A Deep Dive into Deep Learning-Powered Steganography for Enhanced Security: Review

Abstract

Steganography—the practice of hiding data in digital media—has attracted a lot of interest because of its possible uses in secure communication. This study offers a thorough summary of the most recent developments in steganography, emphasizing the incorporation of deep learning (DL) methods in particular. The review explores several steganographic techniques, classifies them, and assesses the advantages and disadvantages of each. Moreover, it reviews current research projects that use DL to improve security and resilience in steganographic systems. This evaluation finds new trends, problems, and possibilities in the field by examining related studies. The major goal is to advance this field and broaden our understanding of steganography-based secure communication.

Country : Iraq

1 Anfal Shihab Ahmed2 Melad Jader Saeed

  1. Computer Science Department, University of Mosul, Mosul-Iraq
  2. Computer Science Department, University of Mosul, Mosul-Iraq

IRJIET, Volume 8, Issue 3, March 2024 pp. 79-89

doi.org/10.47001/IRJIET/2024.803011

References

  1. M. Ahmid and O. Kazar, “A Comprehensive Review of the Internet of Things Security,” J. Appl. Secur. Res., vol. 18, no. 3, pp. 289–305, 2023, doi: 10.1080/19361610.2021.1962677.
  2. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” J. Comput. Syst. Sci., vol. 80, no. 5, pp. 973–993, 2014, doi: https://doi.org/10.1016/j.jcss.2014.02.005.
  3. A.M. Fadhil, H. N. Jalo, and O. F. Mohammad, “Improved Security of a Deep Learning-Based Steganography System with Imperceptibility Preservation,” Int. J. Electr. Comput. Eng. Syst., vol. 14, no. 1, pp. 73–81, 2023, doi: 10.32985/ijeces.14.1.8.
  4. S. Waykole and A. Sharma, “Reversible Secured Data Hiding using Binary Encryption and Digital Bit Modification Scheme,” Transdiscipl. J. Eng. Sci., vol. 13, pp. 101–118, 2022, doi: 10.22545/2022/00181.
  5. J. Zhou, X. Dong, Z. Cao, and A. Vasilakos, “Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs,” IEEE Trans. Inf. Forensics Secur., vol. 10, pp. 1299–1314, Jun. 2015, doi: 10.1109/TIFS.2015.2407326.
  6. J. Domingo-Ferrer, O. Farràs, J. González, and D. Sánchez, “Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges,” Comput. Commun., vol. 140–141, pp. 38–60, May 2019, doi: 10.1016/j.comcom.2019.04.011.
  7. R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474–481, 1998, doi: 10.1109/49.668971.
  8. J. Mishra, “Video Steganography Techniques,” Int. Res. J. Eng. Technol., no. June, pp. 4694–4699, 2020.
  9. A.A., T. A., A.-H. Seddik, and S. M., “New Image Steganography Method using Zero Order Hold Zooming,” Int. J. Comput. Appl., vol. 133, no. 9, pp. 27–31, 2016, doi: 10.5120/ijca2016908016.
  10. M. A. Alsarayreh, M. A. Alia, and K. A. Maria, “A novel image steganographic system based on exact matching algorithm and key-dependent data technique,” J. Theor. Appl. Inf. Technol., vol. 95, no. 5, pp. 1212–1224, 2017.
  11. R. J. Mstafa and K. M. Elleithy, “A novel video steganography algorithm in DCT domain based on hamming and BCH codes,” 37th IEEE Sarnoff Symp. Sarnoff 2016, no. May, pp. 208–213, 2017, doi: 10.1109/SARNOF.2016.7846757.
  12. G. Rao, “Steganography Encryption Using Data,” Int. J. Comput. Electron. Asp. Eng., vol. 2, no. 3, pp. 57–60, 2021.
  13. R. J. M. and K. M. Elleithy, “Efficient and Robust Video Steganography Algorithms for Secure,” no. April, 2017.
  14. R. J. Mstafa and K. M. Elleithy, “A DCT-based robust video steganographic method using BCH error correcting codes,” 2016 IEEE Long Isl. Syst. Appl. Technol. Conf. LISAT 2016, no. October 2017, 2016, doi: 10.1109/LISAT.2016.7494111.
  15. O. Ahmed and W. Abdullah, “A Review of Intrusion Detection Systems,” Acad. J. Nawroz Univ., vol. 6, no. 3, pp. 106–111, 2017, doi: 10.25007/ajnu.v6n3a91.
  16. M. Reddy and K. B. Raja, “Wavelet based Secure Steganography with Scrambled Payload,” Int. J. Innov. Technol. Explor. Eng., no. 2, pp. 2278–3075, 2012.
  17. R. Doshi, P. Jain, and L. Gupta, “Steganography and its Applications in Security,” Int. J. Mod. Eng. Res., vol. 2, no. 6, pp. 4634–4638, 2012.
  18. S. C.P, S. T, and U. G, “A Study of Various Steganographic Techniques Used for Information Hiding,” Int. J. Comput. Sci. Eng. Surv., vol. 4, no. 6, pp. 9–25, 2013, doi: 10.5121/ijcses.2013.4602.
  19. J. Ashok, Y. RAJU, S. Munishankaraiah, and K. Srinivas, “Steganography: an Overview,” Int. J. Eng. Sci. Technol., vol. 2, no. 10, pp. 5985–5992, 2010.
  20. K. Koptyra and M. R. Ogiela, “Distributed steganography in PDF files - Secrets hidden in modified pages,” Entropy, vol. 22, no. 6, 2020, doi: 10.3390/E22060600.
  21. K. D. Abel, S. Misra, A. Agrawal, R. Maskeliunas, and R. Damasevicius, “Data Security Using Cryptography and Steganography Technique on the Cloud,” Lect. Notes Electr. Eng., vol. 834, no. 6, pp. 475–481, 2022, doi: 10.1007/978-981-16-8484-5_46.
  22. N. Hamid, A. Yahya, R. B. Ahmad, and O. M. Al-Qershi, “Image steganography techniques: an overview,” Int. J. Comput. Sci. Secur., vol. 6, no. 3, pp. 168–187, 2012.
  23. A.Kumar and K. Pooja, “SteKumar, A., & Pooja, K. (2010). Steganography- A Data Hiding Technique. International Journal of Computer Applications, 9(7), 19–23. https://doi.org/10.5120/1398-1887ganography- A Data Hiding Technique,” Int. J. Comput. Appl., vol. 9, no. 7, pp. 19–23, 2010.
  24. H. Kaur and J. Rani, “A Survey on different techniques of steganography,” MATEC Web Conf., vol. 57, 2016, doi: 10.1051/matecconf/20165702003.
  25. S. Narang and A. Shrivastava, “Various Steganographic Approaches : A Review,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 3, no. Viii, pp. 444–447, 2015.
  26. A.Arya and S. Soni, “Performance Evaluation of Secrete Image Steganography Techniques Using Least Significant Bit (LSB) Method,” Int. J. Comput. Sci. Trends Technol., vol. 6, no. 2, pp. 160–165, 2018.
  27. Al-Jaber.S.M, “Council for Innovative Research,” J. Adv. Chem., vol. 10, no. 1, pp. 2146–2161, 2015.
  28. V. Surabhy, P. N. P, and T. Mahalekshmi, “Real Time Approach for Secure Text Transmission Using Video Cryptography,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 9, no. 3, pp. 120–125, 2020.
  29. S. Mangasuli and A. Nelli, “A Framework for Efficient and Secure Information Transform by using LSB and Diffie Hellman Algorithm,” Int. J. Eng. Res. Technol., vol. 7, no. 08, pp. 1–5, 2019.
  30. T. A. Al-Asadi, “A Novel Method for Image Steganography Based on Texture Features,” Eur. Acad. Res., vol. II, no. 1, pp. 193–203, 2014.
  31. Z. K. AL-Ani, A. A. Zaidan, B. B. Zaidan, and H. O. Alanazi, “Overview: Main Fundamentals for Steganography,” J. Comput., vol. 2, no. June 2014, pp. 158–165, 2010.
  32. J. Madison, S. D. Dickman, C. Forensics, and T. Paper, “An Overview of Steganography An Overview of Steganography,” IOSR J. Comput. Eng., vol. 11, no. July, pp. 15–19, 2007.
  33. S. H. Abdullah, “Steganography Methods and some application ( The hidden Secret data in Image ),” 2009.
  34. R. K. Chawla, “Comparative Study on different Steganographic Techniques,” Int. J. Sci. Res. Manag., vol. 5, no. 06, pp. 5410–5414, 2017, doi: 10.18535/ijsrm/v5i6.08.
  35. D. K. Dake, G. K. Bada, and A. E. Dadzie, “Internet of Things (Iot) Applications in Education: Benefits and Implementation Challenges in Ghanaian Tertiary Institutions,” J. Inf. Technol. Educ. Res., vol. 22, no. August, pp. 311–338, 2023, doi: 10.28945/5183.
  36. H. Westermann and H. Westermann, “Using Artificial Intelligence to Increase Access to Justice,” no. March, 2023.
  37. M. M. Taye, “Understanding of Machine Learning with Deep Learning :,” Comput. MDPI, vol. 12, no. 91, pp. 1–26, 2023.
  38. Y. Qian, J. Dong, W. Wang, and T. Tan, Learning and transferring representations for image steganalysis using convolutional neural network. 2016. doi: 10.1109/ICIP.2016.7532860.
  39. M. M. Taye, “Theoretical Understanding of Convolutional Neural Network: Concepts, Architectures, Applications, Future Directions,” Computation, vol. 11, no. 3, 2023, doi: 10.3390/computation11030052.
  40. H. Sharma, “A Chronological Survey of Theoretical Advancements in Generative Adversarial Networks for Computer Vision,” 2023, [Online]. Available: http://arxiv.org/abs/2311.00995
  41. G. Xu, H. Wu, and Y. Q. Shi, “Structural Design of Convolutional Neural Networks for Steganalysis,” IEEE Signal Process. Lett., vol. 23, p. 1, May 2016, doi: 10.1109/LSP.2016.2548421.
  42. N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.
  43. M. Chaumont, Deep Learning in steganography and steganalysis from 2015 to 2018 To cite this version : HAL Id : lirmm-02087729 Deep Learning in steganog- raphy and steganalysis from. 2019.
  44. F. Tao, C. Cao, H. Li, B. Zou, L. Wang, and J. Sun, “Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion,” Appl. Sci., vol. 13, no. 11, 2023, doi: 10.3390/app13116588.
  45. B. Bashir and A. Selwal, “Towards Deep Learning-Based Image Steganalysis: Practices and Open Research Issues,” SSRN Electron. J., no. January, 2021, doi: 10.2139/ssrn.3883330.
  46. W. Tang, S. Tan, B. Li, and J. Huang, “Automatic Steganographic Distortion Learning Using a Generative Adversarial Network,” IEEE Signal Process. Lett., vol. 24, no. 10, pp. 1547–1551, 2017, doi: 10.1109/LSP.2017.2745572.
  47. H. Naito and Q. Zhao, A New Steganography Method Based on Generative Adversarial Networks. 2019. doi: 10.1109/ICAwST.2019.8923579.
  48. J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding data with deep networks,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11219 LNCS, pp. 682–697, 2018, doi: 10.1007/978-3-030-01267-0_40.
  49. Y. Ke, M. qing Zhang, J. Liu, T. ting Su, and X. yuan Yang, “Generative steganography with Kerckhoffs’ principle,” Multimed. Tools Appl., vol. 78, no. 10, pp. 13805–13818, 2019, doi: 10.1007/s11042-018-6640-y.
  50. R. Meng, Q. Cui, Z. Zhou, Z. Fu, and X. Sun, “A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things,” IEEE Access, vol. 7, no. c, pp. 90574–90584, 2019, doi: 10.1109/ACCESS.2019.2920956.
  51. J. Hayes and G. Danezis, “Generating steganographic images via adversarial training,” Adv. Neural Inf. Process. Syst., vol. 2017-Decem, pp. 1955–1964, 2017.
  52. Z. Wang, N. Gao, X. Wang, X. Qu, and L. Li, “SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks: 25th International Conference, ICONIP 2018, Siem Reap, Cambodia, December 13–16, 2018, Proceedings, Part II,” 2018, pp. 253–264. doi: 10.1007/978-3-030-04179-3_22.
  53. S. S. Ali, J. H. Al’Ameri, and T. Abbas, “Face Detection Using Haar Cascade Algorithm,” Proc. - CSCTIT 2022 5th Coll. Sci. Int. Conf. Recent Trends Inf. Technol., no. Aece, pp. 198–201, 2022, doi: 10.1109/CSCTIT56299.2022.10145680.
  54. E. A. Abbood, R. M. Neamah, and S. Abdulkadhm, “Text in image hiding using developed LSB and random method,” Int. J. Electr. Comput. Eng., vol. 8, no. 4, pp. 2091–2097, 2018, doi: 10.11591/ijece.v8i4.pp2091-2097.
  55. N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.
  56. S. S. Kumar, “A New Approach of Image Steganography Technique for Information Hiding using Nearest Filling Technique,” no. January 2016, pp. 14–17, 2017.
  57. R. Lin and S. Li, “An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/5586959.
  58. M. Lawnik, L. Moysis, and C. Volos, “Chaos-Based Cryptography: Text Encryption Using Image Algorithms,” Electronics, vol. 11, no. 19, 2022, doi: 10.3390/electronics11193156.