Machine Learning–Based Steganography: A Data-Driven Dynamic Approach to Hiding Information in Digital Media | IJCSE Volume 10 – Issue 2 | IJCSE-V10I2P13
Machine Learning–Based Steganography: A Data-Driven Dynamic Approach to Hiding Information in Digital Media | IJCSE Volume 10 – Issue 2 | IJCSE-V10I2P13
Machine learning–based steganography embeds secret messages into digital media using data-driven models that learn optimal representations to conceal information while preserving visual quality. Unlike classical methods that rely on predetermined heuristics, machine learning techniques optimize embedding strategies automatically through training, adapting to diverse content and attack scenarios. This paper investigates the theoretical foundations, model architectures, embedding and extraction algorithms, evaluation metrics, and robustness properties of machine learning-based steganographic frameworks. We propose and evaluate a Generative Adversarial Network (GAN)-inspired model specially customized for image steganography, to establish its performance on benchmark datasets, and analyse their compromises between capacity, invisibility, and hardiness to steganalysis. Experimental results indicate that the proposed approach achieves competitive imperceptibility and message extraction accuracy while resisting common detection methods. We conclude with a discussion of challenges and future directions in machine learning-based secure hiding.
Machine learning–based steganography represents an effective and adaptable method for hiding information within digital media. By leveraging neural networks trained end-to-end, the proposed framework achieves high visual quality, accurate message extraction, and competitive resistance to detection. This research contributes a practical model and evaluation insights, highlighting both capabilities and limitations. Continued advancements in learning strategies, model design, and robust optimization are expected to further enhance secure covert communication.
References
1.M. Krichen, “Generative Adversarial Networks,” 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 2023, pp. 1-7, doi: 10.1109/ICCCNT56998.2023.10306417.
2.Alwisha Wilma Dsa, Sumangala N., 2026, LipScribe: A Deep Learning-Based CNN-RNN Framework for Visual Speech Recognition, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT) Volume 14, Issue 01, Techprints 9.0
3. Z. Li, F. Liu, W. Yang, S. Peng, and J. Zhou, “A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects,” IEEE Trans. Neural Networks Learn. Syst., pp., 2021, https://doi.org/10.1109/TNNLS.2021.3084827
4.Geethu Gopi, Rajkumar P., “Hardware Implementation of LSB Based Data Hiding Algorithm in a Compressed Image,” International Journal of Engineering Trends and Technology (IJETT), vol. 45, no. 3, pp. 276-279, 2017. Crossref, https://doi.org/10.14445/22315381/ IJETT-V45P258
5.Anderson, R, Bowman, Petticolas, F. On the limits of Steganography. IEEE Journal selected areas in Communication, 16, 4, 474—481
Roy, S., Manasmita M., 2011. A novel approach to format based test steganography, International conference on communication computing and security, ICCCS 2011, Proceedings by ACM with ISBN-978-1-4503-0464-rourkela, Odisha, India.