Revolutionizing Image Encryption: Data Hiding Model Based on Optimized Neural Network
Keywords:
Data Hiding, Elliptic Curve Cryptography (ECC), Image Encryption, Information security Multi-rate Salient Gated Recurrent Neural Networks (MSG-RNN).Abstract
Information security researchers are currently focusing on Revolutionizing Image Encryption in data hiding for safe digital data movement. Preserving information that has been hidden in a system is one of the core concepts of data hiding. For image encryption, data hiding is the process of embedding private data into images to ensure it is hidden from perceptions by other people. In this research, the hidden data is retrieved by our proposed Multi-rate Salient Gated Recurrent Neural Network (MSG-RNN) and it employs a dependent classification method to recover images from encrypted images. We gathered a data of various kinds of image data. Following the encryption of the original image, we established the Elliptic Curve Cryptography (ECC) method and created an innovative image encryption technique to improve security by data hiding. We calculated our proposed method's bit error rates. The comparison evaluation is performed with various methods to estimate proposed technique. Using the MSG-RNN approach on a number of images produced superior outcomes and they include the results for boats (0.0714), peppers (0.0712), baboons (0.0716) and airplanes (0.0719). The experimental outcomes offered that the proposed MSG-RNN technique performed better than other existing methods in data hiding process to enhance image encryption.
Downloads
References
Chen, H., Song, L., Qian, Z., Zhangtrew, X. and Ma, K., (2022). Hiding images in deep probabilistic models. Advances in Neural Information Processing Systems, 35, pp.36776-36788.
Jan, A., Parah, S.A., Malik, B.A. and Rashid, M., (2021). Secure data transmission in IoTs based on CLoG edge detection. Future Generation Computer Systems, 121, pp.59-73.
Al-Jarah, A.I.H. and Arjona, J.L.O., (2021), December. Secret Key Steganography: improve security level of LSB algorithm. In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0215-0220). IEEE.
Gabr, M., Alexan, W., Moussa, K., Maged, B. and Mezar, A., (2022), July. Multi-stage rgb image encryption. In 2022 International Telecommunications Conference (ITC-Egypt) (pp. 1-6). IEEE.
Chai, H., Li, Z., Li, F. and Zhang, Z., (2022). An end-to-end video steganography network based on a coding unit mask. Electronics, 11(7), p.1142.
Gohil, J., Patel, J. and Shah, M., (2021). Content watermarking and data hiding in multimedia security. In Advanced Security Solutions for Multimedia (pp. 3-1). Bristol, UK: IOP Publishing.
Chaudhary, A., Sharma, A. and Gupta, N., (2023). Designing A Secured Framework for the Steganography Process Using Blockchain and Machine Learning Technology. International Journal of Intelligent Systems and Applications in Engineering, 11(2s), pp.96-103.
Selvaraj, J., Lai, W.C., Kavin, B.P. and Seng, G.H., (2023). Cryptographic Encryption and Optimization for Internet of Things Based Medical Image Security. Electronics, 12(7), p.1636.
Tasevski, I., Nikolovska, V., Petrova, A., Dobreva, J., Popovska-Mitrovikj, A. and Dimitrova, V., (2022), October. StegYou: model for hiding, retrieving and detecting digital data in images. In Proceedings of the Future Technologies Conference (pp. 467-485). Cham: Springer International Publishing.
Zheng, Z., Hu, Y., Bin, Y., Xu, X., Yang, Y. and Shen, H.T., (2022). Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision. IEEE Transactions on Neural Networks and Learning Systems.
Chen, J., Chen, L. and Zhou, Y., (2020). Cryptanalysis of a DNA-based image encryption scheme. Information Sciences, 520, pp.130-141.
Chen, Y.C. and Shiu, C.W., (2021). Distributed encrypted image-based reversible data hiding. Journal of Internet Technology, 22(1), pp.101-107.
Naman, H., Hussien, N., Al-dabag, M. and Alrikabi, H., (2021). Encryption System for Hiding Information Based on Internet of Things.
Yang, Y.G., Wang, B.P., Yang, Y.L., Zhou, Y.H., Shi, W.M. and Liao, X., (2021). Visually meaningful image encryption based on universal embedding model. Information Sciences, 562, pp.304-324.
ALRikabi, H.T.S. and Hazim, H.T., (2021). Enhanced data security of communication system using combined encryption and steganography. iJIM, 15(16), p.145.
Panchikkil, S., Vegesana, S.P., Manikandan, V.M., Donta, P.K., Maddikunta, P.K.R. and Gadekallu, T.R., (2023). An ensemble learning approach for reversible data hiding in encrypted images with fibonacci transform. Electronics, 12(2), p.450.
Panchikkil, S., Manikandan, V.M. and Zhang, Y.D., (2022). A convolutional neural network model based reversible data hiding scheme in encrypted images with block-wise Arnold transform. Optik, 250, p.168137.
Bhardwaj, R. and Aggarwal, A., (2020). An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem. Pattern Recognition Letters, 139, pp.60-68.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.