ADAPTIVE HYBRID STEGANOGRAPHY: A MULTI-DOMAIN APPROACH FOR ENHANCED SECURITY AND IMPERCEPTIBILITY IN DIGITAL COMMUNICATION

Authors

  • Mehak Preet Student, M. Tech CSE, Department of CSE, Arni University, Kangra, India. Author
  • Sunita Assistant Professor, Department of CSA, Arni University, Kangra, India. Author
  • Gurvinder Singh Assistant Professor, Department of CSA, Arni University, Kangra, India. Author

Keywords:

Steganography, Steganalysis, Digital Media, Information Hiding, Security

Abstract

Steganography, the art and science of hiding information within other non-secret text or data, has evolved significantly with advancements in digital technology. This technique leverages various media formats such as images, audio, video, and text to conceal data, making it an essential tool for secure communication in an increasingly interconnected world. This comprehensive review explores the fundamental principles of steganography, highlighting its historical evolution, methodologies, and contemporary applications. We delve into the different steganographic techniques, including spatial domain, transform domain, and adaptive methods, emphasizing their strengths and weaknesses in terms of capacity, imperceptibility, and robustness. The review also addresses the critical aspect of security in steganography, discussing the potential threats and countermeasures associated with steganalysis, the process of detecting hidden information. We examine various steganalysis techniques, from basic statistical analysis to advanced machine learning algorithms, assessing their efficacy in different scenarios. Furthermore, the ethical and legal implications of steganography are considered, given its dual-use nature in both protecting privacy and facilitating malicious activities. The review concludes with an overview of emerging trends and future directions in the field, including the integration of artificial intelligence and the development of novel steganographic frameworks that promise enhanced security and efficiency. By providing a holistic understanding of steganography and its security aspects, this review aims to inform researchers and practitioners about the current state and future prospects of this intriguing discipline.

References

Amrit, P., & Singh, A. K. (2023). AutoCRW: Learning based robust watermarking for smart city applications. Software - Practice and Experience. https://doi.org/10.1002/SPE.3197

Evsutin, O., & Dzhanashia, K. (2022). Watermarking schemes for digital images: Robustness overview. Signal Processing: Image Communication, 100. https://doi.org/10.1016/j.image.2021.116523

Fang, H., Jia, Z., Qiu, Y., Zhang, J., Zhang, W., & Chang, E.-C. (2022). De-END: Decoder-driven Watermarking Network. http://arxiv.org/abs/2206.13032

Fang, H., Jia, Z., Zhou, H., Ma, Z., & Zhang, W. (2023). Encoded Feature Enhancement in Watermarking Network for Distortion in Real Scenes. IEEE

Transactions on Multimedia, 25, 2648–2660. https://doi.org/10.1109/TMM.2022.3149641

Fernandez, P., Sablayrolles, A., Furon, T., Jégou, H., & Douze, M. (2022). WATERMARKING IMAGES IN SELF-SUPERVISED LATENT SPACES. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2022-May, 3054–3058. https://doi.org/10.1109/ICASSP43922.2022.9746058

Ge, S., Fei, J., Xia, Z., Tong, Y., Weng, J., & Liu, J. (2023). A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Processing, 17(2), 323–336. https://doi.org/10.1049/IPR2.12653

Hu, K., Wang, M., Ma, X., Chen, J., Wang, X., & Wang, X. (2024). Learning-based image steganography and watermarking: A survey. Expert Systems with Applications, 249, 123715. https://doi.org/10.1016/J.ESWA.2024.123715

Huang, J., Luo, T., Li, L., Yang, G., Xu, H., & Chang, C. C. (2023). ARWGAN: Attention-Guided Robust Image Watermarking Model Based on GAN. IEEE Transactions on Instrumentation and Measurement, 72. https://doi.org/10.1109/TIM.2023.3285981

Janu, N., Kumar, A., Dadheech, P., Sharma, G., Kumar, A., & Raja, L. (2021). Multiple Watermarking Scheme for Video & Image for Authentication & Copyright Protection. IOP Conference Series: Materials Science and Engineering, 1131(1), 012020. https://doi.org/10.1088/1757-899X/1131/1/012020

Kandi, H., Mishra, D., & Gorthi, S. R. K. S. (2017). Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Computers and Security, 65, 247–268. https://doi.org/10.1016/j.cose.2016.11.016

Li, L., & Li, X. (2010). Watermarking protocol for broadcast monitoring. Proceedings of the International Conference on E-Business and E-Government, ICEE 2010, 1634–1637. https://doi.org/10.1109/ICEE.2010.414

Li, Y., Wang, H., & Barni, M. (2021). A survey of Deep Neural Network watermarking techniques. Neurocomputing, 461, 171–193. https://doi.org/10.1016/j.neucom.2021.07.051

Li, Y., Zhang, W., Fang, H., Yang, X., Ma, Z., & Yu, N. (2022). Font Watermarking Network for Text Images. Proceedings - International Conference on Image Processing, ICIP, 486–490. https://doi.org/10.1109/ICIP46576.2022.9897724

Plata, M., & Syga, P. (2020a). Robust spatial-spread deep neural image watermarking. Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, 62–70. https://doi.org/10.1109/TRUSTCOM50675.2020.00022

Plata, M., & Syga, P. (2020b). Robust watermarking with double detector-discriminator approach. http://arxiv.org/abs/2006.03921

Qin, C., Li, X., Zhang, Z., Li, F., Zhang, X., & Feng, G. (2024). Print-Camera Resistant Image Watermarking With Deep Noise Simulation and Constrained Learning. IEEE Transactions on Multimedia, 26, 2164–2177. https://doi.org/10.1109/TMM.2023.3293272

Sridhar, B., & Syambabu, V. (2021). An importance of Crypto-watermarking techniques for secure transmission of multimedia information. 2021 3rd International Conference on Signal Processing and Communication, ICPSC 2021, 64–66. https://doi.org/10.1109/ICSPC51351.2021.9451766

Wang, Z., Byrnes, O., Wang, H., Sun, R., Ma, C., Chen, H., Wu, Q., & Xue, M. (2023). Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography. IEEE Transactions on Computational Social Systems, 10(6), 2985–2999. https://doi.org/10.1109/TCSS.2023.3268950

Wen, B., & Aydore, S. (2019). ROMark: A Robust Watermarking System Using Adversarial Training. http://arxiv.org/abs/1910.01221

Wu, X., Liao, X., & Ou, B. (2023). SepMark: Deep Separable Watermarking for Unified Source Tracing and Deepfake Detection. MM 2023 - Proceedings of the 31st ACM International Conference on Multimedia, 1190–1201. https://doi.org/10.1145/3581783.3612471

Xu, H.-B., Wang, R., Wei, J., & Lu, S.-P. (2021). A Compact Neural Network-based Algorithm for Robust Image Watermarking. http://arxiv.org/abs/2112.13491

Ye, G., Gao, J., Yin, B., Xie, W., & Wei, X. (2023). Deep Boosting Robustness of DNN-Based Image Watermarking via Dbmark. Proceedings - 2023 International Conference on Culture-Oriented Science and Technology, CoST 2023, 186–191. https://doi.org/10.1109/CoST60524.2023.00046

Zhang, B., Wu, Y., & Chen, B. (2022). Embedding Guided End-to-End Framework for Robust Image Watermarking. Security and Communication Networks, 2022. https://doi.org/10.1155/2022/7259469

Downloads

Published

2024-10-09

How to Cite

Mehak Preet, Sunita, & Gurvinder Singh. (2024). ADAPTIVE HYBRID STEGANOGRAPHY: A MULTI-DOMAIN APPROACH FOR ENHANCED SECURITY AND IMPERCEPTIBILITY IN DIGITAL COMMUNICATION. JOURNAL OF COMPUTER ENGINEERING AND TECHNOLOGY (JCET), 7(02), 17-26. https://lib-index.com/index.php/JCET/article/view/JCET_07_02_002