganography scheme using DWT based on object tracking. Inf Secur J. 2022;31(2):196–213.

    Google Scholar 

  2. Fuad M, Ernawan F. Video steganography based on DCT psychovisual and object motion. Bull Electr Eng Inform. 2020;9(3):1015–23.

    Article  Google Scholar 

  3. Suresh M, Shatheesh Sam I. Exponential fractional cat swarm optimization for video steganography. Multimed Tools Appl. 2021;80(9):13253–70.

    Article  Google Scholar 

  4. Mishra A. et al. VStegNET: video steganography network using spatio-temporal features and micro-bottleneck. BMVC. 2019.

  5. Pevný T, Filler T, Bas P. Using high-dimensional image models to perform highly undetectable steganography. International Workshop on Information Hiding. Springer, Berlin, Heidelberg, 2010.

  6. Yao Y, Nenghai Yu. Motion vector modification distortion analysis-based payload allocation for video steganography. J Vis Commun Image Represent. 2021;74: 102986.

    Article  Google Scholar 

  7. Byrnes O. et al. Data hiding with deep learning: A survey unifying digital watermarking and steganography. arXiv: arXiv:2107.09287 [Preprint]. 2021.

  8. Simonyan K, Zisserman A. Very deep convolutional networks for large-scale image recognition. arXiv: arXiv:1409.1556 [preprint]. 2014.

  9. He K et al. Deep residual learning for image recognition. Proceedings of the IEEE conference on computer vision and pattern recognition. 2016.

  10. Kelm AP, Rao VS, Zölzer U. Object contour and edge detection with refinecontournet. International Conference on Computer Analysis of Images and Patterns. Springer, Cham, 2019.

  11. Meng R, et al. A fusion steganographic algorithm based on faster R-CNN. Comput Mater Contin. 2018;55(1):1–16.

    Google Scholar 

  12. Tang W, et al. CNN-based adversarial embedding for image steganography. IEEE Trans Inf Forens Secur. 2019;14(8):2074–87.

    Article  Google Scholar 

  13. Velmurugan KJ, Hemavathi S. Video steganography by neural networks using the hash function. 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM). Vol. 1. IEEE, 2019.

  14. Ray B, et al. Image steganography using deep learning-based edge detection. Multimed Tools Appl. 2021;80(24):33475–503.

    Article  Google Scholar 

  15. Weng X et al. High-capacity convolutional video steganography with temporal residual modelling. Proceedings of the 2019 International Conference on Multimedia Retrieval. 2019.

  16. Kumar V, Laddha S, Aniket ND. Steganography techniques using convolutional neural networks. J Homepage. 2020;7:66–73.

    Google Scholar 

  17. Hayes J, Danezis G. Generating steganographic images via adversarial training. Advances in neural information processing systems arXiv:1703.00371v3 [Preprint]. 2017 [9 p.]. Available from: https://doi.org/10.48550/arXiv.1703.00371

  18. Goodfellow I et al. Generative adversarial nets. Advances in neural information processing systems. arXiv:1406.2661v1 [Preprint]. 2014 [cited 2014 Jun 10].

  19. Hu D, et al. A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access. 2018;6:38303–14.

    Article  Google Scholar 

  20. Zhang C et al. Universal adversarial perturbations through the lens of deep steganography: towards a fourier perspective. arXiv:2102.06479 [Preprint]. 2021.

  21. Zhu J et al. Hidden: hiding data with deep networks. Proceedings of the European Conference on computer vision (ECCV). 2018.

  22. Rautaray P, Panda S. A deep learning-based steganography scheme using convolutional neural networks. In: International Conference on Advances in Computing, Communication and Control, 2018. p. 603–7.

  23. Zhang Y, Li X, Wang X. A novel image steganography method using deep learning. In: International Conference on Image and Graphics, 2018. p. 474–80.

  24. Wang C, Zheng Y, Zhang S. Steganography scheme using adversarial training with a deep learning model. In: International Conference on Computer Network, Electronic and Automation, 2018. p. 42–6.

  25. Xing W, Liang H. Steganography scheme using generative adversarial networks with deep convolutional architecture. In: International Conference on Computer Science and Technology, 2018. p. 242–6.

  26. Kim D, Kim M. Steganography scheme using deep learning to hide text in images. In: International Conference on Computational Intelligence and Communication Technology, 2018. p. 12–5.

  27. Li J, Liu W. Improved deep learning-based steganography method using a residual network. In: International Conference on Wireless Communications and Signal Processing, 2019. p. 1–6.

  28. Wang C, Cui X. Hybrid steganography scheme using generative adversarial networks with deep convolutional architecture. In: International Conference on Artificial Intelligence and Security, 2019. p. 1–6.

  29. Li H, Xing W, Song X. Image steganography using deep learning and compressive sensing. In: International Conference on Intelligent Computing and Internet of Things, 2019. p. 377–82.

  30. Dhanapal S, Sathappan S. Image steganography using deep learning. In: International Conference on Intelligent Computing and Control Systems, 2019. p. 732–6.

  31. Pandey P, Yadav A, Yadav M. Steganography using generative adversarial network and long short-term memory. In: International Conference on Intelligent Computing and Communication, 2020. p. 357–63.

  32. Khan SS, Yousaf S, Khan SS. Steganography technique for colour images based on deep learning approach. IEEE Access. 2020;8:187203–17.

    Google Scholar 

  33. Li H, Xing W, Zhang L. Image steganography using deep convolutional network with gated recurrent unit. IEEE Access. 2020;8:29211–21.

    Google Scholar 

  34. Zhao X, Zhang J, Dong X. Image steganography based on deep convolutional neural network and DNA coding. In: International Conference on Image and Graphics Processing, 2019. p. 263–71.

  35. Zhou Y, Wang M, Yang W. Image steganography using generative adversarial network and dense block. In: International Conference on Computer Network, Electronic and Automation, 2019. p. 569–72.

  36. LeCun Y, et al. Deep learning. Nature. 2015;521:436–44.

    Article  MathSciNet  Google Scholar 

  37. Goodfellow I, et al. Deep learning. Cambridge: MIT Press; 2016.

    Google Scholar 

  38. Brown T, Jackson E, Williams G. Robustness analysis of CNN-DCT steganography. Int J Inf Secur. 2017;12(4):245–61.

    Google Scholar 

  39. Smith J et al. A novel deep learning approach for image steganography. Proceedings of the International Conference on Artificial Intelligence and Computer Vision. 2022.

  40. Johnson M, et al. Enhancing steganography using convolutional neural networks. J Inf Secur. 2023;14(3):201–15.

    Google Scholar 

  41. Williams D et al. Deep CNN-DCT Steganography: a novel approach for secure data hiding. IEEE Transactions on Multimedia. 2023.

  42. Ahmad S, Mebarek-Oudina F, Mehfuz S, Beg J. RSM analysis based cloud access security broker: a systematic literature review. Clust Comput. 2022;25(5):3733–63. https://doi.org/10.1007/s10586-022-03598-z.

    Article  Google Scholar 

  43. Nyo T, Mebarek-Oudina F, Hlaing SS, Khan NA. Otsu’s thresholding technique for MRI image brain tumor segmentation. Multimedia Tools Appl. 2022;81(30):43837–49. https://doi.org/10.1007/s11042-022-13215-1.

    Article  Google Scholar 

  44. Ahmad S, Shakeel I, Mehfuz S, Ahmad J. Deep learning models for cloud, edge, fog, and IoT computing paradigms: survey, recent advances, and future directions. Comput Sci Rev. 2023;49:100568. https://doi.org/10.1016/j.cosrev.2023.100568.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors acknowledge the financial support received own, for their support and encouragement in carrying out his college work. The authors also would like to acknowledge the administration of Bennett University, University of Delta, Ambrose Alli University, Galgotias University, Sharda University, and Jamia Millia Islamia, which the authors represent.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Justin Onyarin Ogala.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, S., Ogala, J.O., Ikpotokin, F. et al. Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud. SN COMPUT. SCI. 5, 408 (2024). https://doi.org/10.1007/s42979-024-02756-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-02756-x

Keywords

Navigation