Skip to main content

StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2 (FTC 2022 2022)

Abstract

Nowadays, people are not aware of how vulnerable they are to cyber-attacks and theft of personal and sensitive information, from stealing social media passwords to stealing a person’s full identity. People are not aware that their communication with the outside world can be intercepted and all sensitive and secret information stolen from them, while they completely rely on and believe in the implemented safety principles from various service providers. No matter how sophisticated the system is, every system is vulnerable. Therefore, in this paper, we present the StegYou model for hiding, retrieving, and detecting digital data in images. Our implementation of hiding and retrieving data is based on a custom made crypt-steganography algorithm for one or more images. By applying crypt-steganography techniques for secure data transfer between spatially-distributed individuals, the model will strive to reach the highest level of confidentiality, authenticity, and integrity of the user’s confidential and sensitive data. Also, StegYou can detect hidden data in given images with the help of machine learning methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bandyopadhyay, S.K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., Das, P.: A tutorial review on steganography. University of Calcutta, Senate House, Computer Science and Engineering Department, Heritage Institute of Technology, Anandapur, Kolkata

    Google Scholar 

  2. Al-Azzeh, J., Alqadi, Z., Ayyoub, B., Sharadqh, A.: Improving the security of LSB image steganography. Computer Engineering Department, Al Balqa’a Applied University, Amman, Jordan, vol. 3(4) (2019)

    Google Scholar 

  3. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001). https://doi.org/10.1109/93.959097

    Article  Google Scholar 

  4. Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. http://www.jjtc.com/ihws98/jjgmu.html

  5. Jung, K.-H.: A study on machine learning for steganalysis. In: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing (ICMLSC 2019), pp. 12–15. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3310986.3311000

  6. Lavania, K.: A Deep Learning Framework to identify real-world stego images. Master’s thesis, Dublin, National College of Ireland (2021)

    Google Scholar 

  7. Babu, J., Rangu, S., Manogna, P.: A survey on different feature extraction and classification techniques used in image steganalysis. J. Inf. Secur. 8, 186–202 (2017). https://doi.org/10.4236/jis.2017.83013

    Article  Google Scholar 

  8. Oludele, A., Sunday, I., Afolashade, K., Uchenna, N.: Security test using StegoExpose on hybrid deep learning model for reversible image steganography. Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria

    Google Scholar 

  9. Cryptography: Symmetric encryption. https://cryptography.io/en/3.4.6/hazmat/primitives/symmetric-encryption.html. Accessed 14 Apr 2022

  10. Cryptography: Fernet https://cryptography.io/en/latest/fernet/?fbclid=IwAR2uiE_N0SaoaIHSwMwxsG7OxBZm-UAFk9gsegUU_B6zE1ElERKiwKnUNoQ. Accessed 14 Apr 2022

  11. Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000

    Google Scholar 

  12. Sachnev, V., Ramasamy, S., Sundaram, S., Kim, H.J., Hwang, H.J.: A cognitive ensemble of extreme learning machines for steganalysis based on risk-sensitive hinge loss function. Cogn. Comput. 7(1), 103–110 (2014). https://doi.org/10.1007/s12559-014-9268-x

    Article  Google Scholar 

  13. Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29, 1189–1232 (2001)

    Article  MathSciNet  Google Scholar 

  14. Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2016), pp. 785–794. Association for Computing Machinery, New York (2016). https://doi.org/10.1145/2939672.2939785

  15. Miranda, J.D., Parada, D.J.: LSB steganography detection in monochromatic still images using artificial neural networks. Multimedia Tools Appl. 81(1), 785–805 (2022). https://doi.org/10.1007/s11042-021-11527-2

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vesna Dimitrova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tasevski, I., Nikolovska, V., Petrova, A., Dobreva, J., Popovska-Mitrovikj, A., Dimitrova, V. (2023). StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images. In: Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2. FTC 2022 2022. Lecture Notes in Networks and Systems, vol 560. Springer, Cham. https://doi.org/10.1007/978-3-031-18458-1_32

Download citation

Publish with us

Policies and ethics