Image Steganography Using CNN: Shourya Chambial, Dhruv Sood
Image Steganography Using CNN: Shourya Chambial, Dhruv Sood
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 755
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 [Link] p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 756
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 [Link] p-ISSN: 2395-0072
network will be able to determine which areas are U-Net ImageNet The However,
redundant, allowing additional pixels to be buried in image is a the image is
certain areas. The amount of hidden data can be raised by coded only 64x64
saving space on superfluous areas. Because the structure message in pixels
and of itself. in size,
and weights can be randomized, the network will conceal The which is
data that is inaccessible to anyone who does not have the simplest quite little.
weights. and The images
most basic in the input
Table -3: CNN Based Methods architecture are simply
is chosen. concatenate
d.
Architectu Dataset Advantage Disadvanta
re s ges
Encoder- ImageNet Highly The loss Encoder- ImageNet The image However,
decoder secure and used isn't decoder is a coded the image is
with SCR dependable message in only 64x64
ideal. and of itself. pixels
In black or in size,
white areas, which is
visible noise quite little.
might be
seen.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 758
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 [Link] p-ISSN: 2395-0072
Some small amount of noise is also added to the images 4. Proposed algorithm
that are the output of the second network in order to make
sure that the system does not simply encode the secret The system that we have implemented in this project uses
image in the LSB. a CNN to hide an image inside another image hence
making the secrete image effectively invisible to the
We want to do image steganography, which involves observer. The neural networks that we have used in our
hiding an image inside one cover image. The concealed work determines where in the cover image it can hide the
images included in the cover image must be retrievable information and hence, is a more efficient process than
with minimal loss. The encoded cover image must LSB manipulation. We have also trained a decoder
resemble the original cover image in appearance. network to reveal the secret image from the container
image. This process is done in such a way that the
We transfer secret images over the prep network, then container image does not change much and the changes to
concatenate the resulting data with the carrier image the container image are not discernible.
before sending it over the Hiding network. The idea of
having decoders, one for each secret picture, to obtain the It can be safely assumed that the intruder does not have
secret image from the container image is then access to the original image. The secret image is effectively
implemented. hidden in all 3 colour channels of the container image.
To make our image retrieval model more secure, we 3 different activation functions were used to test the
expand on the concept of putting instead, a secret image network along with various learning rates.
with noise in the original cover image placing the secret
photos on the original cover's LSBs image. The activation functions used were:
Following is a brief overview of the encoder/decoder [Link] Linear Unit (RELU) {de-facto for most CNN
framework used in our technique: networks}
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 759
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 [Link] p-ISSN: 2395-0072
5. Results
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 760
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 [Link] p-ISSN: 2395-0072
ImageNet's Tiny ImageNet dataset is a subset of the larger PSNR 56.95 40.66 62.53 76.214
ImageNet dataset. The dataset consists of 100,000 photos
divided into 200 classes (500 images per class) that have SSIM - 0.964 - 0.965
been reduced to 6464 coloured images. There are 500
training images, 50 validation images, and 50 test
photographs in each class.
6. Conclusion and future work
The quality of image steganography is assessed using a
variety of approaches. Each of these methods evaluates a ● The network was constructed and is performing
different component of the steganographic outcome. Mean well. Even though it has shown good performance
Square Error (MSE), Peak Signal to Noise Ratio (PSNR), encoding and decoding, it is not a full proof
and Structured Similarity Index Measure (SSIM) are some system as every technology has its shortcomings.
of the well-known approaches. ● As stated in the disadvantages, there is a lot of
Mean Square Error (MSE):- scope of improvement in this project as there is a
chance that networks can be trained specifically
The averaged value of the square of the pixel-by-pixel for detecting that an image has been hidden inside
difference between the original image and the stego-image a given image.
is the Mean Square Error. It provides a measure of the
cover image error caused by the data embedding ● This project can be improved upon by creating a
procedure. A lower MSE value denotes a high-quality better architecture or by altering the architecture
embedding. of this network and improving its performance
further, making the secret image tougher to
Peak Signal to Noise Ratio (PSNR):- decode by any program other than the decoder
and to make it more difficult to detect the
PSNR is another useful metric for determining the degree presence of any secret image inside the encoded
of embedding-induced distortion in the cover image. It's image.
the ratio of a signal's greatest possible value to the power
of distortion noise (MSE). It is expressed in decibels (dB). REFERENCES
A higher PSNR value denotes a higher-quality embedding.
[1] H. Kato, K. Osuge, S. Haruta and I. Sasase, "A
Structured Similarity Index Measure (SSIM):- Preprocessing by Using Multiple Steganography for
Intentional Image Downsampling on CNN-Based
SSIM is a comparison statistic used to see how similar the Steganalysis," in IEEE Access, vol. 8, pp. 195578-
cover picture and the stego-image are. The perceived 195593, 2020, doi: 10.1109/ACCESS.2020.3033814.
difference between the two images is measured. We were
able to achieve MSE value of 0.006259255611669444, [2] Jin, Z., Yang, Y., Chen, Y. and Chen, Y., 2020. IAS-CNN:
PSNR value of 76.21412244818211 dB, and SSIM value of Image adaptive steganalysis via convolutional neural
0.96512678174912 network combined with selection channel.
International Journal of Distributed Sensor Networks,
In this section the results of the proposed methodology 16(3), p.1550147720911002.
are compared with the existing.
3 Xiang, Z., Sang, J., Zhang, Q., Cai, B., Xia, X. and Wu, W.,
Table -3: Comparative Study 2020. A new convolutional neural network-based
steganalysis method for content-adaptive image
Parameter [31] [32] [33] Proposed steganography in the spatial domain. IEEE Access, 8,
Algorith pp.47013-47020.
m
4 Duan, X., Liu, N., Gou, M., Wang, W. and Qin, C., 2020.
Dataset Lena and ImageNet 1 Tiny SteganoCNN: Image Steganography with
Baboon RGB ImageNet Generalization Ability Based on Convolutional Neural
image Network. Entropy, 22(10), p.1140.
Method GAN GAN LSB CNN
used
5 Duan, X., Guo, D., Liu, N., Li, B., Gou, M. and Qin, C.,
2020. A new high capacity image steganography
Architectur Tradition U NET Tradition Encoding method combined with image elliptic curve
e al Method al Method and cryptography and deep neural network. IEEE Access,
decoding 8, pp.25777-25788.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 761
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 [Link] p-ISSN: 2395-0072
6 Li, Q., Wang, X., Wang, X., Ma, B., Wang, C., Xian, Y. and Communication in Untrusted Channels (Master's
Shi, Y., 2020. A novel grayscale image steganography thesis).
scheme based on chaos encryption and generative
adversarial networks. IEEE Access, 8, pp.168166- [18] Lu, S. P., Wang, R., Zhong, T., & Rosin, P. L. (2021).
Large-
168176. Capacity Image Steganography Based on Invertible
Neural Networks. In Proceedings of the
7 Tang, W., Li, B., Tan, S., Barni, M. and Huang, J., 2019. IEEE/Computer Vision and Pattern Recognition (pp.
CNN-based adversarial embedding for image 10816-10825).
steganography. IEEE Transactions on Information
Forensics and Security, 14(8), pp.2074-2087. [19] Ruiz, H., Chaumont, M., Yedroudj, M., Amara, A. O.,
Comby, F., & Subsol, G. (2021, January). Analysis of the
[8] Yu, X., Tan, H., Liang, H., Li, C.T. and Liao, G., 2018, scalability of a deep-learning network for
December. A multi-task learning CNN for image steganography “Into the Wild”.Springer, Cham.
steganalysis. In 2018 IEEE International Workshop on
information forensics and security (WIFS) (pp. 1-7). 20 Byrnes, O., La, W., Wang, H., Ma, C., Xue, M., & Wu, Q.
IEEE. (2021). Data Hiding with Deep Learning: A Survey
Unifying Digital Watermarking and Steganography.
[9] Yuan, Y., Lu, W., Feng, B. and Weng, J., 2017, June. arXiv preprint arXiv:2107.09287.
Steganalysis with CNN using multi-channels filtered
residuals. In International Conference on Cloud 21 Zhangjie, F., Enlu, L., Xu, C., Yongfeng, H., & Yuting, H.
Computing and Security (pp. 110-120). Springer, (2021). Recent Advances in Image Steganography
Cham. Based on Deep Learning. Journal of Computer
Research and Development, 58(3), 548.
10 Duan, X., Guo, D., Liu, N., Li, B., Gou, M. and Qin, C.,
2020. A new high-capacity image steganography 22 Chang, C. C., Wang, X., Chen, S., Echizen, I., Sanchez, V.,
method combined with image elliptic curve & Li, C. T. (2021). Deep Learning for Reversible
cryptography and deep neural network. IEEE Access, Steganography: Principles and Insights. arXiv preprint
8, pp.25777-25788. arXiv:2106.06924.
11 Pibre, L., Pasquet, J., Ienco, D. and Chaumont, M., 2020. 23 Selvaraj, A., Ezhilarasan, A., Wellington, S. L. J., & Sam,
Deep learning is a good steganalysis tool when A. R. (2021). Digital image steganalysis: A survey on
embedding key is reused for different images, even if paradigm shift from machine learning to deep
there is a cover source mismatch. Electronic Imaging, learning based techniques. IET Image Processing.
2016(8), pp.1-11.
24 Chang, C. C. (2021). Neural Reversible Steganography
12 Kim, J., Park, H. and Park, J.I., 2020. CNN-based image with Long Short-Term Memory. Security and
steganalysis using additional data embedding. Communication Networks, 2021.
Multimedia Tools and Applications, 79(1), pp.1355-
1372. 25 Kweon, H., Park, J., Woo, S., & Cho, D. (2021). Deep
Multi-Image Steganography with Private Keys.
13 Zou, Y., Zhang, G. and Liu, L., 2019. Research on image Electronics, 10(16), 2021.
steganography analysis based on deep learning.
Journal of Visual Communication and Image [26] Bashir, B., & Selwal, A. (2021). Towards Deep Learning-
Representation, 60, pp.266-275. Based Image Steganalysis: Practices and Open
Research Issues. Available at SSRN 3883330.
14 Kweon, H., Park, J., Woo, S. and Cho, D., 2021. Deep
Multi-Image Steganography with Private Keys. 27 Salunkhe, S., & Bhosale, S. Feature Extraction Based
Electronics, 10(16), p.1906. Image Steganalysis Using Deep Learning.
[15] You, W., Zhang, H. and Zhao, X., 2020. A Siamese CNN 28 Das, A., Wahi, J. S., Anand, M., & Rana, Y. (2021). Multi-
for image steganalysis. IEEE Transactions on Image Steganography Using Deep Neural Networks.
Information Forensics and Security, 16, pp.291-306. arXiv preprint arXiv:2101.00350.
[16] Zhang, C., Lin, C., Benz, P., Chen, K., Zhang, W., & 29 Cui, J., Zhang, P., Li, S., Zheng, L., Bao, C., Xia, J., & Li, X.
Kweon, I. S. (2021). A brief survey on deep learning (2021). Multitask Identity-Aware Image
based data hiding, steganography and watermarking. Steganography via Minimax Optimization. arXiv
arXiv preprint arXiv:2103.01607. preprint arXiv:2107.05819.
[17] SUBRAMANIAN, N. (2021). Image Steganography [30] Cherian, R. E. Cryptography and Deep Neural
Using Deep Learning Methods to Detect Covert Network: An Art of Hiding Data in Images.
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 762
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 02 | Feb 2022 [Link] p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 763