Revolutionizing Image Encryption: Data Hiding Model Based on Optimized Neural Network

Authors

  • Pallavi S. Chakole, Siva Rama Krishna T., Rahul Mishra, Beemkumar Nagappan, Sachin S. Pund, Jasneet Kaur

Keywords:

Data Hiding, Elliptic Curve Cryptography (ECC), Image Encryption, Information security Multi-rate Salient Gated Recurrent Neural Networks (MSG-RNN).

Abstract

Information security researchers are currently focusing on Revolutionizing Image Encryption in data hiding for safe digital data movement. Preserving information that has been hidden in a system is one of the core concepts of data hiding. For image encryption, data hiding is the process of embedding private data into images to ensure it is hidden from perceptions by other people. In this research, the hidden data is retrieved by our proposed Multi-rate Salient Gated Recurrent Neural Network (MSG-RNN) and it employs a dependent classification method to recover images from encrypted images. We gathered a data of various kinds of image data. Following the encryption of the original image, we established the Elliptic Curve Cryptography (ECC) method and created an innovative image encryption technique to improve security by data hiding. We calculated our proposed method's bit error rates. The comparison evaluation is performed with various methods to estimate proposed technique. Using the MSG-RNN approach on a number of images produced superior outcomes and they include the results for boats (0.0714), peppers (0.0712), baboons (0.0716) and airplanes (0.0719). The experimental outcomes offered that the proposed MSG-RNN technique performed better than other existing methods in data hiding process to enhance image encryption.

Downloads

Download data is not yet available.

References

Chen, H., Song, L., Qian, Z., Zhangtrew, X. and Ma, K., (2022). Hiding images in deep probabilistic models. Advances in Neural Information Processing Systems, 35, pp.36776-36788.

Jan, A., Parah, S.A., Malik, B.A. and Rashid, M., (2021). Secure data transmission in IoTs based on CLoG edge detection. Future Generation Computer Systems, 121, pp.59-73.

Al-Jarah, A.I.H. and Arjona, J.L.O., (2021), December. Secret Key Steganography: improve security level of LSB algorithm. In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0215-0220). IEEE.

Gabr, M., Alexan, W., Moussa, K., Maged, B. and Mezar, A., (2022), July. Multi-stage rgb image encryption. In 2022 International Telecommunications Conference (ITC-Egypt) (pp. 1-6). IEEE.

Chai, H., Li, Z., Li, F. and Zhang, Z., (2022). An end-to-end video steganography network based on a coding unit mask. Electronics, 11(7), p.1142.

Gohil, J., Patel, J. and Shah, M., (2021). Content watermarking and data hiding in multimedia security. In Advanced Security Solutions for Multimedia (pp. 3-1). Bristol, UK: IOP Publishing.

Chaudhary, A., Sharma, A. and Gupta, N., (2023). Designing A Secured Framework for the Steganography Process Using Blockchain and Machine Learning Technology. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), pp.96-103.

Selvaraj, J., Lai, W.C., Kavin, B.P. and Seng, G.H., (2023). Cryptographic Encryption and Optimization for Internet of Things Based Medical Image Security. Electronics, 12(7), p.1636.

Tasevski, I., Nikolovska, V., Petrova, A., Dobreva, J., Popovska-Mitrovikj, A. and Dimitrova, V., (2022), October. StegYou: model for hiding, retrieving and detecting digital data in images. In Proceedings of the Future Technologies Conference (pp. 467-485). Cham: Springer International Publishing.

Zheng, Z., Hu, Y., Bin, Y., Xu, X., Yang, Y. and Shen, H.T., (2022). Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision. IEEE Transactions on Neural Networks and Learning Systems.

Chen, J., Chen, L. and Zhou, Y., (2020). Cryptanalysis of a DNA-based image encryption scheme. Information Sciences, 520, pp.130-141.

Chen, Y.C. and Shiu, C.W., (2021). Distributed encrypted image-based reversible data hiding. Journal of Internet Technology, 22(1), pp.101-107.

Naman, H., Hussien, N., Al-dabag, M. and Alrikabi, H., (2021). Encryption System for Hiding Information Based on Internet of Things.

Yang, Y.G., Wang, B.P., Yang, Y.L., Zhou, Y.H., Shi, W.M. and Liao, X., (2021). Visually meaningful image encryption based on universal embedding model. Information Sciences, 562, pp.304-324.

ALRikabi, H.T.S. and Hazim, H.T., (2021). Enhanced data security of communication system using combined encryption and steganography. iJIM, 15(16), p.145.

Panchikkil, S., Vegesana, S.P., Manikandan, V.M., Donta, P.K., Maddikunta, P.K.R. and Gadekallu, T.R., (2023). An ensemble learning approach for reversible data hiding in encrypted images with fibonacci transform. Electronics, 12(2), p.450.

Panchikkil, S., Manikandan, V.M. and Zhang, Y.D., (2022). A convolutional neural network model based reversible data hiding scheme in encrypted images with block-wise Arnold transform. Optik, 250, p.168137.

Bhardwaj, R. and Aggarwal, A., (2020). An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recognition Letters, 139, pp.60-68.

Downloads

Published

26.03.2024

How to Cite

Siva Rama Krishna T., Rahul Mishra, Beemkumar Nagappan, Sachin S. Pund, Jasneet Kaur, P. S. C. . (2024). Revolutionizing Image Encryption: Data Hiding Model Based on Optimized Neural Network. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1052–1057. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5504

Issue

Section

Research Article