R. Regin, S. Suman Rajest, Karthikeyan Chinnusamy, Bhopendra Singh, T. Shynu, R. Steffi
{"title":"Multimedia data-concealing method on characteristic pictures using convolutional neural network","authors":"R. Regin, S. Suman Rajest, Karthikeyan Chinnusamy, Bhopendra Singh, T. Shynu, R. Steffi","doi":"10.1504/ijsse.2023.134432","DOIUrl":null,"url":null,"abstract":"Images are now classified using picture steganography. A compelling image's attributes can change when it is sent across an unreliable open system. Information disguise incorporates the important message into everyday mediums, including images, audio, video, and text. Primary media relay the main message. The media approach should not undermine the main message. We retrieve the sent key message. Use perplexing surfaces to confirm message obscurity. Safe hashing verifies ROI's cryptographic hash output (SHA). The discrete wavelet transform will add hash esteem (H) to RONI. Automated guidelines pick complex surface placements. The hash value increment demonstrates the validity of the image. The hash capacity would not match if altered. A changed natural image is pumped into a conventional-looking image using spatial bidirectional steganography. Convolutional neural network (CNN) technology was used for the secret message concealment during this transmission. Complex texture areas aid object detection rules. Steganography recovered the block's message. The algorithm improves accuracy in experiments. The exploratory study found the technique promotes vigour, lust, and security.","PeriodicalId":39249,"journal":{"name":"International Journal of System of Systems Engineering","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of System of Systems Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijsse.2023.134432","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0
Abstract
Images are now classified using picture steganography. A compelling image's attributes can change when it is sent across an unreliable open system. Information disguise incorporates the important message into everyday mediums, including images, audio, video, and text. Primary media relay the main message. The media approach should not undermine the main message. We retrieve the sent key message. Use perplexing surfaces to confirm message obscurity. Safe hashing verifies ROI's cryptographic hash output (SHA). The discrete wavelet transform will add hash esteem (H) to RONI. Automated guidelines pick complex surface placements. The hash value increment demonstrates the validity of the image. The hash capacity would not match if altered. A changed natural image is pumped into a conventional-looking image using spatial bidirectional steganography. Convolutional neural network (CNN) technology was used for the secret message concealment during this transmission. Complex texture areas aid object detection rules. Steganography recovered the block's message. The algorithm improves accuracy in experiments. The exploratory study found the technique promotes vigour, lust, and security.