Javascript must be enabled to continue!
Deep Neural Network-based Reversible Image Steganography Technique using Circle-U-Net
View through CrossRef
Data communication is made at the ease with the advent of the latest communications medium and tools. The concern over data breaches has increased. The digital media communicated across the network are susceptible to unapproved access. Though numerous image steganography approaches were existing for concealing the secret image into the cover image there are still limitations such as inadequate restoration of image quality and less embedding capacity. To overwhelm such shortcomings recently many image steganography approaches based on deep learning are proposed. In this work, a Circle-U-Net-based reversible image steganography technique is proposed. The model includes a contracting process, which includes residual bottleneck as well as circle connect layers which obtain context; an expanding process, which includes sampling layers as well as merging layers for pixel-wise localization. The reversible image steganography (RIS) is carried out with neural network models such as CNN, U-Net scheme, and Circle-U-Net structure on TinyImageNet-200 and Alzheimer’s MRI dataset. The proposed technique is experimented along with RIS using CNN and RIS using U-Net. The experimental results depict that the RIS using the Circle-U-Net structure performs better among the three models.
Title: Deep Neural Network-based Reversible Image Steganography Technique using Circle-U-Net
Description:
Data communication is made at the ease with the advent of the latest communications medium and tools.
The concern over data breaches has increased.
The digital media communicated across the network are susceptible to unapproved access.
Though numerous image steganography approaches were existing for concealing the secret image into the cover image there are still limitations such as inadequate restoration of image quality and less embedding capacity.
To overwhelm such shortcomings recently many image steganography approaches based on deep learning are proposed.
In this work, a Circle-U-Net-based reversible image steganography technique is proposed.
The model includes a contracting process, which includes residual bottleneck as well as circle connect layers which obtain context; an expanding process, which includes sampling layers as well as merging layers for pixel-wise localization.
The reversible image steganography (RIS) is carried out with neural network models such as CNN, U-Net scheme, and Circle-U-Net structure on TinyImageNet-200 and Alzheimer’s MRI dataset.
The proposed technique is experimented along with RIS using CNN and RIS using U-Net.
The experimental results depict that the RIS using the Circle-U-Net structure performs better among the three models.
Related Results
Reversible Image Steganography: A Review of Existing GAN-based Models
Reversible Image Steganography: A Review of Existing GAN-based Models
Image steganography is the method of concealing information, which can be text, image, or video, under a cover image in a way that it is invisible to the human eyes. Payload capaci...
Enhancing Security through Advanced Image Steganography Techniques
Enhancing Security through Advanced Image Steganography Techniques
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting t...
Proposed Algorithm Using Image in Multi Level Text Steganography
Proposed Algorithm Using Image in Multi Level Text Steganography
The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data....
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The...
Analysis review on feature-based and word-rule based techniques in text steganography
Analysis review on feature-based and word-rule based techniques in text steganography
This paper presents several techniques used in text steganography in term of feature-based and word-rule based. Additionally, it analyses the performance and the metric evaluation ...
IMPLEMENTASI STEGANOGRAFI TEXT TO IMAGE MENGGUNAKAN METODE ONE BIT LEAST SIGNIFICANT BIT BERBASIS ANDROID
IMPLEMENTASI STEGANOGRAFI TEXT TO IMAGE MENGGUNAKAN METODE ONE BIT LEAST SIGNIFICANT BIT BERBASIS ANDROID
Abstrak - Informasi merupakan hal yang sangat penting dan berharga, dewasa ini informasi sering dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone An...
Generative Image Steganography Based on Point Cloud
Generative Image Steganography Based on Point Cloud
Abstract
In deep steganography, the model size is usually related to the underlying mesh resolution, and a separate neural network needs to be trained as a message extracto...
Blockchain Based Data Steganography
Blockchain Based Data Steganography
Blockchain based Data Blockchain based Steganography is the system of hiding records which may be text, photo or video Interior a cowl photo. The secret facts are hidden in a way t...

