Secured Image Transmission Using a Novel Neural Network Approach and Secret Image Sharing Technique

In this paper we have combined both cryptography and steganography techniques. This provides the higher level of secure system in which the secret information can be transferred over any unsecured communication channel and to overcome the threat of intrusion. The presented work aims at secure image transmission where a random encryption algorithm is used to encrypt different shares of stego image, which is created when a secret image and the cover image are embedded together, and produces shares using a secret sharing technique. At the receiving end, decryption of the encrypted shares are done using an artificial neural network and hence eliminating the need of key exchange before the transmission of data which is a prerequisite for most of the general encryption algorithm. Artificial neural network is used to provide high security of data and to produce distortion less decrypted images. The reversible process is used to reconstruct the secret image from the decrypted images. Peak signal to noise ratio, structure similarity and mean square error are used to analyze the quality of stego images. The simulation results show that the secret is reconstructed without loss and the time taken for encryption and decryption is very less.

[1]  Jessica J. Fridrich,et al.  Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain , 2005, IS&T/SPIE Electronic Imaging.

[2]  Xingang You,et al.  Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm , 2005, 2005 5th International Conference on Information Communications & Signal Processing.

[3]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[4]  Der-Chyuan Lou,et al.  Steganographic Method for Secure Communications , 2002, Comput. Secur..

[5]  Chin-Chen Chang,et al.  New image steganographic methods using run-length approach , 2006, Inf. Sci..

[6]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[7]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  S.B. Sadkhan Cryptography : current status and future trends , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..

[11]  S. Han,et al.  Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..

[12]  Ming Yang,et al.  Applied image processing to multimedia information security , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[13]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[14]  Tao Zhang,et al.  Improved LSB matching steganography resisting histogram attacks , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[15]  Wen Gao,et al.  Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[16]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[17]  Kshetrimayum Jenita Devi A Secure Image Steganography Using LSB Technique and Random Pseudo Random Encoding Technique , 2013 .

[18]  Xuan Hou,et al.  Research of model of Quantum Learning Vector Quantization Neural Network , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[19]  Philip H. Goodman,et al.  Comparing artificial neural networks to other statistical methods for medical outcome prediction , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).

[20]  Tariq Jamil Steganography: the art of hiding information in plain sight , 1999 .

[21]  Chin-Chen Chang,et al.  A new (t, n) threshold image hiding scheme for sharing a secret color image , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[22]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[23]  Chin-Chen Chang,et al.  Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..

[24]  K.B. Raja,et al.  A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[25]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[26]  Yu-Chen Hu,et al.  Reversible image hiding scheme using predictive coding and histogram shifting , 2009, Signal Process..

[27]  Andrew Knight Basics of MATLAB and Beyond , 1999 .

[28]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[29]  Huaying Dong,et al.  Study on Characteristic of Fractional Master-Slave Neural Network , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.

[30]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[31]  Xian-Ting Zeng,et al.  Lossless Data Hiding Scheme Based on Adjacent Pixel Difference , 2009, 2009 International Conference on Computer Engineering and Technology.

[32]  Chin-Chen Chang,et al.  A novel secret image sharing scheme in color images using small shadow images , 2008, Inf. Sci..

[33]  Rathi Kannan Munukur,et al.  Neural network based decryption for random encryption algorithms , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[34]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[35]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[36]  Ingemar J. Cox,et al.  A comparative study of ± steganalyzers , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[37]  Rastislav Lukac,et al.  Digital image indexing using secret sharing schemes: a unified framework for single-sensor consumer electronics , 2005, IEEE Transactions on Consumer Electronics.

[38]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[39]  Jessica J. Fridrich,et al.  Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.

[40]  Jui-Cheng Yen,et al.  Design and realization of a new chaotic neural encryption/decryption network , 2000, IEEE APCCAS 2000. 2000 IEEE Asia-Pacific Conference on Circuits and Systems. Electronic Communication Systems. (Cat. No.00EX394).

[41]  Mark Owens March,et al.  A Discussion of Covert Channels and Steganography , 2002 .

[42]  Khalil Shihab,et al.  A Backpropagation Neural Network for Computer Network Security , 2006 .

[43]  Kun Chang Lee,et al.  Hybrid neural network-driven reasoning approach to bankruptcy prediction: comparison with MDA, ACLS, and neural network , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).

[44]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[45]  L.C. De Silva,et al.  Application of MultiLayer Perceptron Network as a one-way hash function , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).

[46]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[47]  Shou-wei Li Analysis of Contrasting Neural Network with Small-World Network , 2008, 2008 International Seminar on Future Information Technology and Management Engineering.

[48]  Chin-Chen Chang,et al.  Secret Image Hiding and Sharing Based on the (t, n)-Threshold , 2007, Fundam. Informaticae.

[49]  Jen-Bang Feng,et al.  A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..

[50]  T. Kondo Feedback GMDH-type neural network using prediction error criterion and its application to 3-dimensional medical image recognition , 2008, 2008 SICE Annual Conference.

[51]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[52]  Edward J. Delp,et al.  A Review of Data Hiding in Digital Images , 1999, PICS.

[53]  Pei-Yu Lin,et al.  Invertible secret image sharing with steganography , 2010, Pattern Recognit. Lett..

[54]  Ki-Hyun Jung,et al.  Data hiding method using image interpolation , 2009, Comput. Stand. Interfaces.

[55]  Herbert J. Mattord,et al.  Principles of Information Security , 2004 .

[56]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[57]  Ran-Zan Wang,et al.  Improved Invertible Secret Image Sharing with Steganography , 2011, 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.