Skip to main content

Key Based Steganography Using Convolutions

  • Conference paper
  • First Online:
Advances in Information Communication Technology and Computing

Abstract

In information security, one of the most predominant tasks is to safeguard crucial information from potential intruders. This information is supposed to be safe in password-guided vaults or secure cloud storage. However, with increasing cyberattacks, additional security layers to this vulnerable sector are never redundant. Focusing on image data, a confidential image can be embedded in some other random image to hide the asset but many naïve approaches to achieve this has been broken down. The approach presented in this report is focused to increase the complexity of the architecture of the existing models. The proposed model encrypts the confidential image with a key and hides it in another random image in such a way that is safe to send. With this, even if the manipulation is somehow identified, the processed image is expected to be robust enough to withstand reverse engineering methods. The model thus ensures utmost confidentiality. The retention rate is calculated in terms of SSIM value as 0.828. The average PSNR value is 70.495. The mean square error was 0.017. The reconstructed, noisy images can also be digitally premastered to refine the quality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press. https://doi.org/10.1201/9781315219783

    Article  Google Scholar 

  2. Morkel T, Eloff J, Olivier M (2005) An overview of image steganography 1–11. In: Clerk JM A treatise on electricity and magnetism, vol 2, 3rd edn. Oxford: Clarendon, 1892, pp 68–73

    Google Scholar 

  3. Tiny ImageNet dataset. Retrieved from http://cs231n.stanford.edu/tiny-imagenet-200.zip. Accessed on 25 Oct 2022

  4. Das TK, Chowdhary CL, Gao XZ (2020) Chest x-ray investigation: a convolutional neural network approach. J Biomimetics Biomater Biomed Eng 45:57–70. Trans Tech Publications Ltd

    Google Scholar 

  5. Gadekallu TR, Srivastava G, Liyanage M, Iyapparaja M, Chowdhary CL, Koppu S, Maddikunta PKR (2022) Hand gesture recognition based on a Harris hawks optimized convolution neural network. Comput Electr Eng 100:107836

    Article  Google Scholar 

  6. Vyas AH, Mehta MA, Kotecha K, Pandya S, Alazab M, Gadekallu TR (2022) Tear film breakup time-based dry eye disease detection using convolutional neural network. Neural Comput Appl 1–19

    Google Scholar 

  7. An improvement of the convergence proof of the ADAM-optimizer. Retrieved from https://www.researchgate.net/figure/Comparison-of-different-optimizer-by-training-of-multilayer-neural-networks-on-MNIST_fig1_324808725. Accessed on 10 Jul 2022

  8. Baluja S (2017) Hiding images in plain sight: deep steganography. In: NIPS 2017

    Google Scholar 

  9. Sharma K, Aggarwal A, Singhania T, Gupta D, Khanna A (2019) Hiding data in images using cryptography and deep neural network. J Artif Intell Syst 1:143–162. https://doi.org/10.33969/AIS.2019.11009

  10. Van, TP, Dinh TH, Thanh TM (2019) Simultaneous convolutional neural network for highly efficient image steganography. In: 2019 19th International symposium on communications and information technologies (ISCIT), pp 410–415. https://doi.org/10.1109/ISCIT.2019.8905216

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chiranji Lal Chowdhary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Arora, S., Gupta, P., Goar, V., Kuri, M., Channi, H.K., Chowdhary, C.L. (2023). Key Based Steganography Using Convolutions. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 628. Springer, Singapore. https://doi.org/10.1007/978-981-19-9888-1_51

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-9888-1_51

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-9887-4

  • Online ISBN: 978-981-19-9888-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics