2019
DOI: 10.33969/ais.2019.11009
|View full text |Cite
|
Sign up to set email alerts
|

Hiding Data in Images Using Cryptography and Deep Neural Network

Abstract: Steganography is an art of obscuring data inside another quotidian file of similar or varying types. Hiding data has always been of significant importance to digital forensics. Previously, steganography has been combined with cryptography and neural networks separately. Whereas, this research combines steganography, cryptography with the neural networks all together to hide an image inside another container image of the larger or same size. Although the cryptographic technique used is quite simple, but is effe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 126 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…quality. In order to solve the problem of revealing the semantic information of secret images through residual analysis, in 2019, Sharma et al [13] solved the problem of revealing secret images by scrambling and encrypting secret images; different from the algorithm proposed by Sharma et al, Duan et al et al [14] performed DCT transformation on the secret image, encrypted it using an elliptic curve encryption algorithm, embedded it into the cover image, and finally generate a secret image. In 2020, Buluja further improved the scheme [15], and solved the existing security problems through the encryption method of multi-graph embedding and image scrambling.…”
Section: Information Hiding Model Based On Encoder-decoder Networkmentioning
confidence: 99%
“…quality. In order to solve the problem of revealing the semantic information of secret images through residual analysis, in 2019, Sharma et al [13] solved the problem of revealing secret images by scrambling and encrypting secret images; different from the algorithm proposed by Sharma et al, Duan et al et al [14] performed DCT transformation on the secret image, encrypted it using an elliptic curve encryption algorithm, embedded it into the cover image, and finally generate a secret image. In 2020, Buluja further improved the scheme [15], and solved the existing security problems through the encryption method of multi-graph embedding and image scrambling.…”
Section: Information Hiding Model Based On Encoder-decoder Networkmentioning
confidence: 99%
“…From the residual image, we can clearly find some information from the secret image. In order to solve this problem, Duan et al [12] and Sharma et al [11] proposed to encrypt the secret image first and then embed the encrypted secret image into the cover image. Although these methods can hide the specific content of the secret image, the attacker may still think that the stego image is modified from cover image.…”
Section: High-capacity Image Steganography Algorithmsmentioning
confidence: 99%
“…Part of the semantic information of the secret image will be discovered. In response to this problem, some scholars have proposed that the secret image can be encrypted before embedding [11,12], although this method can solve the problem of the semantic information exposure of the secret image. However, if an attacker can obtain cover and stego images, he may think that the stego image is the result of cover image modification and will still question the existence of secret communication.…”
Section: Introductionmentioning
confidence: 99%
“…Every smart device is "monitoring" you, so personal data protection and privacy-preserved problems should be paid more attention to. Especially the release of GDPR in EU and EEA in 2016, more and more researchers have been digging into privacy-related works [12][13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%