Adaptive spatial image steganography and steganalysis using perceptual modelling and machine learning
Downloadable content.
- Xie, Guoliang
- Strathclyde Thesis Copyright
- University of Strathclyde
- Doctoral (Postgraduate)
- Doctor of Philosophy (PhD)
- Department of Electronic and Electrical Engineering
- Centre for Excellence in Signal Image Processing
- Image steganography is a method for communicating secret messages under the cover images. A sender will embed the secret messages into the cover images according to an algorithm, and then the resulting image will be sent to the receiver. The receiver can extract the secret messages with the predefined algorithm. To counter this kind of technique, image steganalysis is proposed to detect the presence of secret messages.After many years of development, current image steganography uses the adaptive algorithm for embedding the secrets, which automatically finds the complex area in the cover source to avoid being noticed. Meanwhile, image steganalysis has also been advanced to universal steganalysis, which does not require the knowledge of the steganographic algorithm. With the development of the computational hardware, i.e., Graphical Processing Units (GPUs), some computational expensive techniques are now available, i.e., Convolutional Neural Networks (CNNs), which bring a large improvement in the detection tasks in image steganalysis. To defend against the attacks, new techniques are also being developed to improve the security of image steganography, these include designing more scientific cost functions, the key in adaptive steganography, and generating stego images from the knowledge of the CNNs.Several contributions are made for both image steganography and steganalysis in this thesis. Firstly, inspired by the Ranking Priority Profile (RPP), a new cost function for adaptive image steganography is proposed, which uses the two-dimensional Singular Spectrum Analysis (2D-SSA) and Weighted Median Filter (WMF) in the design. The RPP mainly includes three rules, i.e., the Complexity-First rule, the Clustering rule and the Spreading rule, to design a cost function. The 2D-SSA is employed in selecting the key components and clustering the embedding positions, which follows the Complexity-First rule and the Clustering rule. Also, the Spreading rule is followed to smooth the resulting image produced by 2D-SSA with WMF. The proposed algorithm has improved performance over four benchmarking approaches against non-shared selection channel attacks. It also provides comparable performance in selection-channel-aware scenarios, where the best results are observed when the relative payload is 0.3 bpp or larger. The approach is much faster than other model-based methods.Secondly, for image steganalysis, to tackle more complex datasets that are close to the real scenarios and to push image steganalysis further to real-life applications, an Enhanced Residual Network with self-attention ability, i.e., ERANet, is proposed. By employing a more mathematically sophisticated way to extract more effective features in the images and the global self-Attention technique, the ERANet can further capture the stego signal in the deeper layers, hence it is suitable for the more complex situations in the new datasets. The proposed Enhanced Low-Level Feature Representation Module can be easily mounted on other CNNs in selecting the most representative features. Although it comes with a slightly extra computational cost, comprehensive experiments on the BOSSbase and ALASKA#2 datasets have demonstrated the effectiveness of the proposed methodology.Lastly, for image steganography, with the knowledge from the CNNs, a novel postcost-optimization algorithm is proposed. Without modifying the original stego image and the original cost function of the steganography, and no need for training a Generative Adversarial Network (GAN), the proposed method mainly uses the gradient maps from a well-trained CNN to represent the cost, where the original cost map of the steganography is adopted to indicate the embedding positions. This method will smooth the gradient maps before adjusting the cost, which solves the boundary problem of the CNNs having multiple subnets. Extensive experiments have been carried out to validate the effectiveness of the proposed method, which provides state-of-the-art performance. In addition, compared to existing work, the proposed method is effcient in computing time as well.In short, this thesis has made three major contributions to image steganography and steganalysis by using perceptual modelling and machine learning. A novel cost function and a post-cost-optimization function have been proposed for adaptive spatial image steganography, which helps protect the secret messages. For image steganalysis, a new CNN architecture has also been proposed, which utilizes multiple techniques for providing state of-the-art performance. Future directions are also discussed for indicating potential research.
- Marshall, Stephen, 1958-
- Ren, Jinchang
- Doctoral thesis
- 10.48730/w7n7-r940
Thumbnail | Title | Date Uploaded | Visibility | Actions |
---|---|---|---|---|
2022-05-30 | Public |
![](http://viettel.site/777/templates/cheerup1/res/banner1.gif)
IEEE Account
- Change Username/Password
- Update Address
Purchase Details
- Payment Options
- Order History
- View Purchased Documents
Profile Information
- Communications Preferences
- Profession and Education
- Technical Interests
- US & Canada: +1 800 678 4333
- Worldwide: +1 732 981 0060
- Contact & Support
- About IEEE Xplore
- Accessibility
- Terms of Use
- Nondiscrimination Policy
- Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
- Bibliography
- More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
- Automated transliteration
- Relevant bibliographies by topics
- Referencing guides
A Study and Review on Image Steganography
- Conference paper
- First Online: 14 September 2021
- Cite this conference paper
- Trishna Paul 6 ,
- Sanchita Ghosh 6 &
- Anandaprova Majumder 6
Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 75))
1096 Accesses
1 Citations
Steganography is the science that involves encrypting data in a suitable multimedia carrier, such as image, audio, and video files. The main purpose of image steganography is to hide the data in images. This means that it encrypts the text in the form of an icon. Steganography is done when there is communication takes place between sender and receiver. In a day of data transfer over the network, security is paramount. Before the development of stenography, data security is a major research concern for researchers. Steganography is gaining importance due to the rapid development of users on the Internet and secret communication. In this paper, we discuss about various type of existing image steganography techniques and analyze the advantages and disadvantages of different types of image steganography techniques.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save.
- Get 10 units per month
- Download Article/Chapter or Ebook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
- Available as PDF
- Read on any device
- Instant download
- Own it forever
- Available as EPUB and PDF
- Compact, lightweight edition
- Dispatched in 3 to 5 business days
- Free shipping worldwide - see info
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Similar content being viewed by others
Steganography: A Survey
Classification of Image Steganography in Substitution Technique
Research Review on Digital Image Steganography Which Resists Against Compression
Nosrati, M.: An introduction to steganography methods, Aug 2011 (2016)
Google Scholar
Hussain, M., Hussain, M.: A survey of image steganography techniques (2013)
Chanu, Y.J., Tuithung, T., Manglem Singh, K.: A short survey on image steganography and steganalysis techniques. In: 2012 3rd National Conference on Emerging Trends and Applications in Computer Science, Shillong, India, pp. 52–55 (2012). https://doi.org/10.1109/NCETACS.2012.6203297
Kour, J.: Steganography techniques—a review paper, vol. 9359, no. 5, pp. 132–135 (2014)
Singh, P., Chaudhary, R., Agarwal, A.: A novel approach of text steganography based on null spaces. IOSR J. Comput. Eng. (2012) academia.edu
Tiwary, A.: Different image steganography techniques : an overview. Int. J. Comput. Eng. Appl. 0–13 (2019)
Hashim, M.M., Rahim, M.S.M., Alwan, A.A.A review and open issues of multifarious image steganography techniques in spatial domain. J. Theor. Appl. Info. Technol. 96 (4), 956–977 (2018)
Rakhi, & Gawande, S.: A review on steganography methods. IJAREEIE, 2 (10), 4635–4638 (2013)
Hashim, M.M., Rahim, M.S.M., Johi, F.A., Taha, M.S.: Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. Int. J. Eng. Technol. (2018) uruk.edu.iq
Rawat, P., Pandey, A.K., Singh Kushwaha, S.: Advanced image steganographic algorithms and breaking strategies. Int. J. Comput. Appl. (IJCA) concern (2014)
Rajkumar, Rishi, R., Batra, S.: A new steganography method for gray level images using parity checker. Int. J. Comput. Appl. 11 (11), 18–24 (2010). https://doi.org/10.5120/1627-2188
Sharma, S., Kumar, U.: Review of transform domain techniques for image steganography. Int. J. Sci. Res. ISSN (Online Index Copernicus Value Impact Factor) 4 (5), 194–197 (2015). https://doi.org/10.13140/RG.2.1.4797.1928
Arya, A., Soni, S.: A literature review on various recent steganography techniques, pp 143–149 (2018)
Nag, A., Biswas, S., Sarkar, D., Sarkar, P.P.: A novel technique for image steganography based on DWT and Huffman encoding. Int. J. Comput. Sci. Secur. (2011)
Chandramouli, R, Memon, N.: Analysis of LSB based image steganography techniques. In: Proceedings of 2001 International Conference on Image Processing (Cat. No. 01CH37205), pp. 1019–1022 (2001)
Download references
Acknowledgements
I would like to express my gratitude to my supervisor, my friend, Ms.Sanchita Ghosh (Student of Dr. B C Roy Engineering College), who guided me throughout this paper. I would also like to thanks my professor Mrs. Anandaprova Majumder (Asst. Professor of Dr. B C Roy Engineering College), who advised and helped me to finalized my project.
Author information
Authors and affiliations.
Department of Computer Science and Engineering (CSE), Dr. B.C. Roy Engineering College, Fuljhore, Durgapur, West Bengal, 713206, India
Trishna Paul, Sanchita Ghosh & Anandaprova Majumder
You can also search for this author in PubMed Google Scholar
Editor information
Editors and affiliations.
Department of Information Technology, RVS Technical Campus, Coimbatore, Tamil Nadu, India
Department of Telecommunication Engineering, Czech Technical University in Prague, Praha, Czech Republic
Robert Bestak
Gerald Schwartz School of Business, St. Francis Xavier University, Antigonish, NS, Canada
Ram Palanisamy
Faculty of Informatics and Information Technology, Slovak University Technology, Bratislava, Slovakia
Ivan Kotuliak
Rights and permissions
Reprints and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper.
Paul, T., Ghosh, S., Majumder, A. (2022). A Study and Review on Image Steganography. In: Smys, S., Bestak, R., Palanisamy, R., Kotuliak, I. (eds) Computer Networks and Inventive Communication Technologies . Lecture Notes on Data Engineering and Communications Technologies, vol 75. Springer, Singapore. https://doi.org/10.1007/978-981-16-3728-5_40
Download citation
DOI : https://doi.org/10.1007/978-981-16-3728-5_40
Published : 14 September 2021
Publisher Name : Springer, Singapore
Print ISBN : 978-981-16-3727-8
Online ISBN : 978-981-16-3728-5
eBook Packages : Engineering Engineering (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Publish with us
Policies and ethics
- Find a journal
- Track your research
![image steganography thesis University of Illinois at Chicago](https://s3-eu-west-1.amazonaws.com/876az-branding-figshare/uic/logo_header.png)
Steganography and Steganalysis of Raw and Compressed Image Data
Degree grantor, degree level, degree name, committee member, submitted date, thesis type, usage metrics.
![image steganography thesis ACM Digital Library home](https://dl.acm.org/specs/products/acm/releasedAssets/images/acm-dl-logo-white-1ecfb82271e5612e8ca12aa1b1737479.png)
- Advanced Search
StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model
New citation alert added.
This alert has been successfully added and will be sent to:
You will be notified whenever a record that you have chosen has been cited.
To manage your alert preferences, click on the button below.
New Citation Alert!
Please log in to your account
![](http://viettel.site/777/templates/cheerup1/res/banner1.gif)
Information & Contributors
Bibliometrics & citations, supplementary material, index terms.
Information systems
Information systems applications
Multimedia information systems
Security and privacy
Security services
Recommendations
Generative steganography network.
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...
LSB based non blind predictive edge adaptive image steganography
Image steganography is the art of hiding secret message in grayscale or color images. Easy detection of secret message for any state-of-art image steganography can break the stego system. To prevent the breakdown of the stego system data is embedded in ...
Histogram-based undetectable fidelity image in steganography as MSB controller
The LSB substitution and LSB matching method are to embed the secret data into the least-significant-bits of the pixel values in a cover image. However, the flexible operations were not offered in the past studies. In order to enhance the operations, we ...
Information
Published in.
![image steganography thesis cover image ACM Conferences](https://dl.acm.org/cms/asset/450b3a72-578a-415e-89ca-c05916d664d2/3581783.cover.jpg)
- General Chairs:
![image steganography thesis Author Picture](https://dl.acm.org/action/showDoPubAsset?doi=10.1145/contrib-81100431394&format=rel-imgonly&assetId=elsaddik_2018_img.png)
University of Ottawa, Canada & MBZUAI, UAE
HiDream.ai, China
University of Modena and Reggio Emilia, Italy
- Program Chairs:
![image steganography thesis Author Picture](https://dl.acm.org/action/showDoPubAsset?doi=10.1145/contrib-81100628727&format=rel-imgonly&assetId=photo.jpg)
University of Florence, Italy
Unversidad de Medellin, Colombia
University at Albany, State University of New York, USA
M. Shamim Hossain (King Saud University, KSA
- SIGMM: ACM Special Interest Group on Multimedia
Association for Computing Machinery
New York, NY, United States
Publication History
Permissions, check for updates, author tags.
- diffusion model
- generative image steganography
- large-capacity
- Research-article
Funding Sources
- Anhui Science and Technology Key Special Program
- the Natural Science Foundation of China
Acceptance Rates
Upcoming conference, contributors, other metrics, bibliometrics, article metrics.
- 0 Total Citations
- 646 Total Downloads
- Downloads (Last 12 months) 646
- Downloads (Last 6 weeks) 64
View Options
Login options.
Check if you have access through your login credentials or your institution to get full access on this article.
Full Access
View options.
View or Download as a PDF file.
View online with eReader .
Share this Publication link
Copying failed.
Share on social media
Affiliations, export citations.
- Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
- Download citation
- Copy citation
We are preparing your search results for download ...
We will inform you here when the file is ready.
Your file of search results citations is now ready.
Your search export query has expired. Please try again.
![image steganography thesis Purdue University Graduate School](https://876az-branding-figshare.s3-eu-west-1.amazonaws.com/hammer/logo_header.png)
Image Steganography Using Deep Learning Techniques
Digital image steganography is the process of embedding information withina cover image in a secure, imperceptible, and recoverable way.The three main methods of digital image steganography are spatial, transform, and neural network methods. Spatial methods modify the pixel valuesof an image to embed information, while transform methods embed hidden information within the frequency of the image.Neural network-based methods use neural networks to perform the hiding process, which is the focus of the proposed methodology.
This research explores the use of deep convolutional neural networks (CNNs) in digital image steganography. This work extends an existing implementation that used a two-dimensional CNN to perform the preparation, hiding, and extraction phases of the steganography process. The methodology proposed in this research, however, introduced changes into the structure of the CNN and used a gain function based on several image similarity metrics to maximize the imperceptibility between a cover and steganographic image.
The performance of the proposed method was measuredusing some frequently utilized image metrics such as structured similarity index measurement (SSIM), mean square error (MSE), and peak signal to noise ratio (PSNR). The results showed that the steganographic images produced by the proposed methodology areimperceptible to the human eye, while still providing good recoverability. Comparingthe results of the proposed methodologyto theresults of theoriginalmethodologyrevealed that our proposed network greatly improved over the base methodology in terms of SSIM andcompareswell to existing steganography methods.
College of Engineering, Technology, and Computer Science at Purdue University Fort Wayne
Degree type.
- Master of Science
- Computer Science
Campus location
Advisor/supervisor/committee chair, advisor/supervisor/committee co-chair, additional committee member 2, additional committee member 3, usage metrics.
- Image processing
- Computer graphics
![image steganography thesis CC BY-ND 4.0](https://s3-eu-west-1.amazonaws.com/staticfigassets/images/CC-BY-ND.png)
- Corpus ID: 11829365
An overview of image steganography
- Tayana Morkel , J. Eloff , M. Olivier
- Published in Information Security for… 2005
- Computer Science
Figures and Tables from this paper
![image steganography thesis figure 1](https://d3i71xaburhd42.cloudfront.net/bb261e7f02f8597b37a2f71e55c2e2c21aa7575f/3-Figure1-1.png)
718 Citations
An image steganography technique with high hiding capacity based on 24 bit color image, a survey on various approaches of image steganography, image steganography techniques: an overview, a comparative study of image steganography techniques, a secure image steganography using least significant bit technique, steganography-a sin qua non for disguised communication, a technique to hide information within image file for secure transmission, image steganography techniques : an overview.
- Highly Influenced
A Review on Image Steganography
Image steganography using lsb and edge - detection technique, 22 references, spread spectrum image steganography, high capacity image steganographic model, exploring steganography: seeing the unseen.
- Highly Influential
- 10 Excerpts
Digital steganography: hiding data within data
Steganography and steganalysis, significance of steganography on data security, hide and seek: an introduction to steganography, on the limits of steganography, steganalysis of images created using current steganography software, steganography: the art of hiding information in plain sight, related papers.
Showing 1 through 3 of 0 Related Papers
![](http://viettel.site/777/templates/cheerup1/res/banner1.gif)
IMAGES
VIDEO
COMMENTS
Steganography is the art and science of hiding the data in some cover media like image file, audio file, video file, text file etc. Out of the various cover media available image file is the most ...
The primary goal of this thesis is to study and experiment the different techniques used in Image Steganography. Steganography method, degree of efficiency, and results comparison will be performed by using the main image file ("cover image") and the stego image resulting from implementing steganography methods.
In image steganography, the statistical model of an image is crucial for hiding information in less detectable pixels and attaining better protection. This paper aims to present a systematic review of image steganography approaches. Articles are selected from reputable databases such as IEEE Explore, Web of Science (WOS), ACM, and Willey. ...
In the case of image steganography, four main characteristics have. to be evaluated, namely - security, robustness, perceptibility, and capacity. 4.5.1 Capacity Capacity is a metric to measure the amount of secret media that is hidden inside. the cover image with minimum distortion.
Adaptive spatial image steganography and steganalysis using perceptual modelling and machine learning. ... and generating stego images from the knowledge of the CNNs.Several contributions are made for both image steganography and steganalysis in this thesis. Firstly, inspired by the Ranking Priority Profile (RPP), a new cost function for ...
In order to improve the robustness of steganography, researchers have proposed end-to-end steganography methods, such as deep steganography [], HiDDeN [], SteganoGAN [], and IS-GAN [].As shown in Figure 1, the end-to-end steganography framework takes the cover image and secret message as input and finally outputs the decoded secret message.In particular, embedding and extracting secret ...
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes. Deep learning technology, which has emerged as a powerful tool in various applications including image steganography, has received increased attention recently. The main goal of this paper is to explore ...
steganographic noise may not always reside in the high-frequency zone of the cover image. For example, a recent embedding scheme called Clustering Modification Directions (CMD) follows a typical distribu- tion as it tries to embed in neighboring areas with similar embedding
Explore the latest full-text research PDFs, articles, conference papers, preprints and more on IMAGE STEGANOGRAPHY. Find methods information, sources, references or conduct a literature review on ...
This thesis is devoted to investigate and develop steganography schemes for embedding secret images in image files. While many existing schemes have been developed to perform well with respect to one or more of the above objectives, we aim to achieve optimal performance in terms of all these objectives.
Index Terms— Image steganography, style transfer, ste-ganalysis 1. INTRODUCTION Image steganography aims to hide secret information in im-ages without being detected on social networks. The cover image is the one that will be modified to carry the secret mes-sage, while the stego image is the output of the steganogra-phy algorithm.
Abstract. Steganography is the science that involves encrypting data in a suitable multimedia carrier, such as image, audio, and video files. The main purpose of image steganography is to hide the data in images. This means that it encrypts the text in the form of an icon. Steganography is done when there is communication takes place between ...
Image steganography can be broadly classified into spatial domain, transform domain, spread spectrum and model based steganography as depicted in Fig. 4.In spatial domain, secret message is embedded in pixel value directly whereas transform domain methods achieve embedding by first transforming the image from spatial to frequency domain using any one of the transforms such as discrete cosine ...
Image steganography is dedicated to hiding secret messages in digital images, and has achieved the purpose of covert communication. Recently, research on image steganography has demonstrated great potential for using GAN and neural networks. In this paper we review different strategies for steganography such as cover modification, cover ...
Steganography is the art of hiding data in a cover medium without arousing suspicion of the warden. In this thesis, we focus on the most popular and studied cover medium for steganography, digital images. In digital image steganography, the statistical model of an image is essential for hiding data in less detectable regions and achieving better security. This has been addressed in the ...
Statistical Steganalysis of Images. Download (3.64 MB) + Collect. thesis. posted on 2019-08-13, 13:12 authored by Min Huang. Steganalysis is the study of detecting secret information hidden in objects such as images, videos, texts, time series and games via steganography. Among those objects, the image is the most widely used object to hide ...
Library of Ph.D. Theses | EURASIP
A thesis submitted for the degree of Doctor of Philosophy Trinity 2016. Abstract The goal of steganography, the art of hiding information, is to send hidden messages ... Modern image steganography is concerned with minimising the cost of embedding, achieved by indirectly transmitting payload through the application
Image steganography is the technology of concealing secret messages within an image. Recently, generative image steganography has been developed, which conceals secret messages during image generation. However, existing generative image steganography schemes are often criticized for their poor steganographic capacity and extraction accuracy.
Digital image steganography is the process of embedding information withina cover image in a secure, imperceptible, and recoverable way.The three main methods of digital image steganography are spatial, transform, and neural network methods. Spatial methods modify the pixel valuesof an image to embed information, while transform methods embed hidden information within the frequency of the ...
This paper intends to give an overview of image steganography, its uses and techniques, and attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which Steganographic techniques are more suitable for which applications. : Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.
Steganography is a security method that hides secret data inside cover media where the very existence of the embedded secret data is not perceptible. The cover object can be image, audio or video; the most commonly used is an image file. This thesis presents a model for protecting the security and integrity of secret data
Thesis Report on Image Steganography - Free download as PDF File (.pdf), Text File (.txt) or read online for free. Scribd is the world's largest social reading and publishing site.
steganography. The text, audio, image, video, and DNA files can be used as a cover medium. For image steganography, secret information is sent over a communication network by hiding inside the cover image [4]. The image steganography is divided into two domains according to their applicability.