Please use this identifier to cite or link to this item:
https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4921
Title: | Coverless Multi-Image Steganography for RGB Images: Generative Adversarial Networks based Approach & Steganographic Key based Approach |
Authors: | Jagoda, J. K. K. K. |
Keywords: | Multi-imageSteganography,CoverlessImageSteganogra- phy,SteganographicKey. |
Issue Date: | 30-Jun-2025 |
Abstract: | Abstract Inrecentyears,CoverlessImageSteganography(CIS)hasemergedasapromis- ing alternativetotraditionalsteganographictechniquesbyeliminatingtheneed forexplicitdataembeddingandinsteadutilizingnaturallyoccurringorgenerated imagesascarriers.However,currentCISmethodsoftensu!erfromlowhiding capacity,limitedtoconcealingasingleimage,ando!er insu”cientrobustnessand securitywhenhandlingmultiplesecretimagessimultaneously. To addresstheselimitations,wepresentanovelmulti-imagecoverlessstegano- graphic frameworktailoredforRGBimages,capableofsecurelytransmittingand reconstructinguptofoursecretimagesusingasinglefusedcarrierimage.Un- likeconventionalmethodsthatdependonpre-existingcoverimages,ourmodel generates anintermediatecarrierimagethroughasophisticatedpixel-levelfusion techniquethatmergesvisualinformationfrommultipleRGBsecretimageswhile ensuringcompleteperceptualinvisibilityoftheoriginalcontent.Thisfusionpro- cess guaranteesthatthecarrierimagecontainsnovisuallyidentifiabletracesof the concealedimages,o!eringaninherentlysecureandstealthyrepresentation. To furtherstrengthenconcealment,thefusedcarrierundergoesmultipleroundsof imagescramblingtransformations,makingunauthorizeddecodingvirtuallydi”- cult.Wealsointegratearobuststeganographickeymechanism,restrictingaccess and decodingcapabilitiesexclusivelytoauthorizedreceiversequippedwiththe correctkey.Thisensuresthatevenifthecarrierisintercepted,thehiddencontent remainssecureandunrecoverablewithouttheproperdecryptioncontext. In thedecodingphase,weproposearefinementalgorithmdesignedtorestore fine-graineddetailslostduringthefusionandscramblingprocesses.Thisalgo- rithmsignificantlyenhancesreconstructionfidelityandvisualquality,eveninthe presenceofadversarialconditionssuchasnoise,tampering,orgeometrictransfor- mations. ComprehensiveexperimentsonbenchmarkRGBimagedatasetsvalidatetheef- fectivenessofourproposedmodel,demonstratingsubstantiallyhigherhidingca- pacity,minimalvisualdistortion,andresilienceagainststatisticalandperceptual steganalysisattacks.ComparedtoexistingCISapproaches,ourmethodo!ers a moresecure,high-capacity,andvisuallyimperceptiblesolutionformulti-image coverlesssteganography,layingthefoundationfornext-generationcovertcommu- nicationsystems. |
URI: | https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4921 |
Appears in Collections: | 2025 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
20000804 - J.K.K.K.Jagoda - Kimuthu Kisal.pdf | 25.29 MB | Adobe PDF | View/Open |
Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.