
تعداد نشریات | 21 |
تعداد شمارهها | 657 |
تعداد مقالات | 9,642 |
تعداد مشاهده مقاله | 68,665,561 |
تعداد دریافت فایل اصل مقاله | 48,144,271 |
Introducing a Novel Approach to Concealing Textual Information Within Digital Images Through the Use of Neural Networks | ||
Modeling and Simulation in Electrical and Electronics Engineering | ||
دوره 4، شماره 4 - شماره پیاپی 18، اسفند 2024، صفحه 9-21 اصل مقاله (689.65 K) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/mseee.2025.36371.1194 | ||
نویسندگان | ||
Mohammad Yasemifar* 1؛ Sattar Mirzakoochaki2؛ Mohammad Norouzi3 | ||
1Department of Electrical Engineering, Faculty of Electrical Engineering, Qazvin branch, Islamic Azad University, Qazvin, Iran. | ||
2. Department of Electrical Engineering, Faculty of Electrical Engineering, University of Mississippi, USA. | ||
3Department of Electrical Engineering, Faculty of Electrical Engineering, Iran University of Science and Technology, Tehran, Iran. | ||
تاریخ دریافت: 10 دی 1403، تاریخ بازنگری: 27 فروردین 1404، تاریخ پذیرش: 26 شهریور 1404 | ||
چکیده | ||
In steganography, a text is placed in a digital image in a secure, imperceptible and retrievable way. The three main methods of digital image steganography are spatial methods, transformation and neural network. Spatial methods change the pixel values of an image to embed information, while transform methods embed information hidden in the frequency of the image. Neural networks are use to perform the hiding process and it is the main part of this research. This research examines the use of LSTM[1] deep neural networks in digital image text steganography. This work extends an existing implementation that uses a two-dimensional LSTM to perform the preparation, hiding, and extraction steps of the steganography process. The proposed method modified the structure of LSTM and used a gain function based on several image similarity measures to maximize the indiscernibility between an overlay and a steganographic image. Genetic algorithm helps in improving the structure of LSTM networks in the textual information within hidden images, with optimizations (number of layers, neurons, evaluations) and selection of appropriate features, increasing the accuracy, improving image quality and preventing overfitting. This method helps to find the optimal architecture for the LSTM network and improves the efficiency of the steganography. The proposed method demonstrates superior performance based on three evaluation metrics Peak Signal-to-Noise Ratio (PSNR[2]) in decibels, Mean Squared Error (MSE[3]), and accuracy rate in percentage compared to three other benchmark images (lena.png, peppers.png, mandril.png, and monkey.png), achieving values of 93.665275 dB, 0.6945 MSE, and 97.23% accuracy, respectively. The proposed method modified the structure of LSTM and used a gain function. | ||
کلیدواژهها | ||
Novel approach؛ Steganography؛ Text information؛ Digital images؛ Neural networks | ||
مراجع | ||
[1] P. N. Shingote, A. Bhujbal, P. M. Syed, Advanced Security Usin Cryptographyand LSBMatching Steganography, IJCER, 3(2), 52-55, 2014
[2] F. G. Mohammadi, M. S. Abadeh, Image steganalysis using a bee colony based feature selection algorithm., Engineering Applications of Artificial Intelligence, 2014
[3] Z. V. Patel, S. A. Gadhiya,.A Survey Paper on Steganography and Cryptography, International Multidisciplinary Research Journal (RHIMRJ), Volume-2, Issue-5. 2015
[4] Y. Wang, X. Liu, Z. Gao, “Chaos‑Based Image Steganography,” IEEE Internet Things J., vol. 10, no. 2, pp. 1478–1487, 2023.
[5] M. Juneja, P. S. Sandhu, Improved LSB based Steganography Techniques for ColorImages in Spatial Domain. IJ Network Security, 16(4),366376, 2014
[6] Y. Wang et al., “Chaos‑Based Image Steganography,” IEEE IoT J., 2023.
[7] R. C. Gonzalez, R. E. Woods, Digital Image Processing translator: Ainullah Jafarnjad Qomi, publisher: Computer Science Publications, 4th edition, 2021
[9] D. Gomez, R. Martinez, J. Lopez, “LSTM‑Assisted Data Hiding in Color Images,” IEEE Access, vol. 10, pp. 109123–109135, 2022.
[10] S. M Hosseininia, A. Nemati, Investigation of image-based information encryption methods with the approach of increasing the security of information and communications against multiple attacks, Specialized Scientific Quarterly of New Technologies in Electrical and Computer Engineering, Volume 3, Number 4, 2022[11] T. Nguyen, P. Tran, H. Huynh, “Deep LSTM‑Based Image Steganography,” IEEE Access, vol. 9, pp. 87632–87645, 2021.
[12] N. Patel, M. Patel, K. Joshi, “Robust Steganographic System Using Autoencoders,” IEEE Trans. Inf. Forensics Secur., vol. 18, pp. 220–233, 2022.
[13] A. Sabhany, A. Ahmed, H. Ali, R. Mokhtar, “Digital audio steganography: Systematic review,” classification, and analysis of the current state of the art. Computer Science Review, Volume 38, November 2020
[14] D. Wenbo, Z. Mingyuan, Y. Wen, P. Matjaž, W. Dapeng. “The networked evolutionary algorithm: A network science perspective” , Applied Mathematics and Computation, Volume 338, Pages 33-43. 1 December 2018
[15] E. Asadzadeh, M. Asadzadeh, M. Asadbek Genetic Algorithm, the First Publications, 2018[16] A. R. Mirqadari and A. Jolfaei, "A new scheme for image encryption using chaotic mappings," Modern Defense Sciences and Technologies (Non-Agent Defense Sciences and Technologies), vol. 2, no. 2 (series 4), pp. 111-124, 2019 | ||
آمار تعداد مشاهده مقاله: 32 تعداد دریافت فایل اصل مقاله: 21 |