Abstract: Nowadays, we generate millions of data in the form of text, images, etc. Among them, images and text messages are widely used in communication. Due to their vulnerabilities, they are ...