Image based Steganography has been in existence for a very long time and Kurak and McHugh were one of the earliest who proposed a method in which the secret data or image is embedded into the fourth least significant bit. But this method was not of much use since the intruder can easily access the hidden image or data since they know exactly the position of the hidden data. This is an example to show that this is an area in which security and efficiency can be improved by using different methodologies. This paper is proposed to build an architecture to hide single or multiple images also called hidden images which are the inputs to be hidden inside an outer image and then the combined image is converted into an Stego image, and the image looks like the outer image except that it is filled with the bits of information from the hidden image. From this Stego-image can be retrieved the original outer image using disclosure component which is the reveal network. A deep learning model has been developed and trained which consists of two layers namely preprocessing layers and embedding layers which will hide the data or image inside the outer image and convert it into a Stego image. Then from this Stego image the hidden data is extracted using reveal network. Only this reveal network can extract the data and no intruder can extract it since the embedding is done by the model and it does not use same or fixed pattern. This method helps to transmit sensitive information in a more secure and efficient manner. The extracted image from the outer image has an accuracy of 95 percent only for the first image and it decreases for each added hidden image and the MSE value is 0.01 and it increases for increasing number of hidden images. The model has a F1 score of 0.96.
Skip Nav Destination
Article navigation
29 July 2024
4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS 2023: ICIoT2023
26–28 April 2023
Kattankalathur, India
Research Article|
July 29 2024
Hiding data in images using deep neural networks
Ajay Samuel Victor;
Ajay Samuel Victor
a)
Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology
, Kattankulathur, Chengalpattu, Chennai, Tamil Nadu, 603 203, India
Search for other works by this author on:
Tanushka Roy;
Tanushka Roy
b)
Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology
, Kattankulathur, Chengalpattu, Chennai, Tamil Nadu, 603 203, India
Search for other works by this author on:
Anita Ramalingam
Anita Ramalingam
c)
Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology
, Kattankulathur, Chengalpattu, Chennai, Tamil Nadu, 603 203, India
c)Corresponding Author Email: [email protected]
Search for other works by this author on:
AIP Conf. Proc. 3075, 020155 (2024)
Citation
Ajay Samuel Victor, Tanushka Roy, Anita Ramalingam; Hiding data in images using deep neural networks. AIP Conf. Proc. 29 July 2024; 3075 (1): 020155. https://doi.org/10.1063/5.0217085
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
14
Views
Citing articles via
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
Effect of coupling agent type on the self-cleaning and anti-reflective behaviour of advance nanocoating for PV panels application
Taha Tareq Mohammed, Hadia Kadhim Judran, et al.
Design of a 100 MW solar power plant on wetland in Bangladesh
Apu Kowsar, Sumon Chandra Debnath, et al.
Related Content
ARPPNet-An improved hybrid deep network for spatial domain steganalysis
AIP Conf. Proc. (December 2024)
Analysis on improved scheme for reversible data hiding for encrypted images
AIP Conf. Proc. (July 2024)
Increased capacity of image based steganography using artificial neural network
AIP Conference Proceedings (September 2012)
Deep learning-based image Steganalysis
AIP Conf. Proc. (September 2024)
Security of digital image files using least significant bit and end of file method
AIP Conf. Proc. (July 2023)