Abstract
This paper addresses a model to secrete the information of one image under another without losing quality of image. Different approaches have been utilized for image hiding as needed, but multiple images maintain secrecy with information under another image is a challenging task. Thus, the framework is proposed to sustain the secrecy of an original image from another image. The proposed system collects random images through ImageNet and uses them as per the requirements of secrete images. The framework is used the deep neural networks method to build secrete information of multiple images under a single image. The enormous transfer of images is used to select standard image modifications using advanced deep learning approaches. It develops the significance of the critical framework that alleviates the choice of finding the hidden image information. Two vital methods such as Peak Signal to Noise Ratio (PSNR) and the Structural Similarity Index (SSIM) are used to find out difference between host and secret image by their corresponding evaluation scores. It produces the confidentiality of the image with the help of the host image. Therefore, data from several images are protected under a single image. The different image data are experimented with good performance. For comparative analysis, the accuracy is better in retrieving two secrete images on all experiments, like approximate accuracy is 100%. Still, when we considered PSNR and SSIM scores on the same two secrete images, accuracy became less than 50%.
Similar content being viewed by others
Data availability
The data that support the findings of this study are available from the first author upon reasonable request.
Code availability
The code is available from the first author upon reasonable request.
References
Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M,Ghemawat S, Irving G, Isard M et al. (2016) Tensorflow: a system forlarge-scale machine learning. In OSDI, vol. 16, pp. 265–283
Aslam MA, Azam MRF, Abbas M, Rasheed Y, Alotaibi SS, Anwar MW (2022) Image Steganography using Least Significant Bit (LSB) - A Systematic Literature Review. 2022 2nd international conference on computing and information technology (ICCIT), Tabuk, Saudi Arabia, pp. 32–38
Baldi P, Hornik K (1989) Neural networks and principal component analysis. Neural Netw 2(1):53–58
Baluja S (2020) Hiding images within images. IEEE Trans Pattern Anal Mach Intell 42(7):1685–1697
Baluja S, Covell M (2008) Wave print: efficient wavelet-based audio finger printing. Pattern Recogn 41(11):3467–3480
Bhuyan HK, Kamila NK (2014) Privacy preserving sub-feature selection based on fuzzy probabilities. Cluster Computing Springer 17(4):1383–1399
Bhuyan HK, Kamila NK (2015) Privacy preserving sub-feature selection in distributed data mining. Applied Soft Computing Elsevier 36:552–569
Bhuyan HK, Kamila NK, Dash SK (2011) An approach for privacy preservation of distributed data in peer-to-peer network using multiparty computation. Int Journal Comput Sci Issues (IJCSI) 3(8):424–429
Bhuyan HK, Dash SK, Roy S, Swain DK (2012) Privacy Preservation with Penalty in Decentralized Network using Multiparty Computation. Int J Advanc Comput Technol (IJACT) 4(1):297–303
Bhuyan HK, Kamila NK, Jena LD (2016) Pareto-based multi-objective optimization for classification in data mining. Cluster Computing (Springer) 19(4):1723–1745
Bhuyan HK, Kumar LR, Reddy RK (2019) Optimization model for Sub-feature selection in data mining, 2nd International Conference on Smart Systems and Inventive Technology (ICSSIT 2019), IEEE Explore, pp 1212–1216
Bhuyan HK, Chakraborty C, Pani SK, Ravi VK (2021) Feature and sub-feature selection for classification using correlation coefficient and fuzzy model. IEEE Trans Eng Manag:1–15
Bhuyan HK, Chakraborty C, Shelke Y, Pani SK (2021) COVID-19 diagnosis system by deep learning approaches. Expert Syst 39(3):1–18
Bhuyan HK, Kamila NK, Pani SK (2021) Individual privacy in data mining using fuzzy optimization, engineering optimization. Pp. 1-19 (early published)
Burke J, King S (2022) Edge tracing using Gaussian process regression. IEEE Trans Image Process 31:138–148
Chandra K, Kapoor G, Kohli R, Archana G. (2016) Improving software quality using machine learning. In: 2016 international conference on innovation and challenges in cyber security (ICICCS-INBUSH). Pp. 115-118
Chaumont M, Puech W, Lahanier C (2013) Securing color information of an image by concealing the color palette. J Syst Softw 86(3):809–825
Chen L-C, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2018) Deep lab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans Pattern Anal Mach Intell 40(4):834–848
Fridrich J, Goljan M, Du R (2001) Detecting LSB steganography in color, and gray-scale images. IEEE Multimed 8(4):22–28
Fridrich J, Goljan M, Soukal D (2004) Searching for the stego-key. In Proceedings of SPIE, vol. 5306, pp. 70–82
Gong Y, Lazebnik S, Gordo A, Perronnin F (2013) Iterative quantization: a procrustean approach to learning binary codes forlarge-scale image retrieval. IEEE Trans Pattern Anal Mach Intell 35(12):2916–2929
Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D,Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In Adv. in Neural Information Processing Systems, pp 2672–2680. https://papers.nips.cc/paper/2014/hash/5ca3e9b122f61f8f06494c97b1afccf3-Abstract.html
Hinton GE, Salakhutdinov RR (2006) Reducing the dimensionality of data with neural networks. Science 313(5786):504–507
Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6:38303–38314
Huang Z, Yang S, Zhou MC, Li Z, Zheng G, Chen Y (2022) Feature map distillation of thin nets for low-resolution object recognition. IEEE Trans Image Process 31:1364–1379
Jain AK, Uludag U (2003) Hiding biometric data. IEEE Trans Pattern Anal Mach Intell 25(11):1494–1498
Jarusek R, Volna E, Kotyrba M (2018) Robust steganographic method based on unconventional approach of neural networks. Appl Soft Comput 67:505–518
Kessler GC (2014) An overview of steganography for the computer forensics examiner. Forensic Sci Commun 6(3):1–29
Kingma D, Adam JB (2015) A method for stochastic optimization. in ICLR, pp 1–15
Korshunov P, Marcel S (2017) Impact of score fusion on voice biometrics and presentation attack detection in cross-database evaluations. IEEE J Select Top Signal Process 11(4):695–705
Larsen ABL, Sønderby SK, Winther O (2015) Autoencoding beyond pixels using a learned similarity metric. Pp 1–8, arXiv:1512.09300
Li S, Li C, Lo K-T, Chen G (2008) Cryptanalysis of an image scrambling scheme without bandwidth expansion. IEEE Trans Circuits Syst Vid Technol 18(3):338–349
Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multim Tools Appl 76:20739–20753
Liao X, Yu Y, Li B, Li Z, Zheng Q (2020) A new payload partition strategy in color image steganography. IEEE Transact Circuits Syst Vid Technol 30(3):685–696
Liao X, Yin J, Chen M, Zheng Q (2020) Adaptive payload distribution in multiple images steganography based on image texture features, IEEE transactions on dependable and secure computing. Pp. 1-14
Liu Q, Sung AH (2008) Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf Sci 178(1):21–36
Ma H, Liu S, Liao Q, Zhang J, Xue J-H (2022) Defocus image Deblurring network with defocus map estimation as auxiliary task. IEEE Trans Image Process 31:216–226
Miao J, Kou KI (2022) Color image recovery using low-rank quaternion matrix completion algorithm. IEEE Trans Image Process 31:190–201
Pibre L, Pasquet J, Ienco D, Chaumont M (2016) Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source mismatch. Electron Imaging 2016(8):1–11
Qamra A, Meng Y, Chang EY (2005) Enhanced perceptual distance functions and indexing for image replica recognition. IEEE Trans Pattern Anal Mach Intell 27(3):379–391
Tao D, Tang X, Li X, Wu X (2006) Asymmetric bagging and random subspace for support vector machines-based relevance feedback in image retrieval. IEEE Trans Pattern Anal Mach Intell 28(7):1088–1099
Trung V, Lai P, Raich R, Pham A, Fern XZ, Arvind Rao UK (2020) A Novel Attribute-Based Symmetric Multiple Instance Learning for Histopathological Image Analysis. IEEE Trans Med Imaging 39(10):3125–3136
Van De Ville D, Philips W, Van de Walle R, Lemahieu I (2004) Image scrambling without bandwidth expansion. IEEE Trans On Circuits and Sys Vid Technol 14(6):892–897
Vincent P, Larochelle H, Lajoie I, Bengio Y, Manzagol P (2010) Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion. JMLR 11(Dec):3371–3408
Vu MH, Löfstedt T, TufveNyholm RS (2020) A question-centric model for visual question answering in medical imaging. IEEE transactions on medical imaging, volume: 39. Issue 9:2856–2868
Wang Y, Moulin P (2008) Perfectly secure steganography: capacity, error exponents, and code constructions. IEEE Trans Inform Theory Special Issue Security 55(6):2706–2722
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Wang G, Hoiem D, Forsyth D (2012) Learning image similarity from flickr groups using fast kernel machines. IEEE Trans Pattern Anal Mach Intell 34(11):2177–2188
Wang WZX, You W, Chen J, Dai P, Zhang P (2019) RESLS: region and edge synergetic level set framework for image segmentation. IEEE Trans Image Process 29:57–71
Xu W, Wang G (2022) A domain gap aware generative adversarial network for multi-domain image translation. IEEE Trans Image Process 31:72–84
Yedroudj M, Comby F, Chaumont M, Yedrouj-net (2018) An efficient CNN for spatial steganalysis. In IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP’2018, pp 2092–2096
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest/competing interests
The authors declare no conflict of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bhuyan, H.K., Vijayaraj, A. & Ravi, V. Development of secrete images in image transferring system. Multimed Tools Appl 82, 7529–7552 (2023). https://doi.org/10.1007/s11042-022-13677-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13677-3