Abstract
Nowadays, people are not aware of how vulnerable they are to cyber-attacks and theft of personal and sensitive information, from stealing social media passwords to stealing a person’s full identity. People are not aware that their communication with the outside world can be intercepted and all sensitive and secret information stolen from them, while they completely rely on and believe in the implemented safety principles from various service providers. No matter how sophisticated the system is, every system is vulnerable. Therefore, in this paper, we present the StegYou model for hiding, retrieving, and detecting digital data in images. Our implementation of hiding and retrieving data is based on a custom made crypt-steganography algorithm for one or more images. By applying crypt-steganography techniques for secure data transfer between spatially-distributed individuals, the model will strive to reach the highest level of confidentiality, authenticity, and integrity of the user’s confidential and sensitive data. Also, StegYou can detect hidden data in given images with the help of machine learning methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Bandyopadhyay, S.K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., Das, P.: A tutorial review on steganography. University of Calcutta, Senate House, Computer Science and Engineering Department, Heritage Institute of Technology, Anandapur, Kolkata
Al-Azzeh, J., Alqadi, Z., Ayyoub, B., Sharadqh, A.: Improving the security of LSB image steganography. Computer Engineering Department, Al Balqa’a Applied University, Amman, Jordan, vol. 3(4) (2019)
Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001). https://doi.org/10.1109/93.959097
Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. http://www.jjtc.com/ihws98/jjgmu.html
Jung, K.-H.: A study on machine learning for steganalysis. In: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing (ICMLSC 2019), pp. 12–15. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3310986.3311000
Lavania, K.: A Deep Learning Framework to identify real-world stego images. Master’s thesis, Dublin, National College of Ireland (2021)
Babu, J., Rangu, S., Manogna, P.: A survey on different feature extraction and classification techniques used in image steganalysis. J. Inf. Secur. 8, 186–202 (2017). https://doi.org/10.4236/jis.2017.83013
Oludele, A., Sunday, I., Afolashade, K., Uchenna, N.: Security test using StegoExpose on hybrid deep learning model for reversible image steganography. Computer Science Department, Babcock University, Ilishan-Remo, Ogun State, Nigeria
Cryptography: Symmetric encryption. https://cryptography.io/en/3.4.6/hazmat/primitives/symmetric-encryption.html. Accessed 14 Apr 2022
Cryptography: Fernet https://cryptography.io/en/latest/fernet/?fbclid=IwAR2uiE_N0SaoaIHSwMwxsG7OxBZm-UAFk9gsegUU_B6zE1ElERKiwKnUNoQ. Accessed 14 Apr 2022
Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. Department of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000
Sachnev, V., Ramasamy, S., Sundaram, S., Kim, H.J., Hwang, H.J.: A cognitive ensemble of extreme learning machines for steganalysis based on risk-sensitive hinge loss function. Cogn. Comput. 7(1), 103–110 (2014). https://doi.org/10.1007/s12559-014-9268-x
Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29, 1189–1232 (2001)
Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2016), pp. 785–794. Association for Computing Machinery, New York (2016). https://doi.org/10.1145/2939672.2939785
Miranda, J.D., Parada, D.J.: LSB steganography detection in monochromatic still images using artificial neural networks. Multimedia Tools Appl. 81(1), 785–805 (2022). https://doi.org/10.1007/s11042-021-11527-2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tasevski, I., Nikolovska, V., Petrova, A., Dobreva, J., Popovska-Mitrovikj, A., Dimitrova, V. (2023). StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images. In: Arai, K. (eds) Proceedings of the Future Technologies Conference (FTC) 2022, Volume 2. FTC 2022 2022. Lecture Notes in Networks and Systems, vol 560. Springer, Cham. https://doi.org/10.1007/978-3-031-18458-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-031-18458-1_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-18457-4
Online ISBN: 978-3-031-18458-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)