Contact Us Search Paper

Hiding Data in Images Using Cryptography and Deep Neural Network

Kartik Sharma1, a, *, Ashutosh Aggarwal1, b, Tanay Singhania2, c, Deepak Gupta1, d, Ashish Khanna1, e

Corresponding Author:

Kartik Sharma

Affiliation(s):

1. Computer Science and Engineering Department, Guru Gobind Singh Indraprastha University, New Delhi, India
2. Applied Mathematics Department, Delhi Technological University, New Delhi, India
a. [email protected], b. [email protected], c. [email protected], d. [email protected], e. [email protected]
*Corresponding Author: Kartik Sharma

Abstract:

Steganography is an art of obscuring data inside another quotidian file of similar or varying types. Hiding data has always been of significant importance to digital forensics. Previously, steganography has been combined with cryptography and neural networks separately. Whereas, this research combines steganography, cryptography with the neural networks all together to hide an image inside another container image of the larger or same size. Although the cryptographic technique used is quite simple, but is effective when convoluted with deep neural nets. Other steganography techniques involve hiding data efficiently, but in a uniform pattern which makes it less secure. This method targets both the challenges and make data hiding secure and non-uniform.

Keywords:

Image Steganography, Cryptography, Convolutional Neural Network, Deep Learning, Digital Data Security

Downloads: 560 Views: 6863
Cite This Paper:

Sharma Kartik; Aggarwal Ashutosh; Singhania Tanay; Gupta Deepak; Khanna Ashish (2019). Hiding Data in Images Using Cryptography and Deep Neural Network. Journal of Artificial Intelligence and Systems, 1, 143–162. https://doi.org/10.33969/AIS.2019.11009.

References:

[1] Provos, N., & Honeyman, P. (2003). Hide and seek: An introduction to steganography. IEEE security & privacy, 1(3), 32-44. https://doi.org/10.1109/MSECP.2003.1203220
[2] Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26-34. https://doi.org/10.1109/MC.1998.4655281
[3] Morkel, Tayana & Eloff, Jan & Olivier, Martin. (2005). An overview of image steganography. 1-11.
[4] Fridrich, J., & Goljan, M. (2002, April). Practical steganalysis of digital images: state of the art. In Security and Watermarking of Multimedia Contents IV (Vol. 4675, pp. 1-13). International Society for Optics and Photonics. https://doi.org/10.1117/12.465263
[5] Shih, F. Y. (2017). Digital watermarking and steganography: fundamentals and techniques. CRC press. https://doi.org/10.1201/9781315219783
[6] Avcibas, I., Memon, N., & Sankur, B. (2003). Steganalysis using image quality metrics. IEEE transactions on Image Processing, 12(2), 221-229. https://doi.org/10.1109/TIP.2002.807363
[7] Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A survey on image steganography and steganalysis. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 142-172.
[8] Subhedar, M. S., & Mankar, V. H. (2014). Current status and key issues in image steganography: A survey. Computer science review, 13, 95-113. https://doi.org/10.1016/j.cosrev.2014.09.001
[9] Fridrich, J., Goljan, M., & Du, R. (2001, October). Reliable detection of LSB steganography in color and grayscale images. In Proceedings of the 2001 workshop on Multimedia and security: new challenges (pp. 27-30). ACM. https://doi.org/10.1145/1232454.1232466
[10] Neeta, D., Snehal, K., & Jacobs, D. (2006, December). Implementation of LSB steganography and its evaluation for various bits. In 2006 1st International Conference on Digital Information Management (pp. 173-178). IEEE. https://doi.org/10.1109/ICDIM.2007.369349
[11] Baluja, Shumeet. "Hiding Images in Plain Sight: Deep Steganography." NIPS (2017).
[12] Anderson, R. J., & Petitcolas, F. A. (1998). On the limits of steganography. IEEE Journal on selected areas in communications, 16(4), 474-481. https://doi.org/10.1109/49.668971
[13] Marwaha, P., & Marwaha, P. (2010, July). Visual cryptographic steganography in images. In 2010 Second international conference on computing, communication and networking technologies (pp. 1-6). IEEE. https://doi.org/10.1109/ICCCNT.2010.5591730
[14] Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011, April). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE. https://doi.org/10.1109/INNOVATIONS.2011.5893859
[15] Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333-17373. https://doi.org/10.1007/s11042-017-5308-3
[16] Jiang, N., Zhao, N., & Wang, L. (2016). LSB based quantum image steganography algorithm. International Journal of Theoretical Physics, 55(1), 107-123. https://doi.org/10.1007/s10773-015-2640-0
[17] Wang, H., & Wang, S. (2004). Cyber warfare: steganography vs. steganalysis. Communications of the ACM, 47(10), 76-82. https://doi.org/10.1145/1022594.1022597
[18] Basheer, I. A., & Hajmeer, M. (2000). Artificial neural networks: fundamentals, computing, design, and application. Journal of microbiological methods, 43(1), 3-31. https://doi.org/10.1016/S0167-7012(00)00201-3
[19] Yao, X. (1999). Evolving artificial neural networks. Proceedings of the IEEE, 87(9), 1423-1447. https://doi.org/10.1109/5.784219
[20] Zurada, J. M. (1992). Introduction to artificial neural systems (Vol. 8). St. Paul: West publishing company.
[21] Gardner, M. W., & Dorling, S. R. (1998). Artificial neural networks (the multilayer perceptron)-a review of applications in the atmospheric sciences. Atmospheric environment, 32(14-15), 2627-2636. https://doi.org/10.1016/S1352-2310(97)00447-0
[22] O'Shea, Keiron & Nash, Ryan. (2015). An Introduction to Convolutional Neural Networks. ArXiv e-prints.
[23] Tiwari, Prayag & Qian, Jia & Li, Qiuchi & Wang, Benyou & Gupta, Deepak & Khanna, Ashish & Rodrigues, Joel & Albuquerque, V.H.C.. (2018). Detection of Subtype Blood Cells using Deep Learning. Cognitive Systems Research. 52. 10.1016/j.cogsys.2018.08.022. https://doi.org/10.1016/j.cogsys.2018.08.022
[24] Khamparia, Aditya & Singh, Aman & Anand, Divya & Gupta, Deepak & Khanna, Ashish & Kumar, N Arun & Tan, Joseph. (2018). A novel deep learning-based multi-model ensemble method for the prediction of neuromuscular disorders. Neural Computing and Applications. 10.1007/s00521-018-3896-0. https://doi.org/10.1007/s00521-018-3896-0
[25] Khamparia, Aditya & Gupta, Deepak & Nhu, Nguyen & Khanna, Ashish & Pandey, Babita & Tiwari, Prayag. (2019). Sound Classification Using Convolutional Neural Network and Tensor Deep Stacking Network. IEEE Access. PP. 1-1. 10.1109/ACCESS.2018.2888882. https://doi.org/10.1109/ACCESS.2018.2888882
[26] Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems (pp. 1097-1105).
[27] Kim, Y. (2014). Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882. https://doi.org/10.3115/v1/D14-1181
[28] Gatys, L. A., Ecker, A. S., & Bethge, M. (2016). Image style transfer using convolutional neural networks. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 2414-2423). https://doi.org/10.1109/CVPR.2016.265
[29] Jaderberg, M., Vedaldi, A., & Zisserman, A. (2014). Speeding up convolutional neural networks with low rank expansions. arXiv preprint arXiv:1405.3866. https://doi.org/10.5244/C.28.88
[30] LeCun, Y., Kavukcuoglu, K., & Farabet, C. (2010, May). Convolutional networks and applications in vision. In Proceedings of 2010 IEEE International Symposium on Circuits and Systems (pp. 253-256). IEEE. https://doi.org/10.1109/ISCAS.2010.5537907
[31] Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. science, 313(5786), 504-507. https://doi.org/10.1126/science.1127647
[32] Kingma, Diederik & Ba, Jimmy. (2014). Adam: A Method for Stochastic Optimization. International Conference on Learning Representations.
[33] Kumar, Mohit & Agrawal, Akshat & Garg, Ankit. (2014). A Review on Various Digital Image Encryption Techniques and Security Criteria. International Journal of Computer Applications. 13. 10.5120/16854-6720. https://doi.org/10.5120/16854-6720
[34] Kaur, Rajinder. (2013). Image Encryption Techniques: A Selected Review. IOSR Journal of Computer Engineering. 9. 80-83. 10.9790/0661-0968083. https://doi.org/10.9790/0661-0968083
[35] Srivastava, Abhinav. "A survey report on Different Techniques of Image Encryption." (2012).
[36] Li, C. G., Han, Z. Z., & Zhang, H. R. (2002). Image encryption techniques: A survey [j]. Journal of Computer Research and Development, 10(023), 15.
[37] Khan, M., & Shah, T. (2014). A literature review on image encryption techniques. 3D Research, 5(4), 29. https://doi.org/10.1007/s13319-014-0029-0
[38] Geetha, P. & Vs, Jayanthi & A.N., Jayanthi. (2018). Optimal Visual Cryptographic Scheme with multiple share creation for Multimedia Applications. Computers & Security. 78. 10.1016/j.cose.2018.07.009. https://doi.org/10.1016/j.cose.2018.07.009
[39] Ye, G. (2010). Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognition Letters, 31(5), 347-354. https://doi.org/10.1016/j.patrec.2009.11.008
[40] Amnesh Goel, Nidhi Chandra "A Technique for Image Encryption Based On Explosive n*n Block displacement Followed By Inter-Pixel Displacement of RGB Attribute of A Pixel" 2012 International Conference on Communication Systems and Network Technologies, 11-13 May 2012, page: 884-888. https://doi.org/10.1109/CSNT.2012.190
[41] Peter Young, Alice Lai, Micah Hodosh and Julia Hockenmaier. From image descriptions to visual denotations: New similarity metrics for semantic inference over event descriptions, Transactions of the Association for Computational Linguistics, 2(Feb):67-78, 2014. https://doi.org/10.1162/tacl_a_00166
[42] Gopalan, K. (2003, July). Audio steganography using bit modification. In 2003 International Conference on Multimedia and Expo. ICME'03. Proceedings (Cat. No. 03TH8698) (Vol. 1, pp. I-629). IEEE. https://doi.org/10.1109/ICME.2003.1220996