{"title":"Deep learning approach and cover image transportation: a multi-security adaptive image steganography scheme","authors":"Laman R. Sultan","doi":"10.1080/23080477.2023.2239611","DOIUrl":null,"url":null,"abstract":"ABSTRACT In this era of information security and communication, a major priority is the achievement of a robust and secure steganography system when thinking about information concealment. The development of such an information-hiding scheme demands that the scheme be able to hide a secret message within the cover media. The most vexing issues in existing steganography protocols are imperceptibility, security, and capacity, and researchers have frequently emphasized a trade-off between these issues. Scholars have consistently ignored the balance between security and payload because resolving one problem has been shown to have an impact on the other, and vice versa. To overcome these problems, an effective method known as the Conventional Neural Network based Edge Detection Method (CNN-EDM) has been presented for image steganography in this study. The CNN-EDM is used to improve the contributions of the proposed scheme. Four main stages were used to achieve the objectives in this research, beginning with the cover image and secret image preparation, followed by embedding, and culminating in extraction. The last stage is the evaluation stage, which employs several evaluations to benchmark the obtained results. A standard database from the Signal and Image Processing Institute (SIPI) containing color and grayscale images with 512 × 512 pixels was utilized in this study. Different parameters were used to test the performance of the suggested scheme based on security and imperceptibility (image quality). The image quality was evaluated using three important metrics: histogram analysis, peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM). Furthermore, two metrics were used to evaluate the security properties of the proposed system: the Human Visual System (HVS) and Chi-square (X2) attacks. The evaluations showed that the proposed scheme can enhance the capacity, invisibility, and security features and address the already existing problems in this domain. Graphical abstract","PeriodicalId":53436,"journal":{"name":"Smart Science","volume":"11 1","pages":"677 - 694"},"PeriodicalIF":2.4000,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Smart Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/23080477.2023.2239611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0
Abstract
ABSTRACT In this era of information security and communication, a major priority is the achievement of a robust and secure steganography system when thinking about information concealment. The development of such an information-hiding scheme demands that the scheme be able to hide a secret message within the cover media. The most vexing issues in existing steganography protocols are imperceptibility, security, and capacity, and researchers have frequently emphasized a trade-off between these issues. Scholars have consistently ignored the balance between security and payload because resolving one problem has been shown to have an impact on the other, and vice versa. To overcome these problems, an effective method known as the Conventional Neural Network based Edge Detection Method (CNN-EDM) has been presented for image steganography in this study. The CNN-EDM is used to improve the contributions of the proposed scheme. Four main stages were used to achieve the objectives in this research, beginning with the cover image and secret image preparation, followed by embedding, and culminating in extraction. The last stage is the evaluation stage, which employs several evaluations to benchmark the obtained results. A standard database from the Signal and Image Processing Institute (SIPI) containing color and grayscale images with 512 × 512 pixels was utilized in this study. Different parameters were used to test the performance of the suggested scheme based on security and imperceptibility (image quality). The image quality was evaluated using three important metrics: histogram analysis, peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM). Furthermore, two metrics were used to evaluate the security properties of the proposed system: the Human Visual System (HVS) and Chi-square (X2) attacks. The evaluations showed that the proposed scheme can enhance the capacity, invisibility, and security features and address the already existing problems in this domain. Graphical abstract
期刊介绍:
Smart Science (ISSN 2308-0477) is an international, peer-reviewed journal that publishes significant original scientific researches, and reviews and analyses of current research and science policy. We welcome submissions of high quality papers from all fields of science and from any source. Articles of an interdisciplinary nature are particularly welcomed. Smart Science aims to be among the top multidisciplinary journals covering a broad spectrum of smart topics in the fields of materials science, chemistry, physics, engineering, medicine, and biology. Smart Science is currently focusing on the topics of Smart Manufacturing (CPS, IoT and AI) for Industry 4.0, Smart Energy and Smart Chemistry and Materials. Other specific research areas covered by the journal include, but are not limited to: 1. Smart Science in the Future 2. Smart Manufacturing: -Cyber-Physical System (CPS) -Internet of Things (IoT) and Internet of Brain (IoB) -Artificial Intelligence -Smart Computing -Smart Design/Machine -Smart Sensing -Smart Information and Networks 3. Smart Energy and Thermal/Fluidic Science 4. Smart Chemistry and Materials