{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T15:30:06Z","timestamp":1770046206352,"version":"3.49.0"},"reference-count":27,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:p>With the ever-rising threat to security, multiple industries are always in search of safer communication techniques both in rest and transit. Multiple security institutions agree that any systems security can be modeled around three major concepts: Confidentiality, Availability, and Integrity. We try to reduce the holes in these concepts by developing a Deep Learning based Steganography technique. In our study, we have seen, data compression has to be at the heart of any sound steganography system. In this paper, we have shown that it is possible to compress and encode data efficiently to solve critical problems of steganography. The deep learning technique, which comprises an auto-encoder with Convolutional Neural Network as its building block, not only compresses the secret file but also learns how to hide the compressed data in the cover file efficiently. The proposed techniques can encode secret files of the same size as of cover, or in some sporadic cases, even larger files can be encoded. We have also shown that the same model architecture can theoretically be applied to any file type. Finally, we show that our proposed technique surreptitiously evades all popular steganalysis techniques.<\/jats:p>","DOI":"10.3233\/jifs-189879","type":"journal-article","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T12:11:18Z","timestamp":1617970278000},"page":"5595-5606","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["ExypnoSteganos - A smarter approach to steganography"],"prefix":"10.1177","volume":"41","author":[{"given":"Gaurav","family":"Sarraf","sequence":"first","affiliation":[{"name":"Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India"}]},{"given":"Anirudh Ramesh","family":"Srivatsa","sequence":"additional","affiliation":[{"name":"Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India"}]},{"given":"MS","family":"Swetha","sequence":"additional","affiliation":[{"name":"Information Science &amp; Engineering, B. M. S. Institute of Technology &amp; Management, Bangalore, India"}]}],"member":"179","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1","article-title":"Practical steganalysis of digital images: State of the art","author":"Fridrich J.","year":"2002","unstructured":"FridrichJ., GoljanM., Practical steganalysis of digital images: State of the art, In Electronic Imaging International Society for Optics and Photonics (2002), 1\u201313.","journal-title":"In Electronic Imaging International Society for Optics and Photonics"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1992.228224"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_7"},{"key":"e_1_3_1_5_2","first-page":"V377","article-title":"Data hiding via phase manipulation of audio signals","volume":"5","author":"Dong X.","unstructured":"DongX., BockoM.F., IgnjatovicZ., Data hiding via phase manipulation of audio signals, In Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP\u201904). IEEE International Conference on5, V377.","journal-title":"In Acoustics, Speech, and Signal Processing, 2004. Proceedings.(ICASSP\u201904). IEEE International Conference on"},{"key":"e_1_3_1_6_2","article-title":"Deep learning for steganalysis via convolutional neural networks","author":"Qian Y.","year":"2015","unstructured":"QianY., DongJ., WangW., TanT., Deep learning for steganalysis via convolutional neural networks, In SPIE\/IS&T Electronic Imaging, pages 94090J\u201394090J. International Society for Optics and Photonics (2015).","journal-title":"SPIE\/IS&T Electronic Imaging, pages 94090J\u201394090J. International Society for Optics and Photonics"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-078"},{"key":"e_1_3_1_8_2","article-title":"Deep learning for steganalysis is better than a rich model with an ensemble classifier, and is natively robust to the cover sourcemismatch","author":"Pibre L.","year":"2015","unstructured":"PibreL., J\u00e9r\u00f4meP., IencoD., ChaumontM., Deep learning for steganalysis is better than a rich model with an ensemble classifier, and is natively robust to the cover sourcemismatch, arXiv preprint arXiv:1511.04855 (2015).","journal-title":"arXiv preprint arXiv:1511.04855"},{"key":"e_1_3_1_9_2","article-title":"Learning to protect communications with adversarial neural cryptography","author":"Abadi M.","year":"2016","unstructured":"AbadiM., AndersenD.G., Learning to protect communications with adversarial neural cryptography, arXiv preprint arXiv:1610.06918 (2016).","journal-title":"arXiv preprint arXiv:1610.06918"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-3017"},{"key":"e_1_3_1_11_2","article-title":"Embedding watermarks into deep neural networks","author":"Uchida Y.","year":"2017","unstructured":"UchidaY., NagaiY., SakazawaS., SatohS., Embedding watermarks into deep neural networks, International Conference on Multimedia Retrieval (2017).","journal-title":"International Conference on Multimedia Retrieval"},{"key":"e_1_3_1_12_2","first-page":"1","article-title":"An overview of image steganography","author":"Morkel T.","year":"2005","unstructured":"MorkelT., EloffJ.H., OlivierM.S., An overview of image steganography, In ISSA (2005), 1\u201311.","journal-title":"In ISSA"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"issue":"10","key":"e_1_3_1_14_2","article-title":"Hiding an image inside another image using variable-rate steganography","volume":"4","author":"Tamimi A.A.","year":"2013","unstructured":"TamimiA.A., AbdallaA.M., Al-AllafO., Hiding an image inside another image using variable-rate steganography, International Journal of Advanced Computer Science and Applications (IJACSA)4(10) (2013).","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"e_1_3_1_16_2","first-page":"86","article-title":"A digital watermark. In Image Processing, Proceedings","volume":"2","author":"Van Schyndel R.G.","year":"1994","unstructured":"Van SchyndelR.G., TirkelA.Z. and OsborneC.F., A digital watermark. In Image Processing, Proceedings, ICIP-94., IEEE International Conference286\u201390. IEEE, (1994).","journal-title":"ICIP-94., IEEE International Conference"},{"issue":"3","key":"e_1_3_1_17_2","first-page":"219","article-title":"A watermark for digital images","author":"Wolfgang R.B.","year":"1996","unstructured":"WolfgangR.B., DelpE.J., A watermark for digital images, In ICIP (3) (1996), 219\u2013222.","journal-title":"In ICIP"},{"key":"e_1_3_1_18_2","article-title":"Intriguing properties of neural networks","author":"Szegedy C.","year":"2014","unstructured":"SzegedyC., ZarembaW., SutskeverI., BrunaJ., ErhanD., GoodfellowI., FergusR., Intriguing properties of neural networks, In Proc. ICLR (2014).","journal-title":"Proc. ICLR"},{"key":"e_1_3_1_19_2","article-title":"Adversarial generative nets: Neural network attacks on state-of-theart face recognition","author":"Sharif M.","year":"2017","unstructured":"SharifM., BhagavatulaS., BauerL., ReiterM.K., Adversarial generative nets: Neural network attacks on state-of-theart face recognition, arXiv preprint arXiv:1801.00349 (2017).","journal-title":"arXiv preprint arXiv:1801.00349"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.10.007"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2017.2745572"},{"key":"e_1_3_1_22_2","article-title":"Intrusion Prediction and Detection with Deep Sequence Modeling","volume":"1208","author":"Sarraf G.","unstructured":"SarrafG., SwethaM.S., Intrusion Prediction and Detection with Deep Sequence Modeling, Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science1208. Springer, Singapore 978-981-15-4825-3 (2020).","journal-title":"Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science"},{"key":"e_1_3_1_23_2","article-title":"Squeeze-and-Excitation Networks","author":"Hu J.","unstructured":"HuJ., ShenL., SunG., Squeeze-and-Excitation Networks, arXiv 2017, arXiv:1709.01507.","journal-title":"arXiv 2017, arXiv:1709.01507"},{"key":"e_1_3_1_24_2","article-title":"Caltech-256 Object Category Dataset","author":"Griffin G.","year":"2007","unstructured":"GriffinG., HolubA., PeronaP., Caltech-256 Object Category Dataset, California Institute of Technology (2007), http:\/\/authors.library.caltech.edu\/7694.","journal-title":"California Institute of Technology"},{"key":"e_1_3_1_25_2","article-title":"Adam: A method for stochastic optimization","author":"Kingma D.","year":"2015","unstructured":"KingmaD., BaJ., Adam: A method for stochastic optimization, In ICLR (2015).","journal-title":"In ICLR"},{"key":"e_1_3_1_26_2","first-page":"185","article-title":"Rich model for steganalysis of color images","author":"Goljan M.","year":"2015","unstructured":"GoljanM., FridrichJ., CogranneR., Rich model for steganalysis of color images, in Proc. IEEE Int. Workshop Inf. Forensics Secur (2015), 185\u2013190.","journal-title":"Proc. IEEE Int. Workshop Inf. Forensics Secur"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2710946"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2438008"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189879","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189879","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T04:27:38Z","timestamp":1770006458000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,11,17]]}},"alternative-id":["10.3233\/JIFS-189879"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189879","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,7]]}}}