Security Test Using StegoExpose on Hybrid Deep Learning Model for Reversible Image Steganography

  IJCTT-book-cover
 
         
 
© 2022 by IJCTT Journal
Volume-70 Issue-5
Year of Publication : 2022
Authors : Awodele Oludele , Idowu Sunday , Kuyoro Afolashade , Nzenwata Uchenna
DOI :  10.14445/22312803/IJCTT-V70I5P102

How to Cite?

Awodele Oludele , Idowu Sunday , Kuyoro Afolashade , Nzenwata Uchenna, "Security Test Using StegoExpose on Hybrid Deep Learning Model for Reversible Image Steganography," International Journal of Computer Trends and Technology, vol. 70, no. 5, pp. 7-14, 2022. Crossref, https://doi.org/10.14445/22312803/IJCTT-V70I5P102

Abstract

Image steganography is an act of concealing secret information using the image as a cover medium. It is said to be reversible when the same level of importance placed on the retrieval of the secret information is also placed on the recovery of the cover image. The process of hiding information in a cover is called steganography while retrieving the information that was hidden using steganography is called steganalysis. Image steganography is faced with challenges in payload capacity, security, and robustness. Attempts have been made to bring a good solution to this problem but end with a trade-oof in the payload capacity and the security. This paper attempts to solve this problem by proposing a Hybrid Deep Learning Model, which comprises DNN, CycleGAN, and CNN deep learning tools. The study`s outcome yielded a good payload capacity and a good security measure, which was evaluated using PSNR and SSIM.

Keywords
SSIM, CycleGAN, Payload, Security, StegoExpose.

Reference

[1] ALabaichi A, Al-Dabbas M. A. A. A. K, & Salih A, Image Steganography Using the Least Significant Bit and Secret Map Techniques, International Journal of Electrical & Computer Engineering. 10(1) (2020) 2088-8708.
[2] Rachael O, Misra S, Ahuja R, Adewumi A, Ayeni F, & Mmaskeliunas R, Image Steganography and Steganalysis Based on Least Significant Bit (LSB), In Proceedings of ICETIT, Springer, Cham. (2020) 1100-1111.
[3] Yari I. A, & Zargari S, An Overview and Computer Forensic Challenges in Image Steganography, In 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), and IEEE Smart Data (SmartData), IEEE. (2017) 360-364.
[4] Alsaidi N, Alshareef M, Alsulami A, Alsafri M, & Aljahdali A, Digital Steganography in Computer Forensics. Int. J. Comput. Sci. Inf. Secur. 18(5) (2020) 54-61.
[5] Laishram D, & Tuithung T, A Survey on Digital Image Steganography: Current Trends and Challenges, In Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT). (2018) 26-27.
[6] Idakwo M. A, Muazu M. B, Adedokun E. A, & Sadiq B. O, An Extensive Survey of Digital Image Steganography: State of the Art. ATBU Journal of Science, Technology, and Education. 8(2) (2020) 40-54.
[7] Verma V, Muttoo S. K, & Singh V. B, Enhanced Payload and Trade-Off for Image Steganography Via a Novel Pixel Digits Alteration, Multimedia Tools and Applications. 79(11) (2020) 7471-7490.
[8] Öfverstedt J, Lindblad J, & Sladoje N, Stochastic Distance Transform: Theory, Algorithms, and Applications, Journal of Mathematical Imaging and Vision. 62(5) (2020) 751-769.
[9] Yi Y, Hui L, Minghui X, & Yuntao W, High-Resolution Light Field Display Simulation Based on Frequency Domain Translation, Laser & Optoelectronics Progress. 59(1) (2020) 0107001.
[10] Duan X, Liu N, Gou M, Wang W, & Qin C, SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network, Entropy. 22(10) (2020) 1140.
[11] Zhang K. A, Cuesta-Infante A, Xu L, & Veeramachaneni K, SteganoGAN: High Capacity Image Steganography with GANs, arXiv preprint arXiv:1901.03892. (2019).
[12] Wang Z, Gao N, Wang X, Xiang J, Zha D, & Li L, HidingGAN: High Capacity Information Hiding with the Generative Adversarial Network, In Computer Graphics Forum. 38(7) (2019) 393-401.
[13] Yedroudj M, Chaumont M, Comby F, Oulad Amara A, & Bas P, Pixels-off: Data-Augmentation Complementary Solution for DeepLearning Steganalysis, In Proceedings of the 2020 ACM Workshop on Information Hiding and Multimedia Security. (2020) 39-48.
[14] Ruan F, Zhang X, Zhu D, Xu Z, Wan S, & Qi L, Deep Learning for Real-Time Image Steganalysis: A Survey, Journal of Real-Time Image Processing. 17(1) (2020) 149–160. https://doi.org/10.1007/s11554-019-00915-5
[15] Kodovský J, Fridrich J, & Holub V, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security. 7 (2012) 432-444.
[16] Babu J, Rangu S, & Manogna P, A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis, Journal of Information Security. 8(3) (2017) 186-202. https://doi.org/10.4236/jis.2017.83013
[17] Boehm B, Steg Expose - A Tool for Detecting LSB Steganography. (2014) 1–11. http://arxiv.org/abs/1410.6656
[18] Zhou X, Yao C, Wen H, Wang Y, Zhou S, He W, & Liang J, East: An Efficient and Accurate Scene Text Detector, In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. (2017) 5551-5560.
[19] Voravuthikunchai W, Crémilleux B, & Jurie F, Histograms of Pattern Sets for Image Classification and Object Recognition, In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. (2014) 224-231.
[20] Arjovsky M, Chintala S, & Bottou L, Wasserstein Generative Adversarial Networks, Proceedings of the 34th International Conference on Machine Learning, in Proceedings of Machine Learning Research. 70 (2017) 214-223. Available: https://proceedings.mlr.press/v70/arjovsky17a.html.
[21] Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, & Bengio Y, Generative Adversarial Networks, Communications of the ACM. 63(11) (2020) 139-144.
[22] Subramanian N, Cheheb I, Elharrouss O, Al-Maadeed S, & Bouridane A, End-to-End Image Steganography Using Deep Convolutional Autoencoders, IEEE Access. 9 (2021) 135585-135593.
[23] Kishore V, Chen X, Wang Y, Li B, & Weinberger K. Q, Fixed Neural Network Steganography: Train the Images, Not the Network, In International Conference on Learning Representations. (2021).
[24] Mittal S, A Survey on Modeling and Improving the Reliability of DNN Algorithms and Accelerators, Journal of Systems Architecture. 104 (2020) 101689.
[25] Harms J, Lei Y, Wang T, Zhang R, Zhou J, Tang X, & Yang X, The Paired Cycle GAN Based Image Correction for Quantitative Cone Beam Computed Tomography, Medical Physics. 46(9) (2019) 3998-4009