Image based Steganography has been in existence for a very long time and Kurak and McHugh were one of the earliest who proposed a method in which the secret data or image is embedded into the fourth least significant bit. But this method was not of much use since the intruder can easily access the hidden image or data since they know exactly the position of the hidden data. This is an example to show that this is an area in which security and efficiency can be improved by using different methodologies. This paper is proposed to build an architecture to hide single or multiple images also called hidden images which are the inputs to be hidden inside an outer image and then the combined image is converted into an Stego image, and the image looks like the outer image except that it is filled with the bits of information from the hidden image. From this Stego-image can be retrieved the original outer image using disclosure component which is the reveal network. A deep learning model has been developed and trained which consists of two layers namely preprocessing layers and embedding layers which will hide the data or image inside the outer image and convert it into a Stego image. Then from this Stego image the hidden data is extracted using reveal network. Only this reveal network can extract the data and no intruder can extract it since the embedding is done by the model and it does not use same or fixed pattern. This method helps to transmit sensitive information in a more secure and efficient manner. The extracted image from the outer image has an accuracy of 95 percent only for the first image and it decreases for each added hidden image and the MSE value is 0.01 and it increases for increasing number of hidden images. The model has a F1 score of 0.96.

1.
S.
Baluja
, “
Hiding images in plain sight: Deep steganography
,” in
Proc. Adv. Neural Inf. Process. Syst.
,
2017
, pp.
2069
2079
.
2.
N.
Subramanian
,
I.
Cheheb
,
O.
Elharrouss
,
S.
Al-Maadeed
and
A.
Bouridane
, "
End-to-End Image Steganography Using Deep Convolutional Autoencoders
," in
IEEE Access
, vol.
9
, pp.
135585
135593
,
2021
, doi:.
3.
M. S.
Fu
and
O. C.
Au
, "
Data hiding watermarking for halftone images
",
IEEE Trans. Image Process.
, vol.
11
, no.
4
, pp.
477
484
, Apr.
2002
.
4.
Kreuk
,
F.
,
Adi
,
Y.
,
Raj
,
B.
,
Singh
,
R.
, and
Keshet
,
J.
Hide and speak: Deep neural networks for speech steganography
,
2019
.
5.
R.
Das
and
T.
Tuithung
, “
A novel steganography method for image based on Huffman encoding
,” in
Proc. 3rd Nat. Conf. Emerg. Trends Appl. Comput. Sci.
, Mar.
2012
, pp.
14
18
.
6.
N.
Patel
and
S.
Meena
, “
LSB based image steganography using dynamic key cryptography
,” in
Proc. Int. Conf. Emerg. Trends Commun. Technol. (ETCT)
, Nov.
2016
, pp.
1
5
.
7.
R.
Rahim
and
S.
Nadeem
, “
End-to-end trained cnn encoder-decoder networks for image steganography
,” in
Proc. Eur. Conf. Comput. Vis. (ECCV)
,
2018
, pp.
1
6
.
8.
R.
Zhang
,
S.
Dong
, and
J.
Liu
, “
Invisible steganography via generative adversarial networks
,”
Multimedia Tools Appl.
, vol.
78
, no.
7
, pp.
8559
8575
, Apr.
2019
.
9.
Hamza
Ozer
,
Ismail
Avcibas
,
Bulent
Sankur
, and
Nasir D.
Memon
.
Steganalysis of audio based on audio quality metrics
. In Electronic Imaging 2003, pages
55
66
.
International Society for Optics and Photonics
,
2003
10.
Hayes
,
J.
and
Danezis
,
G.
Generating steganographic images via adversarial training.
In NIPS,
2017
.
11.
G.
Swain
, “
Very high-capacity image steganography technique using quotient value differencing and LSB substitution
,”
Arabian J. Sci. Eng.
, vol.
44
, no.
4
, pp.
2995
3004
, Apr.
2019
.
12.
R.
Nur
, “
An approach of securing data using combined cryptography and steganography
,”
Int. J. Math. Sci. Comput.
, vol.
6
, no.
1
, pp.
1
9
, Feb.
2020
.
13.
X.
Duan
,
H.
Song
,
C.
Qin
, and
M. K.
Khan
, “
Coverless steganography for digital images based on a generative model
,”
Comput., Mater. Continua
, vol.
55
, no.
3
, pp.
483
493
, Jul.
2018
.
14.
S. C.
Pei
and
J. M.
Guo
, "
High-capacity data hiding in halftone images using minimal-error bit searching and least-mean square filter
”,
IEEE Trans. Image Process.
, vol.
15
, no.
6
, pp.
1665
1679
, Jun.
2006
.
15.
W.
Lu
,
Y.
Xue
,
Y.
Yeung
,
H.
Liu
,
J.
Huang
, and
Y.
Shi
, “
Secure halftone image steganography based on pixel density transition
,”
IEEE Trans. Dependable Secure Comput.
, vol.
18
, no.
3
, pp.
1137
1149
, May/Jun.
2019
.
This content is only available via PDF.
You do not currently have access to this content.