Adaptive spatial image steganography and steganalysis using perceptual modelling and machine learning

Downloadable content.

image steganography thesis

  • Xie, Guoliang
  • Strathclyde Thesis Copyright
  • University of Strathclyde
  • Doctoral (Postgraduate)
  • Doctor of Philosophy (PhD)
  • Department of Electronic and Electrical Engineering
  • Centre for Excellence in Signal Image Processing
  • Image steganography is a method for communicating secret messages under the cover images. A sender will embed the secret messages into the cover images according to an algorithm, and then the resulting image will be sent to the receiver. The receiver can extract the secret messages with the predefined algorithm. To counter this kind of technique, image steganalysis is proposed to detect the presence of secret messages.After many years of development, current image steganography uses the adaptive algorithm for embedding the secrets, which automatically finds the complex area in the cover source to avoid being noticed. Meanwhile, image steganalysis has also been advanced to universal steganalysis, which does not require the knowledge of the steganographic algorithm. With the development of the computational hardware, i.e., Graphical Processing Units (GPUs), some computational expensive techniques are now available, i.e., Convolutional Neural Networks (CNNs), which bring a large improvement in the detection tasks in image steganalysis. To defend against the attacks, new techniques are also being developed to improve the security of image steganography, these include designing more scientific cost functions, the key in adaptive steganography, and generating stego images from the knowledge of the CNNs.Several contributions are made for both image steganography and steganalysis in this thesis. Firstly, inspired by the Ranking Priority Profile (RPP), a new cost function for adaptive image steganography is proposed, which uses the two-dimensional Singular Spectrum Analysis (2D-SSA) and Weighted Median Filter (WMF) in the design. The RPP mainly includes three rules, i.e., the Complexity-First rule, the Clustering rule and the Spreading rule, to design a cost function. The 2D-SSA is employed in selecting the key components and clustering the embedding positions, which follows the Complexity-First rule and the Clustering rule. Also, the Spreading rule is followed to smooth the resulting image produced by 2D-SSA with WMF. The proposed algorithm has improved performance over four benchmarking approaches against non-shared selection channel attacks. It also provides comparable performance in selection-channel-aware scenarios, where the best results are observed when the relative payload is 0.3 bpp or larger. The approach is much faster than other model-based methods.Secondly, for image steganalysis, to tackle more complex datasets that are close to the real scenarios and to push image steganalysis further to real-life applications, an Enhanced Residual Network with self-attention ability, i.e., ERANet, is proposed. By employing a more mathematically sophisticated way to extract more effective features in the images and the global self-Attention technique, the ERANet can further capture the stego signal in the deeper layers, hence it is suitable for the more complex situations in the new datasets. The proposed Enhanced Low-Level Feature Representation Module can be easily mounted on other CNNs in selecting the most representative features. Although it comes with a slightly extra computational cost, comprehensive experiments on the BOSSbase and ALASKA#2 datasets have demonstrated the effectiveness of the proposed methodology.Lastly, for image steganography, with the knowledge from the CNNs, a novel postcost-optimization algorithm is proposed. Without modifying the original stego image and the original cost function of the steganography, and no need for training a Generative Adversarial Network (GAN), the proposed method mainly uses the gradient maps from a well-trained CNN to represent the cost, where the original cost map of the steganography is adopted to indicate the embedding positions. This method will smooth the gradient maps before adjusting the cost, which solves the boundary problem of the CNNs having multiple subnets. Extensive experiments have been carried out to validate the effectiveness of the proposed method, which provides state-of-the-art performance. In addition, compared to existing work, the proposed method is effcient in computing time as well.In short, this thesis has made three major contributions to image steganography and steganalysis by using perceptual modelling and machine learning. A novel cost function and a post-cost-optimization function have been proposed for adaptive spatial image steganography, which helps protect the secret messages. For image steganalysis, a new CNN architecture has also been proposed, which utilizes multiple techniques for providing state of-the-art performance. Future directions are also discussed for indicating potential research.
  • Marshall, Stephen, 1958-
  • Ren, Jinchang
  • Doctoral thesis
  • 10.48730/w7n7-r940
Thumbnail Title Date Uploaded Visibility Actions
2022-05-30 Public

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

A Study and Review on Image Steganography

  • Conference paper
  • First Online: 14 September 2021
  • Cite this conference paper

image steganography thesis

  • Trishna Paul 6 ,
  • Sanchita Ghosh 6 &
  • Anandaprova Majumder 6  

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 75))

1096 Accesses

1 Citations

Steganography is the science that involves encrypting data in a suitable multimedia carrier, such as image, audio, and video files. The main purpose of image steganography is to hide the data in images. This means that it encrypts the text in the form of an icon. Steganography is done when there is communication takes place between sender and receiver. In a day of data transfer over the network, security is paramount. Before the development of stenography, data security is a major research concern for researchers. Steganography is gaining importance due to the rapid development of users on the Internet and secret communication. In this paper, we discuss about various type of existing image steganography techniques and analyze the advantages and disadvantages of different types of image steganography techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

image steganography thesis

Steganography: A Survey

image steganography thesis

Classification of Image Steganography in Substitution Technique

image steganography thesis

Research Review on Digital Image Steganography Which Resists Against Compression

Nosrati, M.: An introduction to steganography methods, Aug 2011 (2016)

Google Scholar  

Hussain, M., Hussain, M.: A survey of image steganography techniques (2013)

Chanu, Y.J., Tuithung, T., Manglem Singh, K.: A short survey on image steganography and steganalysis techniques. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science, Shillong, India, pp. 52–55 (2012). https://doi.org/10.1109/NCETACS.2012.6203297

Kour, J.: Steganography techniques—a review paper, vol. 9359, no. 5, pp. 132–135 (2014)

Singh, P., Chaudhary, R., Agarwal, A.: A novel approach of text steganography based on null spaces. IOSR J. Comput. Eng. (2012) academia.edu

Tiwary, A.: Different image steganography techniques : an overview. Int. J. Comput. Eng. Appl. 0–13 (2019)

Hashim, M.M., Rahim, M.S.M., Alwan, A.A.A review and open issues of multifarious image steganography techniques in spatial domain. J. Theor. Appl. Info. Technol.  96 (4), 956–977 (2018)

Rakhi, & Gawande, S.: A review on steganography methods. IJAREEIE, 2 (10), 4635–4638 (2013)

Hashim, M.M., Rahim, M.S.M., Johi, F.A., Taha, M.S.: Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. Int. J. Eng. Technol. (2018) uruk.edu.iq

Rawat, P., Pandey, A.K., Singh Kushwaha, S.: Advanced image steganographic algorithms and breaking strategies. Int. J. Comput. Appl. (IJCA) concern (2014)

Rajkumar, Rishi, R., Batra, S.: A new steganography method for gray level images using parity checker. Int. J. Comput. Appl. 11 (11), 18–24 (2010). https://doi.org/10.5120/1627-2188

Sharma, S., Kumar, U.: Review of transform domain techniques for image steganography. Int. J. Sci. Res. ISSN (Online Index Copernicus Value Impact Factor) 4 (5), 194–197 (2015). https://doi.org/10.13140/RG.2.1.4797.1928

Arya, A., Soni, S.: A literature review on various recent steganography techniques, pp 143–149 (2018)

Nag, A., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel technique for image steganography based on DWT and Huffman encoding. Int. J. Comput. Sci. Secur. (2011)

Chandramouli, R, Memon, N.: Analysis of LSB based image steganography techniques. In: Proceedings of 2001 International Conference on Image Processing (Cat. No. 01CH37205), pp. 1019–1022 (2001)

Download references

Acknowledgements

I would like to express my gratitude to my supervisor, my friend, Ms.Sanchita Ghosh (Student of Dr. B C Roy Engineering College), who guided me throughout this paper. I would also like to thanks my professor Mrs. Anandaprova Majumder (Asst. Professor of Dr. B C Roy Engineering College), who advised and helped me to finalized my project.

Author information

Authors and affiliations.

Department of Computer Science and Engineering (CSE), Dr. B.C. Roy Engineering College, Fuljhore, Durgapur, West Bengal, 713206, India

Trishna Paul, Sanchita Ghosh & Anandaprova Majumder

You can also search for this author in PubMed   Google Scholar

Editor information

Editors and affiliations.

Department of Information Technology, RVS Technical Campus, Coimbatore, Tamil Nadu, India

Department of Telecommunication Engineering, Czech Technical University in Prague, Praha, Czech Republic

Robert Bestak

Gerald Schwartz School of Business, St. Francis Xavier University, Antigonish, NS, Canada

Ram Palanisamy

Faculty of Informatics and Information Technology, Slovak University Technology, Bratislava, Slovakia

Ivan Kotuliak

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Paul, T., Ghosh, S., Majumder, A. (2022). A Study and Review on Image Steganography. In: Smys, S., Bestak, R., Palanisamy, R., Kotuliak, I. (eds) Computer Networks and Inventive Communication Technologies . Lecture Notes on Data Engineering and Communications Technologies, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-16-3728-5_40

Download citation

DOI : https://doi.org/10.1007/978-981-16-3728-5_40

Published : 14 September 2021

Publisher Name : Springer, Singapore

Print ISBN : 978-981-16-3727-8

Online ISBN : 978-981-16-3728-5

eBook Packages : Engineering Engineering (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

University of Illinois at Chicago

Steganography and Steganalysis of Raw and Compressed Image Data

Degree grantor, degree level, degree name, committee member, submitted date, thesis type, usage metrics.

ACM Digital Library home

  • Advanced Search

StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, supplementary material, index terms.

Information systems

Information systems applications

Multimedia information systems

Security and privacy

Security services

Recommendations

Generative steganography network.

Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...

LSB based non blind predictive edge adaptive image steganography

Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data is embedded in ...

Histogram-based undetectable fidelity image in steganography as MSB controller

The LSB substitution and LSB matching method are to embed the secret data into the least-significant-bits of the pixel values in a cover image. However, the flexible operations were not offered in the past studies. In order to enhance the operations, we ...

Information

Published in.

cover image ACM Conferences

  • General Chairs:

Author Picture

University of Ottawa, Canada & MBZUAI, UAE

HiDream.ai, China

University of Modena and Reggio Emilia, Italy

  • Program Chairs:

Author Picture

University of Florence, Italy

Unversidad de Medellin, Colombia

University at Albany, State University of New York, USA

M. Shamim Hossain (King Saud University, KSA

  • SIGMM: ACM Special Interest Group on Multimedia

Association for Computing Machinery

New York, NY, United States

Publication History

Permissions, check for updates, author tags.

  • diffusion model
  • generative image steganography
  • large-capacity
  • Research-article

Funding Sources

  • Anhui Science and Technology Key Special Program
  • the Natural Science Foundation of China

Acceptance Rates

Upcoming conference, contributors, other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 646 Total Downloads
  • Downloads (Last 12 months) 646
  • Downloads (Last 6 weeks) 64

View Options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

View options.

View or Download as a PDF file.

View online with eReader .

Share this Publication link

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Purdue University Graduate School

Image Steganography Using Deep Learning Techniques

Digital image steganography is the process of embedding information withina cover image in  a  secure,  imperceptible,  and  recoverable  way.The  three  main  methods  of  digital  image steganography  are  spatial,  transform,  and  neural  network  methods. Spatial  methods  modify  the pixel  valuesof  an  image  to  embed  information,  while  transform  methods embed  hidden information within the frequency of the image.Neural network-based methods use neural networks to perform the hiding process, which is the focus of the proposed methodology.

This  research  explores  the  use  of  deep  convolutional  neural  networks  (CNNs)  in  digital image steganography. This work extends an existing implementation that used a two-dimensional CNN to perform the preparation, hiding, and extraction phases of the steganography process. The methodology proposed in this research, however, introduced changes into the structure of the CNN and   used   a   gain   function   based   on   several   image   similarity   metrics   to   maximize   the imperceptibility between a cover and steganographic image.

The  performance  of  the  proposed  method  was  measuredusing  some  frequently  utilized image metrics such as structured similarity index measurement (SSIM), mean square error (MSE), and  peak  signal  to  noise  ratio  (PSNR).  The  results  showed  that  the  steganographic  images produced by the proposed methodology areimperceptible to the human eye, while still providing good  recoverability.  Comparingthe  results  of  the  proposed  methodologyto  theresults  of  theoriginalmethodologyrevealed  that  our  proposed  network  greatly  improved  over  the  base methodology in terms of SSIM andcompareswell to existing steganography methods.

College of Engineering, Technology, and Computer Science at Purdue University Fort Wayne

Degree type.

  • Master of Science
  • Computer Science

Campus location

Advisor/supervisor/committee chair, advisor/supervisor/committee co-chair, additional committee member 2, additional committee member 3, usage metrics.

  • Image processing
  • Computer graphics

CC BY-ND 4.0

  • Corpus ID: 11829365

An overview of image steganography

  • Tayana Morkel , J. Eloff , M. Olivier
  • Published in Information Security for… 2005
  • Computer Science

Figures and Tables from this paper

figure 1

718 Citations

An image steganography technique with high hiding capacity based on 24 bit color image, a survey on various approaches of image steganography, image steganography techniques: an overview, a comparative study of image steganography techniques, a secure image steganography using least significant bit technique, steganography-a sin qua non for disguised communication, a technique to hide information within image file for secure transmission, image steganography techniques : an overview.

  • Highly Influenced

A Review on Image Steganography

Image steganography using lsb and edge - detection technique, 22 references, spread spectrum image steganography, high capacity image steganographic model, exploring steganography: seeing the unseen.

  • Highly Influential
  • 10 Excerpts

Digital steganography: hiding data within data

Steganography and steganalysis, significance of steganography on data security, hide and seek: an introduction to steganography, on the limits of steganography, steganalysis of images created using current steganography software, steganography: the art of hiding information in plain sight, related papers.

Showing 1 through 3 of 0 Related Papers

IMAGES

  1. Thesis Report On Image Steganography Using Wavelet Transform

    image steganography thesis

  2. Thesis On Steganography

    image steganography thesis

  3. A Sesure Image Steganography Using LSB Technique and ...

    image steganography thesis

  4. Image steganography Abstract

    image steganography thesis

  5. Thesis

    image steganography thesis

  6. (PDF) Information Security Through Image Processing: Chaotic Functions

    image steganography thesis

VIDEO

  1. Stegnography using Steghide

  2. Image Steganography Projects

  3. Artist Steganography of coding and formula for trading. no outline #art #drawing #shorts

  4. Image_steganography_project

  5. Steganography

  6. Meaning Of Steganography

COMMENTS

  1. (PDF) Image Steganography

    Steganography is the art and science of hiding the data in some cover media like image file, audio file, video file, text file etc. Out of the various cover media available image file is the most ...

  2. PDF Studies on Image Steganography

    The primary goal of this thesis is to study and experiment the different techniques used in Image Steganography. Steganography method, degree of efficiency, and results comparison will be performed by using the main image file ("cover image") and the stego image resulting from implementing steganography methods.

  3. A Systematic Review of Computational Image Steganography Approaches

    In image steganography, the statistical model of an image is crucial for hiding information in less detectable pixels and attaining better protection. This paper aims to present a systematic review of image steganography approaches. Articles are selected from reputable databases such as IEEE Explore, Web of Science (WOS), ACM, and Willey. ...

  4. PDF Qatar University College of Engineering Image Steganography Using Deep

    In the case of image steganography, four main characteristics have. to be evaluated, namely - security, robustness, perceptibility, and capacity. 4.5.1 Capacity Capacity is a metric to measure the amount of secret media that is hidden inside. the cover image with minimum distortion.

  5. Thesis

    Adaptive spatial image steganography and steganalysis using perceptual modelling and machine learning. ... and generating stego images from the knowledge of the CNNs.Several contributions are made for both image steganography and steganalysis in this thesis. Firstly, inspired by the Ranking Priority Profile (RPP), a new cost function for ...

  6. Toward High Capacity and Robust JPEG Steganography Based on Adversarial

    In order to improve the robustness of steganography, researchers have proposed end-to-end steganography methods, such as deep steganography [], HiDDeN [], SteganoGAN [], and IS-GAN [].As shown in Figure 1, the end-to-end steganography framework takes the cover image and secret message as input and finally outputs the decoded secret message.In particular, embedding and extracting secret ...

  7. Image Steganography: A Review of the Recent Advances

    Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes. Deep learning technology, which has emerged as a powerful tool in various applications including image steganography, has received increased attention recently. The main goal of this paper is to explore ...

  8. Spatial-Domain Image Steganalysis using Deep Learning Techniques

    steganographic noise may not always reside in the high-frequency zone of the cover image. For example, a recent embedding scheme called Clustering Modification Directions (CMD) follows a typical distribu- tion as it tries to embed in neighboring areas with similar embedding

  9. 2270 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on IMAGE STEGANOGRAPHY. Find methods information, sources, references or conduct a literature review on ...

  10. Dissertations / Theses: 'Image Steganography'

    This thesis is devoted to investigate and develop steganography schemes for embedding secret images in image files. While many existing schemes have been developed to perform well with respect to one or more of the above objectives, we aim to achieve optimal performance in terms of all these objectives.

  11. PDF ABSTRACT arXiv:2203.04500v1 [cs.CV] 9 Mar 2022

    Index Terms— Image steganography, style transfer, ste-ganalysis 1. INTRODUCTION Image steganography aims to hide secret information in im-ages without being detected on social networks. The cover image is the one that will be modified to carry the secret mes-sage, while the stego image is the output of the steganogra-phy algorithm.

  12. A Study and Review on Image Steganography

    Abstract. Steganography is the science that involves encrypting data in a suitable multimedia carrier, such as image, audio, and video files. The main purpose of image steganography is to hide the data in images. This means that it encrypts the text in the form of an icon. Steganography is done when there is communication takes place between ...

  13. Current status and key issues in image steganography: A survey

    Image steganography can be broadly classified into spatial domain, transform domain, spread spectrum and model based steganography as depicted in Fig. 4.In spatial domain, secret message is embedded in pixel value directly whereas transform domain methods achieve embedding by first transforming the image from spatial to frequency domain using any one of the transforms such as discrete cosine ...

  14. Recent Advances of Image Steganography with Generative Adversarial Networks

    Image steganography is dedicated to hiding secret messages in digital images, and has achieved the purpose of covert communication. Recently, research on image steganography has demonstrated great potential for using GAN and neural networks. In this paper we review different strategies for steganography such as cover modification, cover ...

  15. Steganography and Steganalysis of Raw and Compressed Image Data

    Steganography is the art of hiding data in a cover medium without arousing suspicion of the warden. In this thesis, we focus on the most popular and studied cover medium for steganography, digital images. In digital image steganography, the statistical model of an image is essential for hiding data in less detectable regions and achieving better security. This has been addressed in the ...

  16. Statistical Steganalysis of Images

    Statistical Steganalysis of Images. Download (3.64 MB) + Collect. thesis. posted on 2019-08-13, 13:12 authored by Min Huang. Steganalysis is the study of detecting secret information hidden in objects such as images, videos, texts, time series and games via steganography. Among those objects, the image is the most widely used object to hide ...

  17. PDF Library of Ph.D. Theses

    Library of Ph.D. Theses | EURASIP

  18. PDF Wilson Linguistic Steganography

    A thesis submitted for the degree of Doctor of Philosophy Trinity 2016. Abstract The goal of steganography, the art of hiding information, is to send hidden messages ... Modern image steganography is concerned with minimising the cost of embedding, achieved by indirectly transmitting payload through the application

  19. StegaDDPM: Generative Image Steganography based on Denoising Diffusion

    Image steganography is the technology of concealing secret messages within an image. Recently, generative image steganography has been developed, which conceals secret messages during image generation. However, existing generative image steganography schemes are often criticized for their poor steganographic capacity and extraction accuracy.

  20. Image Steganography Using Deep Learning Techniques

    Digital image steganography is the process of embedding information withina cover image in a secure, imperceptible, and recoverable way.The three main methods of digital image steganography are spatial, transform, and neural network methods. Spatial methods modify the pixel valuesof an image to embed information, while transform methods embed hidden information within the frequency of the ...

  21. [PDF] An overview of image steganography

    This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications. : Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.

  22. PDF Security Enhancement of Image Steganography Using

    Steganography is a security method that hides secret data inside cover media where the very existence of the embedded secret data is not perceptible. The cover object can be image, audio or video; the most commonly used is an image file. This thesis presents a model for protecting the security and integrity of secret data

  23. Thesis Report On Image Steganography

    Thesis Report on Image Steganography - Free download as PDF File (.pdf), Text File (.txt) or read online for free. Scribd is the world's largest social reading and publishing site.

  24. PDF Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching

    steganography. The text, audio, image, video, and DNA files can be used as a cover medium. For image steganography, secret information is sent over a communication network by hiding inside the cover image [4]. The image steganography is divided into two domains according to their applicability.