Comparative Performance Analysis Of Deep Learning-Based Image Steganography Using U-Net, V-Net, And U-Net++ Encoders

Main Article Content

Sapna Kaneria
Dr. Varsha Jotwani

Abstract

Digital Imaging steganography is the act of hiding information in a cover picture in a way that can't be found or recovered. Three main types of methods are used in digital image steganography: neural network methods, spatial methods, and transform methods. The pixel values of an image are changed by spatial methods to embed information. On the other hand, the frequency of the image is changed by transform methods to embed information that is hidden. There are methods that use neural networks to hide things, and this is what the suggested method is all about. Through digital image steganography, this study looks into how deep convolutional neural networks (CNNs) can be used. With the increasing concerns about data infringement during transmission and storage, image steganography techniques have gained attention for hiding secret information within cover images. Traditional methods suffer from limitations such as low embedding capacity and poor reconstruction quality. To address these challenges, deep learning-based approaches have been proposed in the literature. Among them, the Convolutional Neural Network (CNN) based U-Net encoder has been extensively studied. However, its comparative performance with other CNN-based encoders like V-Net and U-Net++ remains unexplored in the context of image steganography.


In this paper, we implement V-Net and U-Net++ encoders for image steganography and conduct a comprehensive performance assessment alongside U-Net architecture. These architectures are utilized to conceal a secret image within a cover image, and a unified and robust decoder is designed to extract the hidden information. Through experimental evaluations, we compare the embedding capacity, stego quality, and reconstruction quality of the three architectures. The U-Net architecture outperforms V-Net and U-Net++ in terms of embedding capacity and the quality of stego and reconstructed secret images. This research provides valuable insights into the effectiveness of different deep learning-based encoders for image steganography applications, aiding in the selection of appropriate architectures for securing digital images against unauthorized access.


 

Downloads

Download data is not yet available.

Article Details

How to Cite
Sapna Kaneria, & Dr. Varsha Jotwani. (2024). Comparative Performance Analysis Of Deep Learning-Based Image Steganography Using U-Net, V-Net, And U-Net++ Encoders. Journal of Advanced Zoology, 45(3), 602–622. https://doi.org/10.53555/jaz.v45i3.4390
Section
Articles
Author Biographies

Sapna Kaneria

Ph.D Scholar, Department of Computer Science, RNTU Bhopal

Dr. Varsha Jotwani

Professor and HOD, Department of Computer Science & IT, RNTU Bhopal

References

F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, CRC Press, 2017, http://dx.doi.org/10.1201/9781315121109.

N. Provos, P. Honeyman, Hide and seek: An introduction to steganography, IEEE Secur. Priv. Mag. 1 (2003) 32–44, http://dx.doi.org/10.1109/MSECP. 2003.1203220.

R. Amirtharajan, J.B. Balaguru Rayappan, An intelligent chaotic embedding approach to enhance stego-image quality, Inform. Sci. 193 (2012) 115–124, http://dx.doi.org/10.1016/j.ins.2012.01.010.

D. Artz, Digital steganography: hiding data within data, IEEE Internet Comput. 5 (2001) 75–80, http://dx.doi.org/10.1109/4236.935180.

A. Cheddad, J. Condell, K. Curran, P. Mc Kevitt, Digital image steganography: Survey and analysis of current methods, Signal Process. 90 (2010) 727–752, http://dx.doi.org/10.1016/j.sigpro.2009.08.010.

G. Fornarelli, A. Giaquinto, An unsupervised multi-swarm clustering technique for image segmentation, Swarm Evol. Comput. 11 (2013) 31–45, H.J. Highland, Data encryption: A non-mathematical approach, Comput. Secur. 16 (1997) 369–386, http://dx.doi.org/10.1016/S0167-4048(97)82243- 2.

M.S. Subhedar, V.H. Mankar, Current status and key issues in image steganography: A survey, Comput. Sci. Rev. 13–14 (2014) 95–113, http:

Min Wu, Bede Liu, Data hiding in image and video. I. Fundamental issues and solutions, IEEE Trans. Image Process. 12 (2003) 685–695,

S.N. Mali, P.M. Patil, R.M. Jalnekar, Robust and secured image-adaptive data hiding, Digit. Signal Process. 22 (2012) 314–323, http://dx.doi.org/10.1016/ j.dsp.2011.09.003. [11] F.a.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding-a survey, Proc. IEEE 87 (1999) 1062–1078,

N.F. Johnson, S. Jajodia, Exploring steganography: Seeing the unseen, Computer (Long. Beach. Calif). 31 (1998) 26–34, http://dx.doi.org/10.1109/ MC.1998.4655281.

N. Johnson, S. Katzenbeisser, A survey of steganographic techniques, Inf. Hiding (2000) 43–78, http://67.192.244.68/uploads/public/documents/ chapters/Petitcolas035-ch03.pdf.

N.F. Johnson, S. Jajodia, Steganalysis: the investigation of hidden information, in: 1998 IEEE Inf. Technol. Conf. Inf. Environ. Futur. (Cat. No.98EX228), IEEE, 1998, pp. 113–116, http://dx.doi.org/10.1109/IT.1998.713394.

C.-S. Hsu, S.-F. Tu, Finding optimal LSB substitution using ant colony optimization algorithm, in: 2010 Second Int. Conf. Commun. Softw. Networks, IEEE, 2010, pp. 293–297, http://dx.doi.org/10.1109/ICCSN.2010.61.

A.D. Ker, Steganalysis of LSB matching in grayscale images, IEEE Signal Process. Lett. 12 (2005) 441–444,

R.-Z. Wang, C.-F. Lin, J.-C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognit. 34 (2001) 671–683, http://dx.doi. org/10.1016/S0031-3203(00)00015-7.

D.-C. Wu, W.-H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognit. Lett. 24 (2003) 1613–1626, http://dx.doi.org/ 10.1016/S0167-8655(02)00402-6.

R.J. Anderson, F.A.P. Petitcolas, On the limits of steganography, IEEE J. Sel. Areas Commun. 16 (1998) 474–481,

S. Lee, C.D. Yoo, T. Kalker, Reversible image watermarking based on integer-to-integer wavelet transform, IEEE Trans. Inf. Forensics Secur. 2 (2007) 321–330,

Baluja, S. Hiding images in plain sight: Deep steganography. Adv. Neural Inf. Process. Syst. 2017, 30, 2069–2079.

Baluja, S. Hiding images within images. IEEE Trans. Pattern Anal. Mach. Intell. 2019, 42, 1685–1697.

Zhu, J.; Kaplan, R.; Johnson, J.; Fei-Fei, L. Hidden: Hiding data with deep networks. In Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany, 8–14 September 2018; pp. 657–672.

Luo, X.; Zhan, R.; Chang, H.; Yang, F.; Milanfar, P. Distortion agnostic deep watermarking. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 14–19 June 2020; pp. 13548–13557.

Qin, J.; Wang, J.; Tan, Y.; Huang, H.; Xiang, X.; He, Z. Coverless image steganography based on generative adversarial network.Mathematics 2020, 8, 1394.

Shang, Y.; Jiang, S.; Ye, D.; Huang, J. Enhancing the security of deep learning steganography via adversarial examples. Mathematics2020, 8, 1446.

Zhu, X.; Lai, Z.; Zhou, N.; Wu, J. Steganography with High Reconstruction Robustness: Hiding of Encrypted Secret Images. Mathematics 2022, 10, 2934.

Wang, Z.; Feng, G.; Wu, H.; Zhang, X. Data hiding during image processing using capsule networks. Neurocomputing 2023,537, 49–60

Zhang, C.; Benz, P.; Karjauv, A.; Sun, G.; Kweon, I.S. Udh: Universal deep hiding for steganography, watermarking, and light field messaging. Adv. Neural Inf. Process. Syst. 2020, 33, 10223–10234.

Chen, F.; Xing, Q.; Fan, C. Multilevel Strong Auxiliary Network for Enhancing Feature Representation to Protect Secret Images.IEEE Trans. Ind. Inform. 2021, 18, 4577–4586. [CrossRef]

Wang, Z.; Zhou, M.; Liu, B.; Li, T. Deep Image Steganography Using Transformer and Recursive Permutation. Entropy 2022,24, 878.

Akshay Kumara,∗, Rajneesh Rania, Samayveer Singh(2023) Encoder-Decoder Architecture for Image Steganography using Skip Connections. International Conference on Machine Learning and Data Engineering 10.1016/j.procs.2023.01.091

Tancik, M.; Mildenhall, B.; Ng, R. Stegastamp: Invisible hyperlinks in physical photographs. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 14–19 June 2020; pp. 2117–2126.

Wengrowski, E.; Dana, K. Light field messaging with deep photographic steganography. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15–20 June 2019; pp. 1515–1524.

Hayes, J.; Danezis, G. Generating steganographic images via adversarial training. Adv. Neural Inf. Process. Syst. 2017,30, 1954–1963.

Zhang, C.; Benz, P.; Karjauv, A.; Kweon, I.S. Universal adversarial perturbations through the lens of deep steganography: Towards a fourier perspective. In Proceedings of AAAI Conference on Artificial Intelligence, Virtual, 2–9 February 2021; pp. 3296–3304.

Jung, D.; Bae, H.; Choi, H.S.; Yoon, S. Pixelsteganalysis: Pixel-wise hidden information removal with low visual degradation.IEEE Trans. Dependable Secur. Comput. 2023, 20, 331–342.

Xiang, T.; Liu, H.; Guo, S.; Zhang, T. PEEL: A Provable Removal Attack on Deep Hiding. arXiv 2021, arXiv:2106.02779.

Zhong, S.; Weng, W.; Chen, K.; Lai, J. Deep-learning steganalysis for removing document images on the basis of geometric median pruning. Symmetry 2020, 12, 1426.

Szegedy, C.; Zaremba, W.; Sutskever, I.; Bruna, J.; Erhan, D.; Goodfellow, I.; Fergus, R. Intriguing properties of neural networks.arXiv 2013, arXiv:1312.6199.

Goodfellow, I.J.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. arXiv 2014, arXiv:1412.6572.

Chen, H.; Zhu, T.; Zhao, Y.; Liu, B.; Yu, X.; Zhou, W. Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness. arXiv 2023, arXiv:2303.13713.

Sapna Kaneria, Dr. Varsha Jotwani (2024), Advancements in Digital Steganography: A State-of-the-Art Review, IOSR Journal of Computer Engineering (IOSR-JCE); e-ISSN: 2278-0661, Volume 26, Issue 1, Ser. 1 (Jan. – Feb. 2024), pp 49-62. doi: : 10.9790/0661-2601014962.