Secret data transmission using advanced steganography and image compression

Document Type : Research Paper

Authors

1 Department of Electronics Engineering, Institute of Engineering and Technology, Dr. A.P.J. Abdul Kalam Technical University, Lucknow, India

2 Department of Computer Engineering Collage of Engineering, University of Diyala: Baqubah, Diyala, Iraq

3 Department of Computer Science, College of Computer Science and Information Technology, University of Anbar, Ramadi, Iraq

4 College of Medicine, University of Anbar, Ramadi, Iraq

5 Faculty of Computer Science and Mathematics, University of Kufa, Iraq.

Abstract

Growing requirements for preservation as well as transportation of multi-media data have been a component of everyday routine throughout the last numerous decades. Multimedia data such as images and videos play a major role in creating an immersive experience. Data and information must be transmitted quickly and safely in today’s technologically advanced society, yet valuable data must be protected by unauthorised people. Throughout such work, a covert communication as well as textual data extraction approach relying on steganography and image compression is constructed by utilising a deep neural network. Using spatial steganography, the initial input textual image and cover image are all first pre-processed, and afterwards the covert text-based images are further separated and implanted into the least meaningful bit of the cover image picture element. Thereafter, stego- images are compressed to create an elevated quality image and to save storage capacity at the sender’s end. After all this, the receiver will receive this stego-image through a communication channel. Subsequently, steganography and compression are reversed at the receiver’s end. This work has a multitude of problems that make it a fascinating subject to embark on. Selecting the correct steganography and image compression method is by far the most important part of this work. The suggested method, which integrates both image-steganography and compaction, achieves better efficacy in relation to peak signal-to-noise.

Keywords

[1] A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for
medical image encryption, J. Discrete Math. Sci. Crypt. 24(6) (2021) 1663–1673.
[2] R. Ahmad and N.S. Choubey, Review on image enhancement techniques using biologically inspired artificial
bee colony algorithms and its variants, In Lecture Notes in Computational Vision and Biomechanics, Springer:
Dordrecht, The Netherlands, 25 (2018) 249–271.[3] S. Aishwarya and S. Veni, Hardware implementation of EZW based image compression with Huffman coding, Int.
J. Engin. Sci. Innov. Tech. 2(5) (2013).
[4] M.M.S.A. Al-Momin, I.A. Abed and H.A. Leftah, A new approach for enhancing LSB steganography using bidirectional coding scheme, Int. J. Elect. Comput. Engin. 9(6) (2019) 5286–5294.
[5] J.A. Alvarez-Cedillo, T. Alvarez-Sanchez, M. Aguilar-Fernandez and J. Sandoval-Gutierrez, Many-core algorithm
of the embedded zerotree wavelet encoder, In Coding Theory, S. Radhakrishnan and M. Sarfraz (eds.) Rijeka:
Intech Open, 2020.
[6] A.A. Attaby, M.F.M. Ahmed and A.K. Alsammak, Data hiding inside JPEG images with high resistance to
steganalysis using a novel technique: DCT-M3, Ain Shams Engin. J. 9(4) (2018) 1965–1974.
[7] R. Baran, P. Partila and R. Wilk, Automated text detection and character recognition in natural scenes based
on local image features and contour processing techniques, international conference on intelligent human systems
integration, Springer, Cham, (2018) 42–48.
[8] R. Boujelbene, L. Boubchir and Y.B. Jemaa, Enhanced embedded zerotree wavelet algorithm for lossy image
coding, IET Image Proc. 13(8) (2019) 1364–1374.
[9] M.S. Chavan, N. Mastorakis, M.N. Chavan and M.S. Gaikwad, Implementation of SYMLET wavelets to removal
of Gaussian additive noise from speech signal, World Sci. Engin. Acad. Soc. (WSEAS) (2011) 37–41.
[10] A. Cherian and A. Sullivan, Sem-GAN: semantically-consistent image-to-image translation, Proc. IEEE Winter
Conf. Appl. Comput. Vis. (WACV) (2019) 1797–1806.
[11] E. Delp and O. Mitchell, Image compression using block truncation coding, Commun. IEEE Trans. 27 (1979)
1335–1342.
[12] V. Elamaran, Comparison of wavelet filters in image coding and denoising using dembedded zerotree wavelet
algorithm, Res. J. Appl. Sci., Engin. Tech. 4(24) (2012) 5449–5452.
[13] A.E. El-Sharkawey and M.E. Ali, Comparison Between (RLE & Huffman and DWT) Algorithms for Data Compression, 2019.
[14] R.G. Gallager, Claude E. Shannon: a retrospective on his life, work, and impact, Inf. Theory, IEEE Trans. 47(7)
(2001) 2681–2695.
[15] D. Gautam and A. Singh, Resourceful fast discrete hartley transform to replace discrete fourier transform with
implementation of DHT algorithm for VLSI architecture, Turkish J. Comput. Math. Educ. 12(10) (2021) 5290–
5298.
[16] L. Gong, C. Deng, S. Pan and N. Zhou, Image compression-encryption algorithms by combining hyper-chaotic
system with discrete fractional random transform, Optics Laser Tech. 103 (2018) 48–58.
[17] D. Grois and O. Hadar, Efficient region-of-interest scalable video coding with adaptive bit-rate control, Adv.
Multimedia 2013 (2013) 281593.
[18] K. Kalaiselvi, Image compression using SPIHT techniques, J. Math. Inf. 11 (2017) 147–153.
[19] H. Kanagaraj and V. Muneeswaran, Image compression using HAAR discrete wavelet transform, 5th Int. Conf.
Devices Circ. Syst. (2020) 271–274.
[20] B. Kanchanadevi and P.R. Tamilselvi, Post processing using enhanced discrete cosine transform for image compression, Int. J. Adv. Sci. Tech. 29(06) (2020) 9372–9386.
[21] M. Kaur and G.K. AP, A survey on implementation of discrete wavelet transform for image Ddnoising, Int. J.
Communi. Net. Sys. 2(1) (2013).
[22] K. Kaur and B. Kaur, A robust video compression algorithm for efficient data transfer of surveillance data, Int.
J. Engin. Res. Tech. 9(7) (2020).
[23] M.K.H. Kolekar, G.L. Raja and S. Sengupta, An introduction to wavelet-based image processing and its applications, In: M.K.H. Kolekar, G.L. Raja and S. Sengupta (eds), Computer Vision: Concepts, Methodologies, Tools,
and Applications, Hershey, PA: IGI Global (2018) 110–128.
[24] P. Kuldeep and S. Vivek, A survey of various image compression techniques, Indian J. Appl. Res. 5(1) (2015).
[25] J. Liu, Y. Ke, Z. Zhang, Y. Lei, J. Li, M. Li and X. Yang, Recent advances of image steganography with generative
adversarial networks, IEEE Access 8 (2020) 60575–60597.
[26] M.-m. Liu, M.-q. Zhang, J. Liu, Y.-n. Zhang and Y. Ke, Coverless information hiding based on generative
adversarial networks, CoRR (2017).
[27] Y. Luo, X. Ouyang, J. Liu and L. Cao, An image encryption method based on elliptic curve elgamal encryption
and chaotic systems, IEEE Access 7 (2019) 38507–38522.
[28] S. Majumdar, Comparative analysis of Coiflet and Daubechies wavelets using global threshold for image de-noising,
Int. J. Adv. Engin. Tech. 6 (2013) 2247–2252.
[29] Y. Minzhu, Z. Zhipu and H. Changpei, Research on lossless compression based on single-frame interferogram [J],
Modern Elect. Tech. 42(07) (2019) 57–60.[30] D. Napoleon, S. Sathya, M. Praneesh and M.S. Subramanian, Remote sensing image compression using 3D-SPIHT
algorithm and 3d-owt, Int. J. Comput. Sci. Engin. 4(05) (2012) 899–908.
[31] A.J. Oabid, S. AlBermany and N.O. Alkaam, Enhancement in S-Box of BRADG algorithm, In: V. Solanki, M.
Hoang, Z. Lu and P. Pattnaik (eds), Intelligent Computing in Engineering, Advances in Intelligent Systems and
Computing, Springer, Singapore, 1125 (2020).
[32] B.K. Pandey, D. Mane, V.K.K. Nassa, D. Pandey, S. Dutta, R.J.M. Ventayen, G. Agarwal and R. Rastogi, Secure
text extraction from complex degraded images by applying steganography and deep learning, In Multidisciplinary
Approach to Modern Digital Steganography, IGI Global, (2021).
[33] D. Pandey, V.K.K. Nassa, A. Jhamb, D. Mahto, B.K. Pandey, A.S.H. George, A.S. George and S. Bandyopadhyay,
An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego
images, Multidiscip. App. Modern Digital Steganog. (2021) 211–234.
[34] D. Pandey, B.K. Pandey and S. Wairya, Hybrid deep neural network with adaptive galactic swarm optimization
for text extraction from scene images, Soft Comput. 25 (2021) 1563–1580.
[35] B.K. Pandey, D. Pandey, S. Wairya and G. Agarwal, An advanced morphological component analysis, steganography, and deep learning-based system to transmit secure textual data, Int. J. Distrib. Artif. Intell. 13(2) (2021)
40–62.
[36] Z. Peng, G. Wang, H. Jiang and S. Meng, Research and improvement of ECG compression algorithm based on
EZW, Computer Methods Prog. Biomed.145 (2017) 157–166.
[37] D. Po lap, An adaptive genetic algorithm as a supporting mechanism for microscopy image analysis in a cascade
of convolution neural networks, Appl. Soft Comput. J. 97 (2020) 106824.
[38] Y. Pourasad and F. Cavallaro, A novel image processing approach to enhancement and compression of X-ray
images, Int. J. Environ. Res. Public Health 18(13) (2021) 6724.
[39] M. Rathee and A. Vij, Review of image compression techniques based on orthogonal transforms, Int. J. Engin.
Sci. and Innov. Tech. 3(4) (2014).
[40] A. Sahu and G. Swain, Dual stego-imaging based reversible data hiding using improved LSB matching, Int. J.
Intell. Eng. Syst. 12(5) (2019) 63–73.
[41] M.Y. Sashikala, A.S. Solomon and M.N. Nachappa, A survey of compression techniques, Int. J. Recent Tech.
Engin. 2(1) (2013).
[42] A. Savakis and R. Carbone, Discrete wavelet transform core for image processing applications, Proc. SPIE Int.
Soc. Optical Engin. (2005).
[43] Z. Songgang, G. feng, Y. Fulei and L. Xiaowei, Research on UAV video compression based on compression
algorithm [J], Integrated Circuit Appl. 36(04) (2019) 39–40.
[44] S. Suma and V. Sridhar, Computational modelling of image coding using ROI based medical image compression,
Int. J. Comput. Appl. 108(5) (2014) 20–27.
[45] D. VijendraBabu and N.R. Alamelu, Wavelet based medical image compression using ROI EZW, Int. J. Recent
Trends Engin. Tech. 1(3) (2009).
[46] Y. Xu and L. Xu, The performance analysis of wavelet in video coding system, Multimedia Technology (ICMT),
2011 Int. Conf. (2011) 878–883.
[47] M. Yang, W. Zhao, W. Xu, Y. Feng, Z. Zhao, X. Chen and K. Lei, Multitask learning for cross-domain image
captioning, IEEE Trans. Multimedia 21(4) (2019) 1047–1061.
[48] Y. Yu, M. Wang and D. Lima, Alcoholism detection in magnetic resonance imaging by Haar wavelet transform
and back propagation neural network, AIP Conf. Proc. (2018) 040012.
[49] R. Zhang, S. Dong and J. Liu, Invisible steganography via generative adversarial networks, Multimedia Tools
Appl. 78(7) (2019) 8559–8575.
[50] X. Zhou, Research on DCT-based image compression quality, Proc. 2011 Cross Strait Quad-Regional Radio Science
and Wireless Tech. Conf. (2011) 1490–1494.
[51] J. Zhu, R. Kaplan, J. Johnson and L. Fei-Fei, HiDDeN: Hiding data with deep networks, CoRR, 2018.
Volume 12, Special Issue
December 2021
Pages 1243-1257
  • Receive Date: 05 July 2021
  • Accept Date: 10 September 2021