Image-to-Image_Steganography_Using_Encoder-Decoder
Image-to-Image_Steganography_Using_Encoder-Decoder
Volume 13 • Issue 1
Image-to-Image Steganography
Using Encoder-Decoder Network
Vijay Kumar, National Institute of Technology, Hamirpur, India*
Ashish Choudhary, National Institute of Technology, Hamirpur, India
Harsh Vardhan, National Institute of Technology, Hamirpur, India
ABSTRACT
In this paper, a convolution neural network is utilized for image-to-image steganography using encoder
decoder architecture. A new loss function is designed to improve the invisibility of payload image.
The encoder-decoder architecture is used for the image-to-image steganography. The developed
architecture is evaluated on the well-known image dataset and compared with the recently developed
models. The proposed model was able to withstand the stegoanalyzer attack and better visual quality
of stego image. It is able to achieve great imperceptibility.
Keywords
Deep Learning, Generative adversarial networks, Image Steganography, Steganalysis, Stego-image
1. INTRODUCTION
Due to the development in technology, the transmission of data from one place to another is easy
and fast. Whereas, the breach of information can be done through the advance tools and techniques.
Sometimes, the leaked information may cause the severe losses. Information hiding techniques are
used to resolve this problem (Kumar and Kumar, 2010). These techniques are able to conceal the
important data in a way so that the intruder is unable to reveal the secret data. These are widely used
in business and army for secret data communication. These techniques are broadly categorized into
three classes namely, watermarking, cryptography, and steganography (Girdhar and Kumar, 2018). In
watermarking, the watermark is added to the data for their authenticity. The watermark can be text,
image, and audio. Watermark can be visible or invisible according to the applicability of watermarking
in a specific area. However, this technique reveals the presence of watermark and easily modified by
the intruders (Kaur et al., 2020). The second well-known technique is cryptography. Cryptography
technique encrypts the secret message itself. This technique scrambles the secret message so that the
intruders are unable to reveal the important information from the scrambled message (Al-Ataby and
Al-Naima, 2010). The third technique is steganography. Steganography conceals the data into another
media for the security purpose. This technique uses encoder to encode secret data into cover data.
The decoder is used to decode the encoded message for secret message extraction. According to the
nature of data, steganography techniques are broadly categorized into three classes namely, image,
audio, and video (Kumar and Kumar, 2019). The main focus of this paper is image steganography
due to the ease to implement in various domains.
1
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
Image steganography can be implemented in two different domains. These are spatial and
frequency domains (Kumar et al., 2020). The former one modify the pixel values of an image through
the computational techniques. Least-Significant Bit (LSB) technique is the well-known example of
spatial domain technique (Ker, 2005). LSB manipulates the lowest-order bits of pixels in the given
images to conceal the secret message. It methodically amends the statistical distribution of pixels of
the image. The latter one transform the pixel values of the image. The transformed coefficients were
processed to encode the secret message (Kumar and Kumar, 2017). The well-known frequency domain
techniques are discrete cosine transform (DCT) and discrete wavelet transform (DWT). However,
these techniques are not sufficient to handle the secret message in this modern era. To develop the
efficient steganography technique, the concepts of modern technologies have been incorporated.
Recently, the deep learning techniques are widely used in steganography for strengthen the concealed
secret data. The well-known deep learning technique is the convolutional neural network (CNN). Baluja
(2017) utilized CNN for hiding the image into another cover image. An auto-encoder is used for image
compression during the hiding process. Rehman et al. (2017) developed an encoder-decoder network to
conceal the grey images into other images. In this paper, an encoder-decoder methodology is designed
for the image steganography. This model can easily concealed the secret image inside a cover image
and also extracted it with low distortion in quality. The main contributions of this paper are:
1. An encoder decoder methodology is designed for image steganography with automatic feature selection.
2. An extensive hyper-parameter tuning is done, which majorly lags in the previous research works.
3. The designed methodology is evaluated on the publicly available datasets and tested through the
well-known evaluation measures.
The remaining structure of this paper is as follows. Section 2 presents the related work done in
the direction of image steganography. The proposed steganography method is mentioned in Section
3. The experimental results and discussion are mentioned in Section 4. The future research directions
are presented in Section 5 followed by the conclusion in Section 6.
2. RELATED WORK
A lot of research has been done in the field of image steganography using deep learning techniques.
The emergence of generative adversarial networks (GAN) can be applied in the image steganography.
Due to this, researchers utilized GAN in this field.
Rehman et al. (2017) developed an encoder-decoder network for image steganography. A new
loss function was designed to train the developed network. The proposed network was tested on five
datasets. This model provided better results than the other techniques. Setiadi (2019) utilized the most
significant bit pixels of cover to hide the secret image. This method attained better PSNR value as
compared to the existing techniques. The embedding capacity of proposed method was also increased
by a large number of pixels. However, the computational complexity of the proposed method is high.
Swain (2019) proposed two steganography techniques based on the difference between pixel value
and quotient value. The neighbouring pixels were computed according to central pixel. The proposed
technique attained better value of PSNR than the existing techniques. However, the performance of
this method can be further improved by compression and encryption techniques.
Das et al. (2021) used the deep neural networks to encode multiple images into a single cover
image. However, this method has high loss value. New loss functions have to be designed to improve
the performance of this method. Kumar et al. (2020) used conventional neural network (CNN) to
design the steganography technique. Adam optimizer was used in CNN. It was able to provide the
better visual perception for stego image. Ray et al. (2021) hybridized deep learning and edge detection
techniques for image steganography. This method embedded the payload data in the edge area of
2
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
an image and less data was embedded in non-edge areas. This method provided better embedding
capacity as compared to the other techniques. Hamid et al. (2021) used SqueezeNet for embedding
the secret data into the cover image. They used the concepts of S-UNIWARD method. This method
is independent from the features of dataset. The classification accuracy obtained from this method
was better than the other techniques. Fu et al. (2020) proposed a model named HIGAN, which was
based on the encoder-decoder network. The secret image was extracted through decoder. This model
attained less colour distortion and high security.
Shang et al. (2020) used adversarial concepts to improve the image steganography. This method
was to able withstand the attacks from steganalyzer tools. It was able to extract the secret image
with less distortion. Zhang et al. (2019) employed a GAN to hide the grey images into Y channel of
cover image. This method minimized the divergence between stego and cover images. A new loss
function was designed to generate better stego image. This method suffers from the security problem.
Baluja (2017) developed a CNN-based on the organization of encoder-decoder network. The encoder
network concealed the secret image into the cover image. Whereas, the decoder network extracted
the secret image from the encoded image. This method distorted the colour quality of stego images.
Volkhonskiy et al. (2016) developed a new model for steganography using deep convolutional GAN
(DCGAN). This model was able to provide realistic stego image. Hayes and Danezis (2017) utilized
the concepts of neural networks as a component in the traditional algorithms. They used deep neural
networks to model the data-hiding pipeline. These networks have significantly improved the efficiency
in terms of maintaining the secrecy and quality of the encoded messages.
Al-Ataby and Al-Naima (2010) proposed a modified high-capacity image steganography technique
that depends upon wavelet transform with acceptable levels of imperceptibility and distortion in the
cover image. Zhu et al. (2018) developed an end-to-end framework for image steganography. Three
CNNs were used for encoder, decoder, and adversary networks. This framework was able to generate
the better stego image as compared to other techniques. Shi et al. (2017) utilized the concepts of
adversary-based secret image embedding and detecting game.
3. PROPOSED MODEL
The proposed model for steganography is motivated from Rehman et al. (2017). Two modifications
have been done in the existing technique. First, the payload image is taken from the same dataset
instead of other source. Second, the leaky ReLU is used in the proposed model. The encoder-decoder
methodology is used in the proposed model. By using this technique, it eliminates the need of feature
selection. The description of the proposed model is mentioned in the succeeding subsections.
3
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
4
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
5
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
1. Dataset is decomposed into two sub-datasets by using the split size of 0.70 for training and 0.30
for testing purpose.
2. Payload and cover images are randomly selected from the corresponding dataset.
3. The transformers are used to normalize the data.
4. Set the control parameters of proposed model. The learning rate of RMSprop optimizer is set to
0.001. 150 epochs are used to train the model. The batch sizes of training and testing modules
are set to 128 and 64, respectively. Both the encoder and decoder are stacked in different models.
5. Train the proposed model on the training dataset.
6. Test the proposed model on testing dataset.
4. EXPERIMENTAL RESULTS
The performance of the proposed model is evaluated on a diverse set of publicly available datasets namely Tiny
ImageNet (Abai and Rajmalwar, 2020), CIFAR-100 (Krizhevsky and Hinton, 2009), and F-MNIST (Xiao et
al., 2017). The well-known performance measures are used to validate the performance of proposed model.
The second dataset is F-MNIST. It consists of 60,000 images for training purpose and 10,000
images for testing purpose. Each image has size of 28x28. These images are categorized into ten
different classes. Figure 5 illustrates the sample images from F-MNIST.
Tiny ImageNet dataset consists of 100,000 images and each image have size of 64x64. These
images are grouped into 200 classes. Each class contains 500 images for training purpose. 100 images
are used for validation and testing purpose. Due to limited computation power available, we have
used 10,000 images for experimentation. The some sample images are depicted in Figure 6. Table 1
shows the detail descriptions of the above-mentioned datasets.
6
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
Max 2
I
PSNR = 10log (1)
MSE
7
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
where MaxI denotes the maximum possible pixel value of the given image. MSE denotes the mean
square error and is defined as (Wang et al., 2004):
m n
1 2
MSE =
mn ∑∑ I (i, j ) − K (i, j ) (2)
i =1 j =1
where m and n represent the dimension of an image. I and K denote the original image and reconstructed
image, respectively.
Figure 7. Results of hiding payload images into source image on Tiny ImageNet dataset
8
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
Table 2. Comparison of PSNR and SSIM values on different dataset obtained from the proposed model
Figure 8. PSNR obtained from the proposed model and CNN-ED on (a) CIFAR-100, (b) Tiny ImageNet datasets
Figure 9. SSIM index obtained from the proposed model and CNN-ED on (a) CIFAR-100, (b) Tiny ImageNet datasets
9
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
Table 3. Effect of loss function on the performance of proposed algorithm over CIFAR–100
5. FUTURE DIRECTION
In comparison to the earlier methods, the encoder-decoder network is used to either augment or replace a small
portion of secret image in the image hiding system. The work presented in this paper can be improved in near
future. The adversarial networks can be incorporated to enhance the security. The embedding capacity can be
improved by using the computational techniques. The visual inspection can be further improved by using the
latest techniques. This can be achieved by the joining adversarial network in the encoder-decoder architecture.
This will help in making this system more secure and can easily able to bypass any steganalysis software.
6. CONCLUSION
In this paper, the image steganography model is proposed to conceal gray secret image into a color
image with the same size excellently. The proposed model utilized the concept of encode-decoder
network. The loss function has been designed by incorporating the mean absolute error. Leaky ReLU
has been added in the developed model to eliminate vanishing gradient problems. The proposed
model was evaluated on three different image datasets. This model provide better results than the
other technique in terms of PSNR and SSIM.
The proposed model can be further improved by decreasing the loss in decoder network. The image
steganography can be extended with generative adversarial network that will tweak the model and also
boost it security several times.
CONFLICT OF INTEREST
FUNDING AGENCY
This research received no specific grant from any funding agency in the public, commercial, or not-
for-profit sectors.
10
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
REFERENCES
Abai, Z., & Rajmalwar, N. (2020) DenseNet models for tiny ImageNet classification. ArXiv:1904.10429
Al-Ataby, A., & Al-Naima, F. (2010). A modified high capacity image steganography technique based on wavelet
transform. The International Arab Journal of Information Technology, 7(4), 358–364.
Baluja, S. (2017) Hiding images in plain sight: Deep steganography. In: Proceedings of Advances in Neural
Information Processing Systems, 30, (pp. 2069–2079).
Das, A., Wahi, J. S., Anand, M., & Rana, Y. (2021) Multi-Image steganography using deep neural networks.
ArXiv:2101.00350
Fu, Z., Wang, F., & Cheng, X. (2020). The secure steganography for hiding images via GAN. EURASIP Journal
on Image and Video Processing, 46.
Girdhar, A., & Kumar, V. (2018). A comprehensive survey of 3D image steganography techniques. IET Image
Processing, 12(1), 1–10. doi:10.1049/iet-ipr.2017.0162
Hamid, N., Sumait, B. S., Bakri, B. I., & Al-Qershi, O. (2021). Enhacing visual quality of spatial image
steganography using SqueezeNet deep learning network. Multimedia Tools and Applications, 80(28-29),
36093–36109. doi:10.1007/s11042-021-11315-y
Hayes, J., & Danezis, G. (2017) Generating steganographic images via adversarial training. In: proceedings of
Neural Information Processing Systems, (pp. 1-10).
Kaur, M., Kumar, V., & Singh, D. (2020). An efficient image steganography method using multi-objective
differential evolution. Digital Media Steganography.
Ker, A. D. (2005). Steganalysis of LSB matching in grayscale images. IEEE Signal Processing Letters, 12(6),
441–444. doi:10.1109/LSP.2005.847889
Krizhevsky, A., & Hinton, G. (2009). Learning multiple layers of features from tiny images. Technical Report.
University of Toronto.
Kumar, V., & Kumar, D. (2010) Performance evaluation of dwt based image steganography. In: Proceedings of
IEEE International on Advance Computing Conference, (pp. 223-228). Patiala. doi:10.1109/IADCC.2010.5423005
Kumar, V., & Kumar, D. (2017). A modified DWT-based image steganography technique. Multimedia Tools
and Applications, 77(11), 13279–13308. doi:10.1007/s11042-017-4947-8
Kumar, V., & Kumar, D. (2019). Performance evaluation of modified color image steganography using discrete
wavelet transform. Journal of Intelligent Systems, 28(5), 749–758. doi:10.1515/jisys-2017-0134
Kumar, V., Rao, P., & Choudhary, A. (2020). Image steganography analysis based on deep learning. Review of
Computer Engineering Studies, 7(1), 1–5. doi:10.18280/rces.070101
Ray, B., Mukhopadhyay, S., Hossain, S., Ghosal, S. K., & Sarkar, R. (2021). Image steganography using deep
learning based edge detection. Multimedia Tools and Applications, 80(24), 33475–33503. doi:10.1007/s11042-
021-11177-4
Rehman A.U., Rahim R., Nadeem S., & Hussain S.U. (2017) End-to-End Trained CNN Encoder-Decoder
Networks for Image Steganography. CoRR, abs/1711.07201.
Setiadi D.R.I.M. (2019) Improved payload capacity in LSB image steganography uses dilated hybrid edge
detection. Journal of King Saud University – Computer and Information Sciences.
Shang, Y., Jiang, S., Ye, D., & Huang, J. (2020). Enhancing the security of deep learning steganography via
adversarial examples. Mathematics, 8(9), 1446. doi:10.3390/math8091446
Shi, H., Dong, J., Wang, W., Qian, Y., & Zhang, X. (2017) Ssgan: Secure steganography based on generative
adversarial networks. In Pacific Rim Conference on Multimedia, (pp. 534–544).
Swain, G. (2019). Two new steganography techniques based on quotient value differencing with addition-
subtraction logic and PVD with modulus function. Optik (Stuttgart), 180, 807–823. doi:10.1016/j.ijleo.2018.11.015
11
International Journal of Social Ecology and Sustainable Development
Volume 13 • Issue 1
Volkhonskiy, D., Borisenko, B., & Burnaev, E. (2016) Generative adversarial networks for image steganography.
In: Proceedings of International Conference on Learning Representations, Toulon, France
Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility
to structural similarity. IEEE Transactions on Image Processing, 13(4), 600–612. doi:10.1109/TIP.2003.819861
PMID:15376593
Xiao, H., Rasul, K., & Vollgraf, R. (2017) Fashion-MNIST: a novel image dataset for benchmarking machine
learning algorithms. ArXiv:1708.07747
Zhang, R., Dong, S., & Liu, J. (2019). Invisible steganography via generative adversarial networks. Multimedia
Tools and Applications, 78(7), 8559–8575. doi:10.1007/s11042-018-6951-z
Zhu J., Kaplan R., Johnson J., & Fei-Fei L. (2018) HiDDen: Hiding data with deep networks. CoRR,abs/1807.09937.
Harsh Vardhan is currently pursuing a Btech from NIT Hamirpur. His research interest is Image Steganography,
Deep Learning, and Machine Learning.
12