A Novel Steganography Approach Using S-CycleGAN With an Improvement of Loss Function

A Novel Steganography Approach Using S-CycleGAN With an Improvement of Loss Function

Minakshi Sarkar (Haldia Institute of Technology, India), Indrajit Banerjee (Indian Institute of Engineering Science and Technology, Shibpur, India), Tarun Kumar Ghosh (Haldia Institute of Technology, India), Anirban Samanta (Haldia Institute of Technology, India), and Anirban Sarkar (Guru Nanak Institute of technology, India)
DOI: 10.4018/978-1-6684-7524-9.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Technologies related to the internet of things (IoT) have been extensively employed in business operations, military research, networking technologies, etc. With the proliferation of the IoT, data theft and leakage have gradually increased because the data communication system is public. Various novel steganography algorithms have been proposed for data hiding. But in this process, the quality of the hidden image decreases badly. We want to give an accurate color to the image instead of severe color changes. To change it, we have to perform a colorization process by mapping the original image to the stego image. It gains more characteristics according to the actual embodiment. Here, the objective is to improve the appearance by calculating the loss function. The stego image can withstand steganalysis by using the authors' proposed scheme by maintaining its integrity while to some extent improving the quality of the image. The experimental results confirmed the proposed method outperforms the existing methods (SGAN and CycleGAN) for information hiding with enhanced image transmission quality.
Chapter Preview
Top

1. Introduction

The wide use of personal computers and the availability of multimedia content on the web provided the ideal conditions for the exposing of private information since information might contain valuable, personal, medical information (Hore et al. 2016; Chakraborty et al. 2017) or even confidential information (Roy et al. 2019; Seal et al. 2017). Furthermore, there are certain major risks to the leaked information, including unauthorized manipulation, copying, and transmission. Image steganography has evolved as a crucial matter in the prospect of secret communication and copyright infringement. Since steganography involves complex computations to embed secret information in cover images, implementing it for technology speeds up the process and increases its acceptability (Shet et al. 2019; Roy et al. 2020; Chakraborty & Mali, 2021a, 2021b; Singh et al. 2020). However, the cover image will still show the changes brought about by the embedding, allowing it to apply processes more effectively called steganalysis, a technique for finding secret data. The exchange of information between the mobile unit and the server creates the interface between the items and the network, which sends information to the mobile terminal over the network (Qiu et al. 2018; Chakraborty et al. 2016; Mali et al. 2021). Public service computing in this context is typically provided by high-performance servers (Qiu et al. 2018). The emergency packets are now being used and upgraded to effectively handle the network congestion issue in the Internet of Things, we propose a novel steganography method based on generative adversarial networks (GAN). If the cover data are available to the public, a third party can easily decode the secret message by comparing the cover data to the message being hidden. We require a distinct cover data for each piece of secret communication in order to prevent this problem. In this study, we rely on images as the cover data. We can employ GAN to create a great deal of unique and authentic-looking photos. In reality, GAN training leads to the creation of the generator and discriminator neural networks. The discriminator evaluates the virtual pictures' naturalness once the generator generates them. The generator and discriminator are both used in the proposed methods to secure the sender side cover information is authentic and to remove stego data provided by unreliable third parties. In this work, before considering the viability of using the discriminator we need to test naturalness of images, we first established that the generator can produce an infinite amount of cover data. We hope that the proposed method can provide a more effective way of information concealment.

Complete Chapter List

Search this Book:
Reset