Loading [MathJax]/extensions/MathMenu.js
Integrating Image Steganography Techniques Into an Existing Efficient Image Recognition Artificial Neural Network for Optimal Performance | IEEE Conference Publication | IEEE Xplore

Integrating Image Steganography Techniques Into an Existing Efficient Image Recognition Artificial Neural Network for Optimal Performance


Abstract:

Image steganography is a data-hiding process whereby a digital image media is used as a cover to encrypt and embed data within the pixels of the image. This method can be...Show More

Abstract:

Image steganography is a data-hiding process whereby a digital image media is used as a cover to encrypt and embed data within the pixels of the image. This method can be applied in various research fields, including image processing, power line systems, mobile applications, etc. This paper investigates the application of an image steganography technique that differs from traditional least significant bit substitution methods. The discrete cosine transform least significant bit-2 method is proposed in this paper. Rather than placing the hidden data bits in a deterministic manner, the proposed method inserts the data bits in random pixel locations within the cover image to alleviate steganalysis and unauthorized access to the hidden data. An image recognition artificial neural network developed using open source TensorFlow is applied and used to test the effectiveness of the prosed encryption method. The proposed encoding scheme shows more robustness and allows for higher neural network prediction confidence. This method can be applied in power line systems to determine the physical conditions of power lines, such as when they are damaged/broken. The image recognition artificial neural network can also forecast power line maintenance cycles for proactive monitoring of power systems.
Date of Conference: 07-11 October 2024
Date Added to IEEE Xplore: 09 January 2025
ISBN Information:
Conference Location: Johannesburg, South Africa

I. Introduction

Steganography is an extensively studied technique for secretly transmitting data between individuals. These days, the primary means of exchanging information are the Internet, IoT devices sending out massive amounts of data, intelligent power systems devices collating and communicating with other devices using Internet protocols, which threat actors can intercept, etc. With this development, data must be protected to avoid being discovered by unauthorized interceptors. The significance of steganography increases as more individuals join the revolution in cyberspace and the importance of security in smart city advancements. Most information is preserved electronically due to advancements in information and communication technology (ICT). Data security and the application of artificial intelligence have grown in importance. Data can be hidden and safeguarded using steganography and cryptography [1]–[3].

Contact IEEE to Subscribe

References

References is not available for this document.