Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks

Main Article Content

Inas Ali Abdulmunem
Eman S. Harba
Hind S. Harba

Abstract

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program.

Article Details

How to Cite
1.
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks. Baghdad Sci.J [Internet]. 2021 Dec. 1 [cited 2024 Mar. 29];18(4):1317. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/5112
Section
article

How to Cite

1.
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks. Baghdad Sci.J [Internet]. 2021 Dec. 1 [cited 2024 Mar. 29];18(4):1317. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/5112

References

Sensarma D, Sarma SS. Data Hiding using Graphical Code based Steganography Technique. arXiv preprint arXiv:1509.08743. 2015 Sep 29.

Warf B, editor. The SAGE Encyclopedia of the Internet. Sage; 2018 May 15.

Yadav RM, Tomar DS, Baghel RK. A Study on Image Steganography Approaches in Digital Images EUSRM. 2014 May;6(5):1-6..

Shi YQ, Kim HJ, Pérez-González F, Yang CN, editors. Digital-Forensics and Watermarking: 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers. Springer; 2015 Jun 24.

Mishra M, Mishra P, Adhikary MC. Digital image data hiding techniques: A comparative study. arXiv preprint arXiv:1408.3564. 2014 Aug 15.

Hmood AK, Zaidan BB, Zaidan AA, Jalab HA. An overview on hiding information technique in images. JApSc. 2010 Dec;10(18):2094-100.

Meng R, Cui Q, Yuan C. A survey of image information hiding algorithms based on deep learning. CMES. 2018 Dec 1;117(3):425-54..

Weng X, Li Y, Chi L, Mu Y. High-Capacity Convolutional Video Steganography with Temporal Residual Modeling. InProceedings of the 2019 on International Conference on Multimedia Retrieval 2019 Jun 5 (pp.87-95).

Rawat W, Wang Z. Deep convolutional neural networks for image classification: A comprehensive review. Neural Comput. 2017 Sep;29(9):2352-449.

Gu J, Wang Z, Kuen J, Ma L, Shahroudy A, Shuai B, et al. Recent advances in convolutional neural networks. Pattern Recognit. 2018 May 1;77:354-77.

Zhou J, Cui G, Zhang Z, Yang C, Liu Z, Wang L, et al. Graph neural networks: A review of methods and applications. arXiv preprint arXiv:1812.08434. 2018 Dec 20.

Yedroudj M, Comby F, Chaumont M. Yedroudj-net: An efficient CNN for spatial steganalysis. In2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2018 Apr 15 (pp. 2092-2096). IEEE.

Salomon M, Couturier R, Guyeux C, Couchot JF, Bahi JM. Steganalysis via a convolutional neural network using large convolution filters for embedding process with same stego key: A deep learning approach for telemedicine. European Research in Telemedicine/La Recherche Européenne en Télémédecine. 2017 Jul 1;6(2):79-92.

Baluja S. Hiding images in plain sight: Deep steganography. InAdvances in Neural Information Processing Systems, 2017 (pp. 2069-2079)..

Zhu J, Kaplan R, Johnson J, Fei-Fei L. Hidden: Hiding data with deep networks. InProceedings of the European conference on computer vision (ECCV) 2018 (pp. 657-672).

Weng X, Li Y, Chi L, Mu Y. High-Capacity Convolutional Video Steganography with Temporal Residual Modeling. InProceedings of the 2019 on International Conference on Multimedia Retrieval 2019 Jun 5 (pp. 87-95).

Prasad K R. The Design and Development of Data Hiding Using Deep Learning. JASRAE. 2019;16(5): 970-974.

Kurak Jr CW, McHugh J. A cautionary note on image downgrading. InACSAC 1992 Dec 4 (pp. 153-159).

Hernandez-Castro JC, Blasco-Lopez I, Estevez-Tapiador JM, Ribagorda-Garnacho A. Steganography in games: A general methodology and its application to the game of Go. Comput Secur. 2006 Feb 1;25(1):64-71.

Hosmer C. Discovering hidden evidence. JDFP. 2006 Mar 1;1(1):47-56.

Khan I, Verma B, Chaudhari VK, Khan I. Neural network based steganography algorithm for still images. InINTERACT-2010 2010 Dec 3 (pp. 46-51). IEEE.

Qian Y, Dong J, Wang W, Tan T. Deep learning for steganalysis via convolutional neural networks. InMedia Watermarking, Security, and Forensics 2015 2015 Mar 4 (Vol. 9409, p. 94090J). International Society for Optics and Photonics.

Xu G. Deep convolutional neural network to detect J-UNIWARD. InProceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security. 2017 Jun 20 (pp. 67-73).

Tang W, Tan S, Li B, Huang J. Automatic steganographic distortion learning using a generative adversarial network. IEEE SPL. 2017 Aug 29;24(10):1547-51..

Zeng J, Tan S, Li B, Huang J. Large-scale JPEG image steganalysis using hybrid deep-learning framework. IEEE Transactions on Information Forensics and Security. 2017 Dec 4;13(5):1200-14..

Zhu J, Kaplan R, Johnson J, Fei-Fei L. Hidden: Hiding data with deep networks. InProceedings of the European conference on computer vision (ECCV) 2018 (pp. 657-672)..

Hussain I, He Q, Chen Z. Automatic fruit recognition based on dcnn for commercial source trace system. IJCSA. 2018;8.

Meng R, Cui Q, Yuan C. A survey of image information hiding algorithms based on deep learning. CMES. 2018 Dec 1;117(3):425-54.

Duan X, Guo D, Liu N, Li B, Gou M, Qin C. A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network. IEEE Access. 2020 Feb 4;8:25777-88.

Kishore DR, Suneetha D, Babu PN, Chinababu P. Deep Convolutional Neural Network-based Image Steganography Technique for Audio-Image Hiding Algorithm. IJEAT. 2020; 9(4):2187-2189.

Similar Articles

You may also start an advanced similarity search for this article.