IJSRP Paper Submission Format Double Column
IJSRP Paper Submission Format Double Column
ISSN 2250-3153
*
Electronics and Communication Department, JSS Academy Of Technical Education, Noida
Abstract- A picture's secret code is similar to image converting it into a secret code. It's like a very devious
steganography. It's a technique for concealing text, pictures, or approach to protect confidentiality. Thus, there are several
movies within other images. The great thing is that our eyes clever techniques that have been around for a while to
cannot see this buried information. Deep learning is a potent conceal information. However, as a result of the
technology that has been used recently for image steganography. abundance of content we share on social media and the
This work aims to investigate and discuss several deep learning internet, they are becoming increasingly significant. These
techniques applied to image steganography. These techniques days, steganography and cryptography are the two main
fall into three categories: conventional techniques, techniques strategies. Using cryptography is similar to making your
based on convolutional neural networks, and techniques based data extremely difficult to decipher. It's similar to
on general adversarial networks. We'll go over each kind. In this encoding your communication in a secret code that is
study, we also provide an extensive overview of the datasets visible to us.
utilized, the methodology employed for the experiments, and the
metrics applied. We also created a useful table to make it simple Steganography, on the other hand, functions more like a
to make it simple to locate the crucial information, we even ninja technique. It uses text, images, music, videos, and
created a helpful table. Our intention is to assist other files to conceal information from us directly. Another
researchers by compiling the most recent developments, technique is digital watermarking, which involves
obstacles, and prospects for this topic. It functions as a kind of concealing confidential information to reveal the owner.
manual for anyone curious about deep learning-based image Thus, although cryptography is the super hero of
steganography. information concealment, steganography is gaining
traction as a covert ninja that conceals things from view!
Data can be secretly played hide-and-seek with
Index Terms- CNN, EfficientNet b0, Image Steganalysis, steganography. It's the skill of enclosing a tiny, secret data
Multiclassifier, piece—like a message or image—inside a much bigger,
public data piece—like a file, video, image, or text. For
instance, we can secretly insert one image into another
I. INTRODUCTION using image steganography. Imagine for a moment that
you have a picture and that you wish to conceal something
When it comes to sending information through images, from view. Steganography fills that need. It cleverly
videos, and sounds—particularly in the context of the modifies the original image so that the concealed
Internet of Things (IoT)—technology has advanced information is hidden, in contrast to cryptography where
remarkably quickly in recent years. This data is typically the secret code is visible. The twist is that Steganalysis is a
transmitted over networks that may not be very secure. different player. It is similar to this game's detective.
Sharing images and videos on the internet is common Steganalysis attempts to determine whether a picture has a
among individuals and groups, but maintaining the hidden message and, if so, it attempts to reveal the
privacy and security of the data is a challenge. because location and content of the secret message. That makes it
there are many tools available for spying and other covert similar to the game of hiding and seeking secrets in
actions that can tamper with the data. Data encryption is images! Deep learning is a cutting-edge technique that is
one way that this issue can be resolved. It's similar to currently all the rage because of how useful it is for a
encoding your data with a unique key into a secret code. variety of tasks, including image recognition, speech
When it's received, the original information can be recognition, picture sorting, and even handling medical
restored using a different key to decode the secret code. images. Nowadays, there's this relatively new field called
There's a catch, though: the secret code appears to be a steganography where we may encrypt images and other
jumbled mess to the human eye, which makes one media. And what do you know? Convolutional neural
suspicious. Steganography is a very new and exciting field networks (CNNs) and generative adversarial networks
of study. It resembles a method used by secret agents to (GANs) are two techniques that deep learning is
conceal information. Steganography conceals the data so employing to enter the steganography market.
well that it is invisible to the human eye, as opposed to
http://dx.doi.org/10.29322/IJSRP.X.X.2018.pXXXX www.ijsrp.org
International Journal of Scientific and Research Publications, Volume X, Issue X, Month 2018 2
ISSN 2250-3153
http://dx.doi.org/10.29322/IJSRP.X.X.2018.pXXXX www.ijsrp.org
International Journal of Scientific and Research Publications, Volume X, Issue X, Month 2018 3
ISSN 2250-3153
In the spatial domain, consider several pixels and In recent years, deep learning models such as
calculate the difference between them. This pair can be convolutional neural networks (CNN or ConvNet) have
2 adjacent pixels. They can be selected in one block or been introduced and used in the image steganalysis
two blocks. Finally, a histogram is drawn showing the environment. Deep learning combines two levels of
presence of hidden messages. machine learning (feature extraction and classification)
into a compact model.
In the transformation, the frequency number of the
coefficients is calculated and then histogram analysis is Initial Processing: Convert colored input images to
performed. With the help of these features, it is possible grayscale to reduce computational complexity while
to distinguish between cover images and steganographic retaining hidden information. Utilize a standard function
images. However, this method does not provide such as "rgb2gray()" to perform the conversion. Grayscale
information about the embedding algorithm. To conversion simplifies subsequent analysis while
overcome this problem, we can select functions preserving the integrity of concealed data within the
according to function. images.
http://dx.doi.org/10.29322/IJSRP.X.X.2018.pXXXX www.ijsrp.org
International Journal of Scientific and Research Publications, Volume X, Issue X, Month 2018 4
ISSN 2250-3153
GLCM: Quantify texture properties based on spatial relationships [2] F. Hartung and M. Kutter, Multimedia watermarking
between pixel intensities. techniques, Proceedings of the IEEE, vol. 87, no. 7, July
1999.
Result: Combine extracted features into a comprehensive feature
[3] Martin A., Sapiro G., Seroussi G., Is image
vector representing each image.
steganography natural?, IEEE Transactions on Image
processing, 2005,
Classification:Employ advanced classifiers to discern between
original and altered images based on their feature vectors. Train [4] Kadhim I. J., Premaratne P., Vial P. J., Halloran B.,
Gaussian Discriminant Analysis (GDA) and Naïve Bayes Comprehensive survey of image steganography:
classifiers using feature vectors from both image types. Techniques, Evaluations, and trends in future research,
Neurocomputing, 2019.
Optimization: Employ techniques like feature selection,
parameter tuning, and ensemble methods to enhance classifier [5] Hussain M., Wahab A. W. A., Idris Y. I. B., Ho A.
performance. Ensure robustness and generalization across T., Jung K. H., Image steganography in spatial domain:
diverse datasets and steganographic techniques. A survey, Signal Processing: Image Communication,
2018.
http://dx.doi.org/10.29322/IJSRP.X.X.2018.pXXXX www.ijsrp.org
International Journal of Scientific and Research Publications, Volume X, Issue X, Month 2018 5
ISSN 2250-3153
[12] Sahu A. K., Swain G., A review on LSB [14] V. Holub and J. Fridrich, “Digital image
substitution and PVD based image steganography steganography using universal distortion,” in Proc. of
techniques, Indonesian Journal of Electrical Engineering the First ACM Workshop on Information Hiding and
and Computer Science, 2016. Multimedia Security, Montpellier, France, pp. 59–68,
2013.
[13] H. Wang and S. Wang, Cyber warfare
Steganography vsSteganalysis, ACM Commun. vol. 47,
pp. 76-82, October 2004.
http://dx.doi.org/10.29322/IJSRP.X.X.2018.pXXXX www.ijsrp.org