A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the steganographic image quality needs to be improved for the Human Visual System(HVS). Therefore, in this work, we propose a new high capacity image steganography method based on deep learning. The Discrete Cosine Transform(DCT) is used to transform the secret image, and then the transformed image is encrypted by Elliptic Curve Cryptography(ECC) to improve the anti-detection property of the obtained image. To improve steganographic capacity, the SegNet Deep Neural Network with a set of Hiding and Extraction networks enables steganography and extraction of full-size images. The experimental results show that the method can effectively allocate each pixel in the image so that the relative capacity of steganography reaches 1. Besides, the image obtained using this steganography method has higher Peak Signal-to-Noise Ratio(PSNR) and Structural Similarity Index(SSIM) values, reaching 40dB and 0.96, respectively.

[1]  Yazan Aljeroudi,et al.  Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.

[2]  Benedikt Boehm,et al.  StegExpose - A Tool for Detecting LSB Steganography , 2014, ArXiv.

[3]  Jessica J. Fridrich,et al.  Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.

[4]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[5]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[6]  Donghui Hu,et al.  Coverless Information Hiding Based on Robust Image Hashing , 2017, ICIC.

[7]  Gandharba Swain,et al.  Pixel Overlapping Image Steganography Using PVD and Modulus Function , 2018, 3D Research.

[8]  Cheng-Chi Lee,et al.  An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System , 2017, Sensors.

[9]  Gandharba Swain,et al.  Dual Stego-imaging Based Reversible Data Hiding Using Improved LSB Matching , 2019, International Journal of Intelligent Engineering and Systems.

[10]  Feng-Hsiag Hsiao,et al.  Applying elliptic curve cryptography to a chaotic synchronisation system: neural-network-based approach , 2017, Int. J. Syst. Sci..

[11]  Xiaogang Jin,et al.  Hidden message in a deformation-based texture , 2014, The Visual Computer.

[12]  Yuqi Fan,et al.  Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks , 2017, Secur. Commun. Networks.

[13]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[14]  Xue Ouyang,et al.  An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems , 2019, IEEE Access.

[15]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[16]  Kuo-Chen Wu,et al.  Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.

[17]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[18]  Khumanthem Manglem Singh,et al.  Image Encryption using Elliptic Curve Cryptography , 2015 .

[19]  Chin-Chen Chang,et al.  Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..

[20]  Jiwu Huang,et al.  Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework , 2016, IEEE Transactions on Information Forensics and Security.

[21]  Roberto Cipolla,et al.  SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[22]  Yoshua Bengio,et al.  Generative Adversarial Networks , 2014, ArXiv.

[23]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[24]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[25]  Rafia Rahim,et al.  End-to-end Trained CNN Encode-Decoder Networks for Image Steganography , 2017, ECCV Workshops.

[26]  Shumeet Baluja,et al.  Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.

[27]  Sorina Dumitrescu,et al.  Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..

[28]  Xuesong Wang,et al.  Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem , 2018, IEEE Access.

[29]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[30]  Chin-Chen Chang,et al.  A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..

[31]  Jianyi Liu,et al.  Invisible steganography via generative adversarial networks , 2018, Multimedia Tools and Applications.

[32]  Evgeny Burnaev,et al.  Steganographic generative adversarial networks , 2017, International Conference on Machine Vision.

[33]  Ruohan Meng A fusion steganographic algorithm based on Faster R-CNN , 2018 .

[34]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[35]  Erkki Oja,et al.  PicSOM - content-based image retrieval with self-organizing maps , 2000, Pattern Recognit. Lett..

[36]  Manisha Rana,et al.  A Comparative Study of Public Key Cryptosystem based on ECC and RSA , 2011 .

[37]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[38]  Chuan Qin,et al.  Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.

[39]  Xingming Sun,et al.  Coverless Image Steganography Without Embedding , 2015, ICCCS.

[40]  Bin Li,et al.  A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks , 2018, IEEE Access.

[41]  Moad Yassin Mowafi,et al.  Use of elliptic curve cryptography for multimedia encryption , 2013, IET Inf. Secur..

[42]  Wu-Lin Chen,et al.  A novel tamper detection scheme for BTC-compressed images , 2013 .