Image to Image Steganography using U-Net Architecture with MobileNet Convolutional Neural Network

Arino Jenynof*, Tohari Ahmad

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Steganography conceals information inside another object, so information is not immediately apparent in the examination. Different from encryption, where a ciphertext is an encrypted object, steganography aims to hide information and the fact that a piece of information is concealed. In the case of image steganography, the secret is embedded into a cover image so that the cover image does not differ substantially, and the secret can be extracted without too many alterations. This paper proposes a method to embed an image into another image using U-Net architecture with MobileNet Convolutional Neural Network. The proposed method is trained and tested on a readily available image dataset, CIFAR10, StanfordCars, and STL10. The result shows that the proposed method can embed and extract images from CIFAR10, StanfordCars, and STL10 datasets with average PSNR of 28.165 dB, 28.539 dB, and 28.226 dB for steganographic images; 27.075 dB, 29.759 dB, and 28.767 dB for extracted images.

Original languageEnglish
Title of host publication2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350335095
DOIs
Publication statusPublished - 2023
Event14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023 - Delhi, India
Duration: 6 Jul 20238 Jul 2023

Publication series

Name2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023

Conference

Conference14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
Country/TerritoryIndia
CityDelhi
Period6/07/238/07/23

Keywords

  • Data hiding
  • convolutional neural network
  • image steganography
  • information security
  • infrastructure

Fingerprint

Dive into the research topics of 'Image to Image Steganography using U-Net Architecture with MobileNet Convolutional Neural Network'. Together they form a unique fingerprint.

Cite this