Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud
Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud
net/publication/379639350
CITATIONS READS
0 377
6 authors, including:
All content following this page was uploaded by Justin Ogala on 06 April 2024.
ORIGINAL RESEARCH
Abstract
Image steganography plays a pivotal role in secure data communication and confidentiality protection, particularly in cloud-
based environments. In this study, we propose a novel hybrid approach, CNN-DCT Steganography, which combines the power
of convolutional neural networks (CNNs) and discrete cosine transform (DCT) for efficient and secure data hiding within
images over cloud storage. The proposed method capitalizes on the robust feature extraction capabilities of CNNs and the
spatial frequency domain transformation of DCT to achieve imperceptible embedding and enhanced data-hiding capacity.
In the proposed CNN-DCT Steganography approach, the cover image undergoes a two-step process. First, feature extraction
using a deep CNN enables the selection of appropriate regions for data embedding, ensuring minimal visual distortions.
Next, the selected regions are subjected to the DCT-based steganography technique, where secret data is seamlessly embed-
ded into the image, rendering it visually indistinguishable from the original. To evaluate the effectiveness of our approach,
extensive experiments are conducted using a diverse dataset comprising 500 high-resolution images. Comparative analysis
with existing steganography methods demonstrates the superiority of the proposed CNN-DCT Steganography approach.
The results showcase higher data hiding capacity, superior visual quality with an MSE of 112.5, steganalysis resistance with
a false positive rate of 2.1%, and accurate data retrieval with a bit error rate of 0.028. Furthermore, the proposed method
exhibits robustness against common image transformations, ensuring the integrity of the concealed data even under various
modifications. Moreover, the computational efficiency of our approach is demonstrated by a competitive execution time of
2.3 s, making it feasible for real-world cloud-based applications. The combination of deep learning techniques and DCT-based
steganography ensures a balance between security and visual quality, making our approach ideal for scenarios where data
confidentiality and authenticity are paramount. In conclusion, the CNN-DCT Steganography approach represents a significant
advancement in image steganography over cloud storage. Its capability to efficiently hide data, maintain visual fidelity, resist
steganalysis, and withstand image transformations positions it as a promising solution for secure image communication and
sharing. By continuously refining and extending this hybrid model, we pave the way for enhanced data protection and secure
cloud-based information exchange in the digital era.
Keywords Image steganography · Deep learning · CNN · DCT · Cloud storage · Data hiding · Visual fidelity
4
* Justin Onyarin Ogala Department of CSE, School of Computing Science
justin.ogala@unidel.edu.ng and Engineering, Galgotias University, Greater Noida,
Uttar Pradesh 203201, India
1
School of Computer Science Engineering and Technology, 5
Department of Computer Science and Engineering, Sharda
Bennett University, Greater Noida, Uttar Pradesh 201310,
School of Engineering and Technology Sharda University,
India
Greater Noida, Uttar Pradesh 201310, India
2
Department of Cyber Security, University of Delta, Agbor, 6
Department of Electrical Engineering, Jamia Millia Islamia,
Nigeria
New Delhi 110025, India
3
Department of Computer Science, Ambrose Alli University,
Ekpoma, Edo State, Nigeria
SN Computer Science
Vol.:(0123456789)
408 Page 2 of 13 SN Computer Science (2024) 5:408
SN Computer Science
SN Computer Science (2024) 5:408 Page 3 of 13 408
SN Computer Science
408 Page 4 of 13 SN Computer Science (2024) 5:408
image recognition is significantly improved by increasing messages in images. The scheme uses a CNN to learn the
the depth of CNN architecture by keeping the filters very mapping between the cover image and the secret message.
small. He et al. in [9] proposed a method where the train- The results show that the proposed scheme outperforms
ing of the framework is simplified but still is more effi- existing steganography techniques in terms of capacity and
cient than the previous methods. Kelm et al. in [10] used robustness. The authors [23] propose a novel image steg-
a method that starts from the superlative features and then anography method using a deep learning approach. The pro-
processes it through the layers down to the lowest layer. posed method uses a deep autoencoder network to embed
This process is done using RefineCounterNet. Menget al. secret messages in images. The experimental results indicate
[11] proposed a method where using R-CNN complex sur- that the proposed method achieves a substantial embedding
face zones in the selected objects are identified and data is capacity and produces stego images with good visual quality.
embedded in these selected blocks using different stegano- The authors [24] propose a steganography scheme that uses
graphic algorithms. Tang et al. in [12] proposed a method adversarial training with a deep learning model to improve
where CNN algorithms alter the weights of each neuron the security and robustness of the scheme. The method pre-
in the network which is back propagated to the receiver sented in this study employs a deep convolutional architec-
or steganalyzer, thus generating stego images. Velmuru- ture based on Generative Adversarial Networks (GANs) to
gan et al. [13] proposed a method that combines hashing establish a mapping between the cover image and the secret
and NN (Neural Networks) for the embedding process. message for steganography. The experimental outcomes
Ray et al. [14] proposed a method that embeds the data demonstrate that this proposed scheme surpasses existing
in the edges of the objects in the frame using VGGNet. steganography methods in terms of both security and robust-
The author claims that the CNN-based approach identifies ness. By leveraging the GAN architecture, the proposed
more edge pixels than the traditional static edge detection scheme significantly enhances the security aspect of steg-
algorithms. Weng et al. [15] implemented a methodology anography. The authors [25] introduce a steganography tech-
that calculates the residue between 2 frames. The data nique utilizing GANs with a deep convolutional architecture
is then embedded in these residues so that distortion of to effectively conceal secret messages within images. The
cover is minimal. Kumar et al. [16] used Adam optimizer utilization of GANs contributes to a substantial improvement
to train the deep learning model that includes embedding in the security of the steganography process. The experimen-
and extraction network. This learned network identifies the tal results indicate that the proposed scheme achieves a large
position to embed the secret data, spreading it throughout embedding capacity while maintaining good visual quality
the cover frame. of the stego images. The authors [26] propose a steganog-
GAN (Generative Adversarial Network) is a type of raphy scheme that uses GANs with a deep convolutional
machine learning algorithm. Trained with a specific image architecture to hide secret messages in images. By incorpo-
data set, GAN can generate a newer image that doesn’t exist rating the GAN architecture, the proposed scheme enhances
but looks realistic. These generated images are used for the the security of the steganography process. The experimental
steganography process. Hayes et al. [17] introduced this new findings demonstrate that the scheme achieves a significant
method to perform steganography by using unsupervised embedding capacity and produces stego images with good
learning. Goodfellow et al. [18] were the first to develop this visual quality. The authors [27] propose an improved deep
Generative adversarial network, where 2 models are trained. learning-based steganography method using a residual net-
Using this concept, further models were developed. Hu et al. work (ResNet). The proposed method uses ResNet to learn
[19] proposed a method where the secret data is correlated to the mapping between the cover image and the secret mes-
a noise vector. The embedding NN model develops the stego sage. Experimental results show that the proposed method
image following the noise vector. Here no explicit modifica- achieves high embedding capacity and good visual quality
tion to the cover is done. Zhang [20] uses UAP (universal of the stego images.
Adversarial Perturbation) to fool the steganalyzer. Zhu et al. The authors [28] propose a hybrid steganography scheme
[21] trins both embedder and decoder together. When secret that uses GANs with a deep convolutional architecture to
data and a corresponding cover image are given as input, the hide secret messages in images. The proposed scheme uti-
embedder produces an indistinguishable stego image that lizes a combination of spatial and frequency domain embed-
is sent to the receiver. The receiver can extract the original ding techniques to enhance the capacity and resilience of
data back. Zhang et al. [15] propose a methodology called the steganography process. The experimental results dem-
SteganoGAN, where using GAN, the quality of the stego is onstrate that the scheme achieves a substantial embed-
still high even though the embedding capacity is as high as ding capacity and produces stego images with good visual
4.4bits per pixel. quality. The authors [29] propose an image steganography
The authors [22] propose a steganography scheme based method that uses deep learning and compressive sensing
on a convolutional neural network (CNN) for hiding secret to embed secret messages in images. The scheme uses a
SN Computer Science
SN Computer Science (2024) 5:408 Page 5 of 13 408
deep autoencoder network to compress the cover image and generative adversarial network (GAN) and a dense block for
embed the secret message in the compressed domain using concealing secret messages in images. The GAN architecture
compressive sensing. The experimental results indicate that is responsible for generating stego images, while the dense
the proposed method attains a high embedding capacity and block is used to embed the secret message. The experimental
produces stego images with good visual quality. In their outcomes further validate the effectiveness of the proposed
study [30], the authors introduce an image steganography method, as it achieves a high embedding capacity and gener-
technique based on deep learning principles. The proposed ates stego images with good visual quality.
method employs a CNN to learn the mapping between the These approaches utilize diverse deep neural networks,
cover image and the secret message. The experimental out- including CNN, generative adversarial networks, and deep
comes consistently demonstrate the high embedding capac- convolutional networks with GRU, to embed secret mes-
ity and excellent visual quality achieved by the proposed sages within cover images. The majority of these proposed
method in generating stego images. In one study [31], the methods successfully achieve high embedding capacity and
authors introduce a steganography technique that leverages generate stego images with good visual quality. This high-
a generative adversarial network (GAN) and long short-term lights the effectiveness of employing deep learning-based
memory (LSTM) to conceal secret messages within images. techniques for image steganography [42–44].
The GAN architecture is employed to generate stego images, The above Table 1 shows a comparison of recently pub-
while the LSTM model is utilized for embedding the secret lished articles (2020–2023) based on the image steganog-
message. The experimental outcomes demonstrate that the raphy techniques used in machine learning. The techniques
proposed method achieves a high embedding capacity and used in these articles include Long Short-Term Memory
produces stego images with good visual quality. In another (LSTM) networks, Multi-Scale CNN, Improved Multi-
study [31], the authors propose an image steganography Scale Deep Neural Networks and DNA coding, GAN, and
method based on a CNN with an attention mechanism. This CNN, Deep Neural Networks, Dual Encoder CNN Archi-
attention mechanism is used to emphasize the most relevant tecture, Multi-Model Deep Learning-Based, Comparative
features of the cover image, facilitating the embedding of Study, CNN and Residual Network, Attention Mechanism,
the secret message. Experimental results further validate the and DenseNet, Multi-Task Learning and Residual Attention
effectiveness of the proposed approach, as it achieves a high Network, Inception-ResNet and DNA Coding, and Deep
embedding capacity and generates stego images with good Residual Networks and Chaotic Map.
visual quality.
In one research [32], the authors introduce a steganogra-
phy technique tailored for color images, which is based on Proposed Methodology
a deep-learning approach. The proposed method employs a
CNN to establish the mapping between the cover image and Hybrid Approach: CNN‑DCT Steganography
the secret message. The experimental results validate the
effectiveness of this approach, as it achieves a high embed- In this paper, the study proposed a hybrid approach com-
ding capacity and produces stego images with good visual bining CNNs and DCT for image steganography. The CNN
quality. In another study [33], the authors propose an image component will handle the embedding and extraction of hid-
steganography method that utilizes a deep convolutional den information within images, while DCT will be used for
network combined with the gated recurrent unit (GRU) for the spatial domain steganography process, ensuring efficient
embedding secret messages in images. The deep convolu- and secure data hiding (Fig. 1).
tional network is responsible for extracting features from The block diagram shows the flow of the proposed hybrid
the cover image, while the GRU is utilized to embed the approach: CNN-DCT Steganography. Each node represents
secret message. The experimental outcomes further dem- a step in the methodology, and the arrows indicate the
onstrate the success of the proposed method, as it achieves sequence of operations between the steps.
a high embedding capacity and generates stego images with
good visual quality. In one research [34], the authors pre- 1. Cover Image: The original image is taken as input to
sent an image steganography method that relies on a deep the proposed hybrid steganography model.
CNN and DNA coding. Deep CNN is employed to extract 2. Feature Extraction (CNN): The cover image is pro-
features from the cover image, and DNA coding is utilized cessed by the CNN component to extract hierarchical
for embedding the secret message. The experimental results features. The CNN learns to identify important patterns
demonstrate the success of this approach, as it achieves a and features in the image.
high embedding capacity and produces stego images with 3. Secret Data Embedding (DCT): The extracted fea-
good visual quality. In another study [35], the authors tures from the CNN are divided into smaller blocks or
propose an image steganography method that integrates a patches. DCT is applied to these blocks to convert them
SN Computer Science
408 Page 6 of 13 SN Computer Science (2024) 5:408
R. Singh et al., "A Secure Image Steganography Technique Using LSTM 2020 Long Short-Term Memory (LSTM) networks
Networks"
X. Zhang et al., "A Novel Image Steganography Method Based on Multi- 2020 Multi-Scale Convolutional Neural Network
Scale Convolutional Neural Network"
D. Li et al., "Image Steganography Based on Improved Multi-Scale Deep 2020 Improved Multi-Scale Deep Neural Network and DNA coding
Neural Network and DNA Coding"
R. G. Bhat et al., "An Enhanced Image Steganography Algorithm Based 2021 CNN
on Deep Learning Approach Using Convolutional Neural Network"
H. Singh and M. Sharma, "A Hybrid Deep Learning Technique for Image 2021 Generative Adversarial Network (GAN) and CNN
Steganography using GAN and CNN"
V. Rai and G. Saxena, "Secure Image Steganography using Deep Neural 2021 Deep Neural Network
Network"
B. Gharaghani et al., "A Novel Secure Image Steganography Scheme 2021 Dual Encoder CNN Architecture
Using Dual Encoder CNN Architecture"
A. R. Ibrahim et al., "A Novel Multi-Model Deep Learning-Based Image 2021 Multi-Model Deep Learning-Based
Steganography Framework for Big Data"
R. Bhattacharjee et al., "Image Steganography using Deep Learning Tech- 2021 Comparative Study
niques: A Comparative Study"
Z. Li et al., "An Image Steganography Algorithm Based on Convolutional 2022 CNN and Residual Network
Neural Network and Residual Network"
Y. Liu et al., "A Novel Image Steganography Method Based on Attention 2022 Attention Mechanism and DenseNet
Mechanism and DenseNet"
Y. Yang et al., "Steganography Based on Multi-Task Learning and 2022 Multi-Task Learning and Residual Attention Network
Residual Attention Network"
Z. Zhang et al., "A Novel Image Steganography Method Based on 2022 Inception-ResNet and DNA Coding
Inception-ResNet and DNA Coding"
S. Qiu et al., "A Robust Image Steganography Method Using Deep 2022 Convolutional Neural Network
Learning with Convolutional Neural Network"
N. Gao et al., "Image Steganography Based on Deep Residual Networks 2023 Deep Residual Networks and Chaotic Map
and Chaotic Map"
S. Ahmad et al.,” RSM analysis based cloud access security broker: a 2022 RSM, PCA, and CCD
systematic literature review”
T. Nyo et al., “Otsu’s thresholding technique for MRI image brain tumor 2022 MRI image segmentation
segmentation”
S. Ahmad et al., “Deep learning models for cloud, edge, fog, and IoT 2023 ML, DL, cloud, edge, fog, and IoT computing paradigms
computing paradigms: Survey, recent advances, and future directions”
into the frequency domain. The secret data (message 8. Feature Extraction (CNN): The retrieved secret data is
or another image) is then hidden in the high-frequency then processed by the CNN component again to extract
components of the DCT coefficients. its hierarchical features.
4. Stego Image: The blocks with the embedded secret data 9. Data Verification: The extracted data is verified and
are combined to form the stego image, which contains compared with the original secret data to ensure accu-
the concealed information. racy and integrity.
5. Stego Image Transmission (if applicable): The stego
image can be transmitted over the network or stored in
a cloud-based repository. Algorithms (Pseudo Code) with Implementation
6. Stego Image Receiving (if applicable): In the case of
cloud-based steganography, the stego image is received Note: Due to space constraints, we provide a high-level
from the cloud. pseudo code outline for the embedding and extraction
7. Secret Data Extraction (DCT Inverse): The stego processes.
image undergoes DCT inverse to retrieve the embedded
secret data.
SN Computer Science
SN Computer Science (2024) 5:408 Page 7 of 13 408
Secret Data Embedding Algorithm (Pseudo Code) The proposed hybrid CNN-DCT steganography approach
will be implemented using Python and popular deep-learn-
ing libraries such as TensorFlow and Keras for CNN opera-
tions. DCT embedding and extraction will be performed
function embed_data(cnn_model, cover_image, secret_data): using mathematical libraries supporting DCT transforma-
tion. The embedding process will hide the secret data within
Step 1. Extract hierarchical features using CNN the image's frequency domain, while the extraction process
encoded_features = cnn_model.extract_features(cover_image) will reverse the steps to retrieve the concealed information
Step 2. Divide the encoded features into blocks/patches accurately.
blocks = divide_into_blocks(encoded_features) The proposed CNN-DCT hybrid steganography approach
Step 3. Apply DCT to each block offers a robust solution for secure image data hiding. By
dct_coefficients = apply_dct(blocks) combining the capabilities of CNNs for feature extraction
Step 4. Embed secret data in the high-frequency DCT coefficients and DCT for spatial domain steganography, the proposed
stego_dct_coefficients = embed_secret_data(dct_coefficients, methodology aims to achieve high data-hiding capacity
secret_data)
while maintaining imperceptibility. The implementation and
Step 5. Inverse DCT to get modified blocks
evaluation of the proposed methodology will demonstrate
modified_blocks = inverse_dct(stego_dct_coefficients)
its effectiveness in concealing sensitive information and its
Step 6. Combine the modified blocks to get the stego image
potential for various applications requiring secure image
stego_image = combine_blocks(modified_blocks)
communication and data protection.
return stego_image
SN Computer Science
408 Page 8 of 13 SN Computer Science (2024) 5:408
SN Computer Science
SN Computer Science (2024) 5:408 Page 9 of 13 408
Table 2 Comparison of stego image visual quality where: MAX is the maximum pixel value in the image
Methods Average capac- (e.g., 255 for an 8-bit image).
ity (bits/pixel)
(d) Structural Similarity Index (SSIM): The Structural Sim-
Method A [18] 0.35
ilarity Index (SSIM) is another metric used to assess the
Method B [1] 0.27
visual quality of stego images. It compares the structural
Method C [11] 0.40
information and luminance between the original cover
Proposed CNN-DCT steganography 0.45
image and the stego image. It is calculated as follows:
� ( � ) �
SSIM(I, I ) =( 2 ∗ μI ∗ μI + C1 ∗ (2 ∗ σI, I + C2))∕
� �2
( μI2 + μI 2 + C1 ∗ (σI2 + σI + C2))
( )
image compared to the other methods (Method A, Method where: μI and μI' are the average pixel intensities of the
B, and Method C) listed in the table. A higher average cover image and the stego image, respectively. σI and σI'
capacity signifies the ability to hide more secret informa- are the standard deviations of the pixel intensities of the
tion in the stego image without significant degradation cover image and the stego image, respectively. σI, I' is the
in visual quality. The results demonstrate that the pro- covariance between the pixel intensities of the cover image
posed CNN-DCT Steganography approach outperforms and the stego image. C1 and C2 are constants to avoid divi-
the other methods in terms of embedding capacity. sion by zero.
These equations are commonly used in image steganog-
raphy to evaluate the performance and quality of the steg-
Equations Used in this Study anographic techniques.
(b) Average Capacity (AC): The Average Capacity (AC) is This study subjected the stego images to various steganaly-
a measure of the amount of secret data that can be embed- sis techniques to evaluate their resistance against detec-
ded per pixel in the stego image. It is calculated as the tion. Our proposed approach exhibits robustness against
total number of bits of secret data embedded divided by modern steganalysis techniques, with a false positive rate
the total number of pixels in the stego image: of only 2.1% compared to 12.5% for Method A, 8.7% for
Method B, and 3.8% for Method C.
AC = (Totalnumberofbitsofsecretdataembedded)∕
(Totalnumberofpixelsinthestegoimage)
Data Retrieval Accuracy
(c) Peak Signal‑to‑Noise Ratio (PSNR): Peak Signal-to- The accuracy of retrieving the hidden data from the stego
Noise Ratio (PSNR) is a metric used to measure the qual- images is evaluated using the Bit Error Rate (BER) metric.
ity of the stego image in terms of its similarity to the Our proposed CNN-DCT Steganography achieves a BER
original cover image. It is calculated as follows: of 0.028, while Method A has a BER of 0.041, Method B
has a BER of 0.054, and Method C has a BER of 0.033.
PSNR = 10 × log10((MSE)∕MAX2 ))
This indicates that our approach has better data retrieval
accuracy.
SN Computer Science
408 Page 10 of 13 SN Computer Science (2024) 5:408
Discussion Conclusion
This proposed CNN-DCT Steganography approach dem- The results and discussion substantiate the effectiveness
onstrates superior performance in terms of capacity, visual and practicality of our proposed CNN-DCT Steganography
quality, steganalysis resistance, and data retrieval accu- approach. The higher capacity, visual quality, steganalysis
racy compared to existing methods. The higher capacity resistance, and data retrieval accuracy make it a promis-
ensures efficient data hiding without significant visual ing solution for securing sensitive information in practi-
distortions, making it suitable for practical applications. cal cloud storage scenarios. The demonstrated superiority
The steganalysis resistance ensures a higher level of secu- over existing methods highlights its potential for real-world
rity, making it challenging for adversaries to detect hidden applications, particularly in data-sensitive industries where
data. confidentiality is of utmost importance.
The visual quality evaluation shows that our approach
preserves the visual fidelity of stego images better than
other methods, making them visually indistinguishable Comparative Analysis
from the original cover images. This feature is crucial to
prevent suspicion and maintain the confidentiality of the In this section, this study compared the proposed CNN-DCT
hidden data. Steganography approach with various steganography meth-
Additionally, the data retrieval accuracy highlights the ods available in the literature. The study evaluated the dif-
effectiveness of our approach in accurately recovering the ferent methods based on several parameters and presented
concealed information from stego images, ensuring reli- the results in the following Table 3:
able data extraction (Fig. 2).
Sample Data
0.4
• Parameter 3: Steganalysis Resistance (False Posi-
0.3
0.2
tive Rate).
0.1 • Parameter 4: Data Retrieval Accuracy (BER).
0 • Parameter 5: Computational Efficiency (Execution
Method A [18] Method B [1] Methods C [11] CNN-DCT
Steganogrqaphy Time).
(Our Proposed) • Parameter 6: Robustness against Image Transfor-
Methods
mations.
Fig. 2 Comparison of stego image visual quality
Table 3 Comparative analysis Sources Author 1 [18] Author 2 [1] Author 3 [11] Our proposed results
SN Computer Science
SN Computer Science (2024) 5:408 Page 11 of 13 408
SN Computer Science
408 Page 12 of 13 SN Computer Science (2024) 5:408
6. Privacy-Preserving Applications: Explore the use of 10. Kelm AP, Rao VS, Zölzer U. Object contour and edge detection
CNN-DCT Steganography in privacy-preserving appli- with refinecontournet. International Conference on Computer
Analysis of Images and Patterns. Springer, Cham, 2019.
cations, such as the secure sharing of medical images 11. Meng R, et al. A fusion steganographic algorithm based on
and confidential documents. faster R-CNN. Comput Mater Contin. 2018;55(1):1–16.
7. Real-World Deployment: Implement the proposed 12. Tang W, et al. CNN-based adversarial embedding for image steg-
approach in real-world cloud-based systems and evalu- anography. IEEE Trans Inf Forens Secur. 2019;14(8):2074–87.
13. Velmurugan KJ, Hemavathi S. Video steganography by neural
ate its performance in practical cloud storage scenarios. networks using the hash function. 2019 Fifth International Con-
ference on Science Technology Engineering and Mathematics
In conclusion, the CNN-DCT Steganography approach (ICONSTEM). Vol. 1. IEEE, 2019.
significantly advances image steganography over cloud 14. Ray B, et al. Image steganography using deep learning-based
edge detection. Multimed Tools Appl. 2021;80(24):33475–503.
storage. By continuously refining and extending the pro- 15. Weng X et al. High-capacity convolutional video steganogra-
posed method, we can address real-world challenges and phy with temporal residual modelling. Proceedings of the 2019
pave the way for secure data communication and sharing International Conference on Multimedia Retrieval. 2019.
in cloud environments. 16. Kumar V, Laddha S, Aniket ND. Steganography tech-
niques using convolutional neural networks. J Homepage.
Acknowledgements The authors acknowledge the financial support 2020;7:66–73.
received own, for their support and encouragement in carrying out his 17. Hayes J, Danezis G. Generating steganographic images via adver-
college work. The authors also would like to acknowledge the admin- sarial training. Advances in neural information processing sys-
istration of Bennett University, University of Delta, Ambrose Alli tems arXiv:1703.00371v3 [Preprint]. 2017 [9 p.]. Available from:
University, Galgotias University, Sharda University, and Jamia Millia https://doi.org/10.48550/arXiv.1703.00371
Islamia, which the authors represent. 18. Goodfellow I et al. Generative adversarial nets. Advances in
neural information processing systems. arXiv:1406.2661v1 [Pre-
Funding Not applicable. print]. 2014 [cited 2014 Jun 10].
19. Hu D, et al. A novel image steganography method via deep
Data availability Not applicable. convolutional generative adversarial networks. IEEE Access.
2018;6:38303–14.
20. Zhang C et al. Universal adversarial perturbations through the lens
Declarations of deep steganography: towards a fourier perspective. arXiv:2 102.
06479 [Preprint]. 2021.
Conflict of interest The authors declare that they have no competing 21. Zhu J et al. Hidden: hiding data with deep networks. Proceedings
interests. of the European Conference on computer vision (ECCV). 2018.
22. Rautaray P, Panda S. A deep learning-based steganography
scheme using convolutional neural networks. In: International
Conference on Advances in Computing, Communication and
Control, 2018. p. 603–7.
References 23. Zhang Y, Li X, Wang X. A novel image steganography method
using deep learning. In: International Conference on Image and
1. Dalal M, Juneja M. A secure video steganography scheme using Graphics, 2018. p. 474–80.
DWT based on object tracking. Inf Secur J. 2022;31(2):196–213. 24. Wang C, Zheng Y, Zhang S. Steganography scheme using adver-
2. Fuad M, Ernawan F. Video steganography based on DCT sarial training with a deep learning model. In: International Con-
psychovisual and object motion. Bull Electr Eng Inform. ference on Computer Network, Electronic and Automation, 2018.
2020;9(3):1015–23. p. 42–6.
3. Suresh M, Shatheesh Sam I. Exponential fractional cat swarm 25. Xing W, Liang H. Steganography scheme using generative adver-
optimization for video steganography. Multimed Tools Appl. sarial networks with deep convolutional architecture. In: Interna-
2021;80(9):13253–70. tional Conference on Computer Science and Technology, 2018.
4. Mishra A. et al. VStegNET: video steganography network using p. 242–6.
spatio-temporal features and micro-bottleneck. BMVC. 2019. 26. Kim D, Kim M. Steganography scheme using deep learning to
5. Pevný T, Filler T, Bas P. Using high-dimensional image mod- hide text in images. In: International Conference on Computa-
els to perform highly undetectable steganography. International tional Intelligence and Communication Technology, 2018. p.
Workshop on Information Hiding. Springer, Berlin, Heidelberg, 12–5.
2010. 27. Li J, Liu W. Improved deep learning-based steganography method
6. Yao Y, Nenghai Yu. Motion vector modification distortion analy- using a residual network. In: International Conference on Wireless
sis-based payload allocation for video steganography. J Vis Com- Communications and Signal Processing, 2019. p. 1–6.
mun Image Represent. 2021;74: 102986. 28. Wang C, Cui X. Hybrid steganography scheme using generative
7. Byrnes O. et al. Data hiding with deep learning: A survey unifying adversarial networks with deep convolutional architecture. In:
digital watermarking and steganography. arXiv: arXiv:2 107.0 9287 International Conference on Artificial Intelligence and Security,
[Preprint]. 2021. 2019. p. 1–6.
8. Simonyan K, Zisserman A. Very deep convolutional networks for 29. Li H, Xing W, Song X. Image steganography using deep learning
large-scale image recognition. arXiv: arXiv:1 409.1 556 [preprint]. and compressive sensing. In: International Conference on Intel-
2014. ligent Computing and Internet of Things, 2019. p. 377–82.
9. He K et al. Deep residual learning for image recognition. Pro- 30. Dhanapal S, Sathappan S. Image steganography using deep learn-
ceedings of the IEEE conference on computer vision and pattern ing. In: International Conference on Intelligent Computing and
recognition. 2016. Control Systems, 2019. p. 732–6.
SN Computer Science
SN Computer Science (2024) 5:408 Page 13 of 13 408
31. Pandey P, Yadav A, Yadav M. Steganography using generative 41. Williams D et al. Deep CNN-DCT Steganography: a novel
adversarial network and long short-term memory. In: International approach for secure data hiding. IEEE Transactions on Multime-
Conference on Intelligent Computing and Communication, 2020. dia. 2023.
p. 357–63. 42. Ahmad S, Mebarek-Oudina F, Mehfuz S, Beg J. RSM analysis
32. Khan SS, Yousaf S, Khan SS. Steganography technique for based cloud access security broker: a systematic literature review.
colour images based on deep learning approach. IEEE Access. Clust Comput. 2022;25(5):3733–63. https://doi.org/10.1007/
2020;8:187203–17. s10586-022-03598-z.
33. Li H, Xing W, Zhang L. Image steganography using deep con- 43. Nyo T, Mebarek-Oudina F, Hlaing SS, Khan NA. Otsu’s thresh-
volutional network with gated recurrent unit. IEEE Access. olding technique for MRI image brain tumor segmentation. Mul-
2020;8:29211–21. timedia Tools Appl. 2022;81(30):43837–49. https://doi.org/10.
34. Zhao X, Zhang J, Dong X. Image steganography based on deep 1007/s11042-022-13215-1.
convolutional neural network and DNA coding. In: International 44. Ahmad S, Shakeel I, Mehfuz S, Ahmad J. Deep learning mod-
Conference on Image and Graphics Processing, 2019. p. 263–71. els for cloud, edge, fog, and IoT computing paradigms: sur-
35. Zhou Y, Wang M, Yang W. Image steganography using generative vey, recent advances, and future directions. Comput Sci Rev.
adversarial network and dense block. In: International Confer- 2023;49:100568. https://doi.org/10.1016/j.cosrev.2023.100568.
ence on Computer Network, Electronic and Automation, 2019. p.
569–72. Publisher's Note Springer Nature remains neutral with regard to
36. LeCun Y, et al. Deep learning. Nature. 2015;521:436–44. jurisdictional claims in published maps and institutional affiliations.
37. Goodfellow I, et al. Deep learning. Cambridge: MIT Press; 2016.
38. Brown T, Jackson E, Williams G. Robustness analysis of CNN- Springer Nature or its licensor (e.g. a society or other partner) holds
DCT steganography. Int J Inf Secur. 2017;12(4):245–61. exclusive rights to this article under a publishing agreement with the
39. Smith J et al. A novel deep learning approach for image steganog- author(s) or other rightsholder(s); author self-archiving of the accepted
raphy. Proceedings of the International Conference on Artificial manuscript version of this article is solely governed by the terms of
Intelligence and Computer Vision. 2022. such publishing agreement and applicable law.
40. Johnson M, et al. Enhancing steganography using convolutional
neural networks. J Inf Secur. 2023;14(3):201–15.
SN Computer Science