Academia.eduAcademia.edu

Table 14: ... continued  5 Steganography and steganalysis towards machine learning  network can hide an image inside the OI to produce the CI, and the decoder network can produce the complete hid-  den image  from the CI. However, the robustness of the tech-  nique has not been verified. In [315], a two-stage authen- tication based deep steganography and matrix encoding  technique  has been  not directly embedd  the distorti  ing technig improve id  entity au  proposed. Here, the secret message is ed in the pixels of the OI. Therefore,  on in the Cl is significantly less than other exist- ues. Primarily, the objective of this schema is to  hentication. An invisible steganogra-  phy technique associating generative adversarial network  and mixed  loss func  ion has been suggested in [316]. Here,  a secret image is embedded in the original color image of equal size. However, to obtain imperceptible CI, the se- cret bits are embedded only in the Y channel, which do not carry any color-related features of the image. A U-Net CNN structure-based IST with two different networks such as hidden and extraction networks has been proposed in [317]. Using the hidden network, the sender embeds the se- cret image in an OI, and the receiver extracts the SI from the CI to obtain the SI. The resulting CI does not exhibit any visual cues to the outsider.   towards machine learning  With the rapid growth in the field of artificial intelligence, many steganographers move towards ML-based steganog- raphy and steganalysis [312]. It is too early to speak abou whether a trained model can be really helpful in regards to hiding and recovering information from the digital objec accurately. However, recently some researchers proved hat it is possible for machines to hide the secret message in a digital image. Until now, the count of such techniques hat use ML-based algorithms like CNN, artificial neura network, recurrent neural network, and deep learning are very few. But, these algorithms can be efficiently utilized as he steganalysis tools to analyze the hidden contents from he image [313]. They can capture the convoluted depen- dencies among the pixels to analyze and identify the pres- ence of secret bits. Therefore, these ML-based steganalysis echniques pose a big challenge to the heuristic or conven- ional ISTs. The conventional ISTs are well handcrafted, but they are heuristic. It means a certain level of exper- ise is required to understand where and how exactly to embed the secret bits. Conversely, with minimum effort, deep learning based CNNs can accomplish this. The only hing here is to design the structure of the encoder and de- coder. For example, the artificial neural network can effec- ively identify the optimal embedding location in an image. Therefore, in the near future, it is expected that the fight be- ween steganography and steganalysis is going to be the fight between the neural networks. Further, it is also ex- pected that the trained AI models can perform the embed- ding and extraction on their own when they are trained with supplying necessary features or inputs. Therefore, his can reduce human intervention for performing the em- bedding and extraction to a greater extent in the coming future. Therefore, ML-based techniques are promising to pay great attention to achieve a lot of wonders in the ste- ganalysis domain.  Baluja [314] implemented LSBS and matrix coding-   With the rapid growth in the field of artificial intelligence,

Table 14 ... continued 5 Steganography and steganalysis towards machine learning network can hide an image inside the OI to produce the CI, and the decoder network can produce the complete hid- den image from the CI. However, the robustness of the tech- nique has not been verified. In [315], a two-stage authen- tication based deep steganography and matrix encoding technique has been not directly embedd the distorti ing technig improve id entity au proposed. Here, the secret message is ed in the pixels of the OI. Therefore, on in the Cl is significantly less than other exist- ues. Primarily, the objective of this schema is to hentication. An invisible steganogra- phy technique associating generative adversarial network and mixed loss func ion has been suggested in [316]. Here, a secret image is embedded in the original color image of equal size. However, to obtain imperceptible CI, the se- cret bits are embedded only in the Y channel, which do not carry any color-related features of the image. A U-Net CNN structure-based IST with two different networks such as hidden and extraction networks has been proposed in [317]. Using the hidden network, the sender embeds the se- cret image in an OI, and the receiver extracts the SI from the CI to obtain the SI. The resulting CI does not exhibit any visual cues to the outsider. towards machine learning With the rapid growth in the field of artificial intelligence, many steganographers move towards ML-based steganog- raphy and steganalysis [312]. It is too early to speak abou whether a trained model can be really helpful in regards to hiding and recovering information from the digital objec accurately. However, recently some researchers proved hat it is possible for machines to hide the secret message in a digital image. Until now, the count of such techniques hat use ML-based algorithms like CNN, artificial neura network, recurrent neural network, and deep learning are very few. But, these algorithms can be efficiently utilized as he steganalysis tools to analyze the hidden contents from he image [313]. They can capture the convoluted depen- dencies among the pixels to analyze and identify the pres- ence of secret bits. Therefore, these ML-based steganalysis echniques pose a big challenge to the heuristic or conven- ional ISTs. The conventional ISTs are well handcrafted, but they are heuristic. It means a certain level of exper- ise is required to understand where and how exactly to embed the secret bits. Conversely, with minimum effort, deep learning based CNNs can accomplish this. The only hing here is to design the structure of the encoder and de- coder. For example, the artificial neural network can effec- ively identify the optimal embedding location in an image. Therefore, in the near future, it is expected that the fight be- ween steganography and steganalysis is going to be the fight between the neural networks. Further, it is also ex- pected that the trained AI models can perform the embed- ding and extraction on their own when they are trained with supplying necessary features or inputs. Therefore, his can reduce human intervention for performing the em- bedding and extraction to a greater extent in the coming future. Therefore, ML-based techniques are promising to pay great attention to achieve a lot of wonders in the ste- ganalysis domain. Baluja [314] implemented LSBS and matrix coding- With the rapid growth in the field of artificial intelligence,