Abstract
In information security, one of the most predominant tasks is to safeguard crucial information from potential intruders. This information is supposed to be safe in password-guided vaults or secure cloud storage. However, with increasing cyberattacks, additional security layers to this vulnerable sector are never redundant. Focusing on image data, a confidential image can be embedded in some other random image to hide the asset but many naïve approaches to achieve this has been broken down. The approach presented in this report is focused to increase the complexity of the architecture of the existing models. The proposed model encrypts the confidential image with a key and hides it in another random image in such a way that is safe to send. With this, even if the manipulation is somehow identified, the processed image is expected to be robust enough to withstand reverse engineering methods. The model thus ensures utmost confidentiality. The retention rate is calculated in terms of SSIM value as 0.828. The average PSNR value is 70.495. The mean square error was 0.017. The reconstructed, noisy images can also be digitally premastered to refine the quality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press. https://doi.org/10.1201/9781315219783
Morkel T, Eloff J, Olivier M (2005) An overview of image steganography 1–11. In: Clerk JM A treatise on electricity and magnetism, vol 2, 3rd edn. Oxford: Clarendon, 1892, pp 68–73
Tiny ImageNet dataset. Retrieved from http://cs231n.stanford.edu/tiny-imagenet-200.zip. Accessed on 25 Oct 2022
Das TK, Chowdhary CL, Gao XZ (2020) Chest x-ray investigation: a convolutional neural network approach. J Biomimetics Biomater Biomed Eng 45:57–70. Trans Tech Publications Ltd
Gadekallu TR, Srivastava G, Liyanage M, Iyapparaja M, Chowdhary CL, Koppu S, Maddikunta PKR (2022) Hand gesture recognition based on a Harris hawks optimized convolution neural network. Comput Electr Eng 100:107836
Vyas AH, Mehta MA, Kotecha K, Pandya S, Alazab M, Gadekallu TR (2022) Tear film breakup time-based dry eye disease detection using convolutional neural network. Neural Comput Appl 1–19
An improvement of the convergence proof of the ADAM-optimizer. Retrieved from https://www.researchgate.net/figure/Comparison-of-different-optimizer-by-training-of-multilayer-neural-networks-on-MNIST_fig1_324808725. Accessed on 10 Jul 2022
Baluja S (2017) Hiding images in plain sight: deep steganography. In: NIPS 2017
Sharma K, Aggarwal A, Singhania T, Gupta D, Khanna A (2019) Hiding data in images using cryptography and deep neural network. J Artif Intell Syst 1:143–162. https://doi.org/10.33969/AIS.2019.11009
Van, TP, Dinh TH, Thanh TM (2019) Simultaneous convolutional neural network for highly efficient image steganography. In: 2019 19th International symposium on communications and information technologies (ISCIT), pp 410–415. https://doi.org/10.1109/ISCIT.2019.8905216
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Arora, S., Gupta, P., Goar, V., Kuri, M., Channi, H.K., Chowdhary, C.L. (2023). Key Based Steganography Using Convolutions. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-19-9888-1_51
Download citation
DOI: https://doi.org/10.1007/978-981-19-9888-1_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9887-4
Online ISBN: 978-981-19-9888-1
eBook Packages: EngineeringEngineering (R0)