Design of an Efficient Multimodal Image Steganography Framework with Multi-Domain Feature Analysis and Secret Sharing Operations

Authors

  • Ekta PhD Scholar, Bhagat Phool Singh Mahila Vishwavidyalaya, Haryana, India
  • Ajit Singh Professor, Dept. of CSE, Bhagat Phool Singh Mahila Vishwavidyalaya, Haryana, India

Keywords:

Multimodal steganography, Visual cryptography, Shamir Secret Sharing, Multi-domain feature analysis, Data security

Abstract

The study introduces an innovative multimodal picture steganography framework addressing data security concerns in digital communication. The framework integrates multi-domain feature analysis and secret-sharing techniques for enhanced security confidentiality. Utilizing resizing and bitwise operations for steganography, along with (n, k) Shamir Secret Sharing for visual cryptography, the model excels in security measures. The algorithmic approaches of the proposed model designed for text, image, audio, and video processing within the multimedia landscape are thoroughly discussed. Comparative analyses demonstrate the superior performance of the proposed model in terms of RMSE, MAE and PSNR across audio, video, picture, and text modalities when compared to existing models. Significant improvements are observed in RMSE values, with reductions of 45%, 36%, and 15%, along with the improved PSNR values in the audio case compared to Chen L, Chen Y and Mo X, respectively. In the image case, the model consistently achieves lower RMSE and MAE values with higher PSNR values, showing improvements of about 48%, 35%, and 13% compared to Chen L, Chen Y and Mo X. Video steganography sees approximately 30% and 21% reductions in RMSE values compared to Chen L and Chen Y, with improved PSNR values. Text steganography displays noteworthy advancements compared to Chen L, including a 13% reduction in delay compared to Mo X. The proposed model outperforms existing models Chen L, Chen Y and Mo X in audio, video, image, and text steganography. The proposed model demonstrates superior performance and reduced processing time and provides an effective solution for securely embedding information. With applications spanning digital media, telecommunications, and information security, it offers a reliable and versatile solution for secure data embedding in diverse scenarios.

Downloads

Download data is not yet available.

References

Su W, Ni J, Hu X, Fridrich J. Image Steganography with Symmetric Embedding Using Gaussian Markov Random Field Model. IEEE Transactions on Circuits and Systems for Video Technology. 2021 Mar;31(3):1001–15. doi: 10.1109/TCSVT.2020.3001122.

Hu, Y., Yang, Z., Cao, H., Huang, Y. (2021). Multimodal Steganography Based on Semantic Relevancy. In: Zhao, X., Shi, YQ., Piva, A., Kim, H.J. (eds) Digital Forensics and Watermarking. IWDW 2020. Lecture Notes in Computer Science(), vol 12617. Springer, Cham. https://doi.org/10.1007/978-3-030-69449-4_1

Tan J, Liao X, Liu J, Cao Y, Jiang H. Channel Attention Image Steganography With Generative Adversarial Networks. IEEE Transactions on Network Science and Engineering. 2022 Mar 1;9(2):888–903. doi: 10.1109/TNSE.2021.3139671.

Zhou H, Zhang W, Chen K, Li W, Yu N. Three-Dimensional Mesh Steganography and Steganalysis: A Review. IEEE Transactions on Visualization and Computer Graphics. 2022 Dec 1;28(12):5006–25. doi: 10.1109/TVCG.2021.3075136.

Ibrahim DR, Teh JS, Abdullah R. An overview of visual cryptography techniques. Multimedia Tools and Applications. 2021 Jul 21;80(21-23):31927–52. DOI: 10.1007/s11042-021-11229-9.

Xie Jia-liang, Wang H, Wu D. Adaptive Image Steganography Using Fuzzy Enhancement and Grey Wolf Optimizer. IEEE Transactions on Fuzzy Systems. 2022 Nov 1;30(11):4953–64. doi: 10.1109/TFUZZ.2022.3164791.

Butora J, Bas P. Side-Informed Steganography for JPEG Images by Modeling Decompressed Images. IEEE Transactions on Information Forensics and Security. 2023 Jan 1;18:2683–95. doi: 10.1109/TIFS.2023.3268884.

Qin X, Li B, Tan S, Tang W, Huang J. Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image Steganography. IEEE Transactions on Circuits and Systems for Video Technology. 2022 Aug 1;32(8):5110–23. doi: 10.1109/TCSVT.2022.3148406.

Li Z, Jiang X, Dong Y, Meng L, Sun T. An anti-steganalysis HEVC video steganography with high performance based on CNN and PU partition modes. IEEE Transactions on Dependable and Secure Computing. 2022;1–1. doi: 10.1109/TDSC.2022.3140899.

Wang W, Li Q. An Image Steganography Algorithm Based on PSO and IWT for Underwater Acoustic Communication. IEEE Access. 2022;10:107376–85. doi: 10.1109/ACCESS.2022.3212691.

Chen Y, Salcic Z, Wang H, Choo KKR, Zhang X. NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography. IEEE Transactions on Dependable and Secure Computing. 2022;1–16. doi: 10.1109/TDSC.2022.3182148.

Gurunath R, Alahmadi AH, Samanta D, Khan MZ, Alahmadi A. A Novel Approach for Linguistic Steganography Evaluation Based on Artificial Neural Networks. IEEE Access. 2021;9:120869–79. doi: 10.1109/ACCESS.2021.3108183.

Peng F, Chen G, Long M. A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation. IEEE Transactions on Circuits and Systems for Video Technology. 2022 Sep;32(9):5817–29. doi: 10.1109/TCSVT.2022.3161419.

Farhad Sadmand, Medvedev I, Nuno Gonçalves. CodeFace: A Deep Learning Printer-Proof Steganography for Face Portraits. IEEE Access. 2021 Jan 1;9:167282–91. doi: 10.1109/ACCESS.2021.3132581.

Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana AK, Pani SK. SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT. IEEE Access. 2021;9:87563–78. doi: 10.1109/ACCESS.2021.3089357.

Chen L, Wang R, Yan D, Wang J. Learning to Generate Steganographic Cover for Audio Steganography Using GAN. IEEE Access. 2021;9:88098–107. Available from: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9459771. doi: 10.1109/ACCESS.2021.3090445.

Chen Y, Wang H, Li W, Luo J. Cost Reassignment for Improving Security of Adaptive Steganography Using an Artificial Immune System. IEEE Signal Processing Letters. 2022 Jan 1;29:1564–8. doi: 10.1109/LSP.2022.3188174.

Mo X, Tan S, Tang W, Li B, Huang J. ReLOAD: Using Reinforcement Learning to Optimize Asymmetric Distortion for Additive Steganography. IEEE Transactions on Information Forensics and Security. 2023;18:1524–38. doi: 10.1109/TIFS.2023.3244094.

Karolin M, Meyyappan T. Visual Cryptography Secret Share Creation Techniques with Multiple Image Encryption and Decryption Using Elliptic Curve Cryptography. IETE Journal of Research. 2022 Nov 22;1–8. doi: https://doi.org/10.1080/03772063.2022.2142684

Bhosale AG, Patil V. A (2, 2) Visual Cryptography Technique to Share Two Secrets. 2020 Feb 1. doi: 10.1109/ICICT48043.2020.9112420

Jan, A., Parah, S.A., Hussan, M. et al. Double layer security using crypto-stego techniques: a comprehensive review. Health Technol. 12, 9–31 (2022). https://doi.org/10.1007/s12553-021-00602-1

Zeng, Lu, Ning Yang, Xiang Li, Aidong Chen, Hongyuan Jing, and Jiancheng Zhang. (2023). Advanced Image Steganography Using a U-Net-Based Architecture with Multiscale Fusion and Perceptual Loss" Electronics 12.18: 3808. https://doi.org/10.3390/electronics12183808

Kweon, Hyeokjoon, Jinsun Park, Sanghyun Woo, and Donghyeon Cho. (2021).Deep Multi-Image Steganography with Private Keys. Electronics. 10. 16: 1906. https://doi.org/10.3390/electronics10161906

Wang, Z., Chen, M., Yang, Y. et al. (2020). Joint multi-domain feature learning for image steganalysis based on CNN. EURASIP Journal on Image and Video Processing. 2020. 28. https://doi.org/10.1186/s13640-020-00513-7

Downloads

Published

24.03.2024

How to Cite

Ekta, E., & Singh, A. . (2024). Design of an Efficient Multimodal Image Steganography Framework with Multi-Domain Feature Analysis and Secret Sharing Operations . International Journal of Intelligent Systems and Applications in Engineering, 12(20s), 477–486. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5160

Issue

Section

Research Article