Secure Text Extraction From Complex Degraded Images by Applying Steganography and Deep Learning

This work's primary goal is to secure the transmission of text hidden within the cover image using steganography over a public network of computers. Steganography is a powerful tool for concealing information within a cover image so that the concealed message remains undetectable. As a result, steganography refers to concealed writing. The secure transmission of information over a public network communication channel using steganography occurs in two stages, the first on the sender side and the second on the receiver side. In the first phase, steganography is normally applied to conceal the encrypted information within the image as a cover. The encrypted data is implanted inside the cover image using an improved least significant bit steganography method. The secret key obtained by the embedding algorithm is shared with the message retrieval algorithm on the receiver side to retrieve the message. Finally, the embedded text message is identified using a hybrid convolution regression adaptive integrated neural network (CRAINN) approach.

[1]  Nilamani Bhoi,et al.  Circular spatial filtering under high-noise-variance conditions , 2008, Comput. Graph..

[2]  Michel Barlaud,et al.  Image coding using wavelet transform , 1992, IEEE Trans. Image Process..

[3]  Sanjay Kumar Pandey,et al.  A Survey of Bioinformatics Applications on Parallel Architectures , 2011 .

[4]  Anirban Sengupta,et al.  IP Core Steganography Using Switch Based Key-Driven Hash-Chaining and Encoding for Securing DSP Kernels Used in CE Systems , 2020, IEEE Transactions on Consumer Electronics.

[5]  Wassim Alexan,et al.  A High Capacity Geometrical Domain Based 3D Image Steganography Scheme , 2019, 2019 International Conference on Advanced Communication Technologies and Networking (CommNet).

[6]  Kinjal Patani,et al.  Advanced 3-Bit LSB Based on Data Hiding Using Steganography , 2020, Lecture Notes on Data Engineering and Communications Technologies.

[7]  M. S. Sreekutty,et al.  Security enhancement in image steganography for medical integrity verification system , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).

[8]  Guozhen Wang,et al.  Improvement SVM Classification Performance of Hyperspectral Image Using Chaotic Sequences in Artificial Bee Colony , 2020, IEEE Access.

[9]  I. Pitas,et al.  Multichannel Wiener filters in color image restoration based on AR color image modelling , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.

[10]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[11]  Md. Khalid Imam Rahmani,et al.  A Crypto-Steganography: A Survey , 2014 .

[12]  Mamta Juneja,et al.  An analysis of edge based image steganography techniques in spatial domain , 2014, 2014 Recent Advances in Engineering and Computational Sciences (RAECS).

[13]  Carl-Fredrik Westin,et al.  Affine adaptive filtering of CT data , 2000, Medical Image Anal..

[14]  Pamela C. Cosman,et al.  Medical image compression with lossless regions of interest , 1997, Signal Process..

[15]  Edward J. Delp,et al.  Adaptive lossless video compression using an integer wavelet transform , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[16]  Hui Li,et al.  ROI and FOI Algorithms for Wavelet-Based Video Compression , 2004, PCM.

[17]  K. Jyothi,et al.  An improved method for reversible data hiding steganography combined with cryptography , 2018, 2018 2nd International Conference on Inventive Systems and Control (ICISC).

[18]  Hanafy M. Ali,et al.  Hiding data in images using steganography techniques with compression algorithms , 2019, TELKOMNIKA (Telecommunication Computing Electronics and Control).

[19]  D. Vijendra Babu,et al.  Wavelet Based Medical Image Compression Using ROI EZW , 2009 .

[20]  Ralph Ewerth,et al.  A robust algorithm for text detection in images , 2003, 3rd International Symposium on Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the.

[21]  Samir Kumar Bandyopadhyay,et al.  Image feature based high capacity steganographic algorithm , 2019, Multimedia Tools and Applications.

[22]  Hyun Wook Park,et al.  Region-of-interest coding based on set partitioning in hierarchical trees , 2002, IEEE Trans. Circuits Syst. Video Technol..

[23]  I. Maglogiannis,et al.  Region of Interest Coding Techniques for Medical Image Compression , 2007, IEEE Engineering in Medicine and Biology Magazine.

[24]  Jean-Philippe Thiran,et al.  Text identification in complex background using SVM , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[25]  Chuan Qin,et al.  Reversible Image Steganography Scheme Based on a U-Net Structure , 2019, IEEE Access.

[26]  Jin Hyung Kim,et al.  Texture-Based Approach for Text Detection in Images Using Support Vector Machines and Continuously Adaptive Mean Shift Algorithm , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[27]  Mohammad Rahmati,et al.  Steganography in discrete wavelet transform based on human visual system and cover model , 2019, Multimedia Tools and Applications.

[28]  Samir Kumar Bandyopadhyay,et al.  A Unique Way to Generate Password at Random Basis and Sending it Using a New Steganography Technique , 2020 .

[29]  Anil K. Jain,et al.  Text information extraction in images and video: a survey , 2004, Pattern Recognit..

[30]  Yongfeng Huang,et al.  TS-RNN: Text Steganalysis Based on Recurrent Neural Networks , 2019, IEEE Signal Processing Letters.

[31]  Narendra Patel,et al.  Region of Interest Based Image Compression , 2014 .

[32]  Detlev Marpe,et al.  Very low bit-rate video coding using wavelet-based techniques , 1999, IEEE Trans. Circuits Syst. Video Technol..

[33]  Fayez Idris,et al.  An efficient method for region of interest coding in JPEG2000 , 2006 .

[34]  Abikoye OluwakemiC.,et al.  Efficient Data Hiding System using Cryptography and Steganography , 2012 .

[35]  Matti Pietikäinen,et al.  Adaptive document image binarization , 2000, Pattern Recognit..

[37]  Andrew T. Duchowski Representing multiple regions of interest with wavelets , 1998, Electronic Imaging.

[39]  A. A. Zaidan,et al.  New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity , 2019, IEEE Access.

[40]  Romany F. Mansour,et al.  An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications , 2017, Multidimens. Syst. Signal Process..

[41]  C. Kavitha,et al.  Enhanced Least Significant Bit Replacement Algorithm in Spatial Domain of Steganography Using Character Sequence Optimization , 2020, IEEE Access.

[42]  Edward J. Delp,et al.  Wavelet based rate scalable video compression , 1999, IEEE Trans. Circuits Syst. Video Technol..

[43]  Yongbing Xu,et al.  The performance analysis of wavelet in video coding system , 2011, 2011 International Conference on Multimedia Technology.

[44]  Jian Weng,et al.  Steganalysis of content-adaptive binary image data hiding , 2017, J. Vis. Commun. Image Represent..

[45]  Patrick Bas,et al.  Natural Steganography in JPEG Domain With a Linear Development Pipeline , 2021, IEEE Transactions on Information Forensics and Security.

[46]  Sabyasachi Pramanik,et al.  Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography , 2020, Multimedia Tools and Applications.

[47]  Alfredo Restrepo,et al.  Adaptive trimmed mean filters for image restoration , 1988, IEEE Trans. Acoust. Speech Signal Process..

[48]  Amal Abdulbaqi Maryoosh,et al.  Hiding Encrypted Text in Image using Least Significant Bit image Steganography Technique , 2020 .

[49]  Ravi Manne,et al.  Classification of Skin cancer using deep learning, Convolutional Neural Networks - Opportunities and vulnerabilities- A systematic Review , 2020 .

[50]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[51]  S. Bandyopadhyay,et al.  Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm , 2013, BIOINFORMATICS 2013.

[52]  Shashank Gupta,et al.  An innovative method of Text Steganography , 2015, 2015 Third International Conference on Image Information Processing (ICIIP).

[53]  Anupama Mishra,et al.  ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS , 2013 .

[54]  Subodh Wairya,et al.  Hybrid deep neural network with adaptive galactic swarm optimization for text extraction from scene images , 2020, Soft Comput..

[55]  Abdelwahab K. Alsammak,et al.  Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3 , 2017, Ain Shams Engineering Journal.