Enhancing Stego Image Quality With SIUN Post-Processing of Image Steganography Without Embedding DCGAN Outputs

Jessica Forenziana, Tjong Wan Sen

Abstract


In digital steganography, hiding information seamlessly within images is key. This study merges Deep Convolutional Generative Adversarial Networks (DCGAN) with Scale-Iterative Upscaling Networks (SIUN) to craft high-quality stego images swiftly and enhance the DCGAN image training period. Eschewing length DCGAN training, SIUN refines post-generation images, ensuring detailed visuals and increased data storage. Using the MNIST dataset, findings show that SIUN not only accelerates the process but also improves the stego image quality, suggesting a significant leap forward for secure communication efficiency. This research found that by using SIUN can enhance the quality of stego images with just 50 epochs of DCGAN training. After this initial training, the images are sent to SIUN for further quality upgrades with more efficient time.


Keywords


DCGAN; Image Processing; Networks; SIUN; Steganography

Full Text:

PDF

References


D. Hu, L. Wang, W. Jiang, S. Zheng, and B. Li, “DCGAN,” Jan. 01, 2018, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2018.2852771.

Y. Jin, H. Gao, X. Fan, H. Khan, and Y. Chen, “Defect Identification of Adhesive Structure Based on DCGAN and YOLOv5,” Jan. 01, 2022, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2022.3193775.

D. Wu, W. Zhang, and P. Zhang, “DPBA-WGAN: A Vector-Valued Differential Private Bilateral Alternative Scheme on WGAN for Image Generation,” Jan. 01, 2023, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2023.3243473.

H. S. El-Assiouti, H. El‐Saadawy, M. N. Al-Berry, and M. F. Tolba, “Lite-SRGAN and Lite-UNet: Toward Fast and Accurate Image Super-Resolution, Segmentation, and Localization for Plant Leaf Diseases,” Jan. 01, 2023, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2023.3289750.

V. Y. Ramandi, M. Fateh, and M. Rezvani, “VidaGAN: Adaptive GAN for image steganography,” Jul. 26, 2024, Institution of Engineering and Technology. doi: 10.1049/ipr2.13177.

Z. Fu, F. Wang, and X. Cheng, “The secure steganography for hiding images via GAN,” Oct. 27, 2020, Springer Nature. doi: 10.1186/s13640-020-00534-2.

M. Ye, D. Lyu, and G. Chen, “SIUN,” Jan. 01, 2020, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2020.2967823.

S. Nah, T. H. Kim, and K. M. Lee, “Deep Multi-scale Convolutional Neural Network for Dynamic Scene Deblurring,” Jul. 01, 2017. doi: 10.1109/cvpr.2017.35.

X. Tao, H. Gao, X. Shen, J. Wang, and J. Jia, “Scale-Recurrent Network for Deep Image Deblurring,” Jun. 01, 2018. doi: 10.1109/cvpr.2018.00853.

K. F. Rafat and S. M. Sajjad, “Advancing Reversible LSB Steganography: Addressing Imperfections and Embracing Pioneering Techniques for Enhanced Security,” Jan. 01, 2024, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2024.3468988.

N. Subramanian, O. Elharrouss, S. Al-Máadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9. Institute of Electrical and Electronics Engineers, p. 23409, Jan. 01, 2021. doi: 10.1109/access.2021.3053998.

Y. Guo and Z. Liu, “Coverless Steganography For Face Recognition Based on Diffusion Model,” Jan. 01, 2024, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2024.3477469.

S. Rahman, J. Uddin, H. U. Khan, H. Hussain, A. A. Khan, and M. Zakarya, “A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method,” Jan. 01, 2022, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2022.3224745.

Z. Zhang, G. Fu, R. Ni, J. Liu, and X. Yang, “A generative method for steganography by cover synthesis with auxiliary semantics,” Jun. 12, 2020, Tsinghua University Press. doi: 10.26599/tst.2019.9010027.

J. Liu et al., “Recent Advances of Image Steganography With Generative Adversarial Networks,” Jan. 01, 2020, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2020.2983175.

L. Lakshmi et al., “Performance Analysis of Cycle GAN in Photo to Portrait Transfiguration using Deep Learning Optimizers,” Jan. 01, 2023, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2023.3337430.

Q. Li et al., “A Novel Grayscale Image Steganography Scheme Based on Chaos Encryption and Generative Adversarial Networks,” Jan. 01, 2020, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2020.3021103.

S. N. Almuayqil, M. M. Fadel, M. K. Hassan, E. A. A. Hagras, and W. Said, “Stego-image synthesis employing data-driven continuous variable representations of cover images,” Jan. 01, 2024, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2024.3468886.

C. Chang, “Adversarial Learning for Invertible Steganography,” Jan. 01, 2020, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2020.3034936.

Q. WU, Y. CHEN, and J. MENG, “DCGAN-Based Data Augmentation for Tomato Leaf Disease Identification.” May 25, 2020.

S. Zeng, Y. Cai, R. Zhang, and X. Lyu, “Research on Human-Machine Collaborative Aesthetic Decision-Making and Evaluation Methods in Automotive Body Design: Based on DCGAN and ANN Models,” Jan. 01, 2024, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2024.3422134.

Ν. Πεππές, T. Alexakis, E. Daskalakis, K. Demestichas, and E. Adamopoulou, “Malware Image Generation and Detection Method Using DCGANs and Transfer Learning,” Jan. 01, 2023, Institute of Electrical and Electronics Engineers. doi: 10.1109/access.2023.3319436.

Z. Ma, Y. Niu, and J. Hu, “Deep Multi-scale Convolutional Neural Network Method for Depth Estimation from a Single Image.” Jan. 01, 2022.

H. Zhang, Y. Dai, H. Li, and P. Koniusz, “Deep Stacked Hierarchical Multi-Patch Network for Image Deblurring,” Jun. 01, 2019. doi: 10.1109/cvpr.2019.00613.




DOI: http://dx.doi.org/10.24014/ijaidm.v8i1.35640

Refbacks

  • There are currently no refbacks.


Office and Secretariat:

Big Data Research Centre
Puzzle Research Data Technology (Predatech)
Laboratory Building 1st Floor of Faculty of Science and Technology
UIN Sultan Syarif Kasim Riau

Jl. HR. Soebrantas KM. 18.5 No. 155 Pekanbaru Riau – 28293
Website: http://predatech.uin-suska.ac.id/ijaidm
Email: ijaidm@uin-suska.ac.id
e-Journal: http://ejournal.uin-suska.ac.id/index.php/ijaidm
Phone: 085275359942

Click Here for Information


Journal Indexing:

Google Scholar | ROAD | PKP Index | BASE | ESJI | General Impact Factor | Garuda | Moraref | One Search | Cite Factor | Crossref | WorldCat | Neliti  | SINTA | Dimensions | ICI Index Copernicus 

IJAIDM Stats