Volume 17, Issue 4 (2-2021)                   JSDP 2021, 17(4): 15-32 | Back to browse issues page


XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

riazi L, pourebrahimi A, alborzi M, radfar R. A hybrid method to improve Steganography in JPEG images using metaheuristic algorithms. JSDP 2021; 17 (4) :15-32
URL: http://jsdp.rcisp.ac.ir/article-1-936-en.html
faculty of management, Karaj Branch, Islamic Azad University
Abstract:   (2261 Views)
This paper presents a method for improving steganography and enhancing the security using combinatorial Meta-heuristic algorithms. The goal is to achieve an improved PSNR value in order to preserve the image quality in the steganography process.
Steganography algorithms, in order to insert message signal information inside the host data, create small changes based on the message signal in the host data, so that they are not visible to the human eye. Each cryptographic algorithm has two steps: insert a stego signal and extract it. You can use the area of the spatial or transformation area to insert the stego signal. Extraction can be done using the correlation with the original watermark or independently of it. Clearly, the choice of insertion method and how to extract are interdependent. In spatial techniques, information is stored directly in pixel color intensity but in the transform domain, the image is initially converted to another domain (such as frequency), and then the information is embedded in the conversion coefficients. Using optimization algorithms based on Metahuristic algorithms in this field is widely used and many researchers have been encouraged to use it. Using a suitable fitness function, these methods are useful in the design of steganography algorithms.
In this research, seven commonly used Metahuristic algorithms, including ant colony, bee, cuckoo search, genetics, Particle Swarm Optimization, Simulated Annealing and firefly were selected and the performance of these algorithms is evaluated individually on existing data after being applied individually.
Among the applied algorithms, cuckoo search, firefly and bee algorithms that have the best fitness function and therefore the highest quality were selected. All 6 different modes of combining these 3 algorithms were separately examined. The best combination is the firefly, bee and cuckoo search algorithms, which provides a mean signal-to-noise ratio of 54.89.
The proposed combination compared to the individual algorithms of optimization of ant colony, bee, cuckoo search, genetics, Particle Swarm Optimization, Simulated Annealing and firefly, provides 59.29, 29.61, 37.43, 52.56, 54.84, 57.82, and 3.82% improvement in the PSNR value.
Full-Text [PDF 4993 kb]   (504 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2018/12/6 | Accepted: 2019/06/19 | Published: 2021/02/22 | ePublished: 2021/02/22

References
1. [1] M. SH. Alizadeh, "Evaluation of message hiding algorithms in image steganography and efficient algorithm design", High Speed Craft, Vol. 52, pp. 42-30, 2018.
2. [2] X. Zhang, Z. Zhao, and J. Wang, "Chaotic image encryption based on circular substitution box and key stream buffer", Signal Process. Image Commun., vol. 29, no. 8, pp. 902-913, 2014. [DOI:10.1016/j.image.2014.06.012]
3. [3] M. Hussain and M. Hussain, "A Survey of Image Steganography Techniques," vol. 54, pp. 113-124, 2013.
4. [4] A.Benoraira, K. Benmahammed, and N. Boucenna, "Blind image watermarking technique based on differential embedding in DWT and DCT domains," EURASIP J. Adv. Signal Process., vol. 2015, no. 1, pp. 1-11, 2015. [DOI:10.1186/s13634-015-0239-5]
5. [5] H. Tao, L. Chongmin, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," J. Appl. Res. Technol., vol. 12, no. 1, pp. 122-138, 2014. [DOI:10.1016/S1665-6423(14)71612-8]
6. [6] N. A. Abbas, "Image watermark detection techniques using quadtrees," Appl. Compute Informatics, vol. 11, no. 2, pp. 102-115, 2015. [DOI:10.1016/j.aci.2014.07.003]
7. [7] M. Keyvanpour and F. M. Bayat, "Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the {DWT} domain," Math. Compute. Model, vol. 58, no. 1-2, pp. 56-67, 2013. [DOI:10.1016/j.mcm.2012.07.008]
8. [8] Z. Xie and X. Wang, "A Heuristic Feature Combination Selection Method in Fusion Detection of JPEG Stegoimages," in 2012 Fourth International Conference on Multimedia Information Networking and Security, 2012, pp. 220-224. [DOI:10.1109/MINES.2012.22] [PMID]
9. [9] M. Kiamini, S. Fazli , " A High Performance Steganographic Method using JPEG and PSO Algorithm," IEEE, 2008.
10. [10] F. Sadeghi, M. K. Rafsanjani, and F. Z. Kermani, "Hiding Information in Image by Compound Meta-Heuristic Algorithm PSO-SA," Int. J. Compute Sci. Artif. Intell, vol. 3, no. 4, p. 125, 2013. [DOI:10.5963/IJCSAI0304001]
11. [11] K. Akshyata and l. Jain, "Data Hiding and Security using Steganography", International Journal of Engineering and Management Research, 2017.
12. [12] E. T. Zghaer and S. H. Hashem, "Ant Colony Optimization To Enhance Image Steganography", International Journal of Emerging Trends and Technology in Computer Science (IJETTCS), 2017.
13. [13] A. Miri, K. Faez, "Adaptive image steganography based on transform domain via genetic algorithm", Optik, vol. 145, pp.158-168. [DOI:10.1016/j.ijleo.2017.07.043]
14. [14] K. Loukhaoukha, J.-Y. Chouinard, and M. H. Taieb, "Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization," J. Inf. Hiding Multimed. Signal Process., vol. 2, no. 4, pp. 303-319, 2011.
15. [15] J. S. Lee, J.-W. Wang, and K.-Y. Giang, "A new image watermarking scheme using multi-objective bees algorithm," Appl. Math. Inf. Sci., vol. 8, no. 6, p. 2945, 2014. [DOI:10.12785/amis/080632]
16. [16] F. G. Mohammadi and M. S. Abadeh, "Image steganalysis using a bee colony based feature selection algorithm," Eng. Appl. Artif. Intell., vol. 31, pp. 35-43, 2014. [DOI:10.1016/j.engappai.2013.09.016]
17. [17] M. Ali and C. W. Ahn, "An optimal image watermarking approach through cuckoo search algorithm in wavelet domain," Int. J. Syst. Assur. Eng. Manag., pp. 1-10, 2014.
18. [18] Y. H. Chen and H. C. Huang, "Reversible Image Watermarking Based on Genetic Algorithm," in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on, 2014, pp. 21-24. [DOI:10.1109/IIH-MSP.2014.13]
19. [19] a L. Brazil, a Sanchez, a Conci, and N. Behlilovic, "Hybridizing genetic algorithms and path relinking for steganography," ELMAR 2011 Proc., no. September, pp. 285-288, 2011.
20. [20] M. Nosrati, A. Hanani, and R. Karimi, "Steganography in Image Segments Using Genetic Algorithm," in 2015 Fifth International Conference on Advanced Computing Communication Technologies, 2015, pp. 102-107. [DOI:10.1109/ACCT.2015.57]
21. [21] B. Lei, F. Zhou, E.-L. Tan, D. Ni, H. Lei, S. Chen, and T. Wang, "Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform," Signal Processing, vol. 113, pp. 80-94, 2015. [DOI:10.1016/j.sigpro.2014.11.007]
22. [22] X. Li and J. Wang, "A steganographic method based upon {JPEG} and particle swarm optimization algorithm," Inf. Sci. (Ny)., vol. 177, no. 15, pp. 3099-3109, 2007. [DOI:10.1016/j.ins.2007.02.008]
23. [23] G. S. Lin, Y. T. Chang, and W. N. Lie, "A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm," IEEE Trans. Multimed., vol. 12, no. 5, pp. 345-357, Aug. 2010. [DOI:10.1109/TMM.2010.2051243]
24. [24] A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, "Optimized gray-scale image watermarking using DWT--SVD and Firefly Algorithm," Expert Syst. Appl., vol. 41, no. 17, pp. 7858-7867, 2014. [DOI:10.1016/j.eswa.2014.06.011]
25. [25] A. Miri, K. Faez, "Adaptive image steganography based on transform domain via genetic algorithm", Optik, vol. 145, pp.158-168. [DOI:10.1016/j.ijleo.2017.07.043]
26. [26] S. Hemalatha, U. D. Acharya, and A. Renuka, "Wavelet Transform Based Steganography Technique to Hide Audio Signals in Image," Procedia Comput. Sci., vol. 47, pp. 272-281, 2015. [DOI:10.1016/j.procs.2015.03.207]
27. [27] M. Nosrati, A. Hanani, and R. Karimi, "Steganography in Image Segments Using Genetic Algorithm," in 2015 Fifth International Conference on Advanced Computing Communication Technologies, 2015, pp. 102-107. [DOI:10.1109/ACCT.2015.57]
28. [28] Z. Li, Y. Hi, "Steganography with pixel-value differencing and modulus function based on PSO," Information Security and Applications, vol.43, pp. 47-52, 2018. [DOI:10.1016/j.jisa.2018.10.006]
29. [29] F. G. Mohammadi , H. sajedi, "Region based Image Steganalysis using Artificial Bee Colony," Visual Communication and Image Representation, vol 14, pp. 214-226, 2017. [DOI:10.1016/j.jvcir.2016.12.003]
30. [30] S.I. Nipanikar, V. H. Deepthi, N. Kulkarni, "A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform," Alexandria Engineering, vol. 57, pp. 2343-2356, 2018. [DOI:10.1016/j.aej.2017.09.005]
31. [31] A. Miri, k. Faez, "Adaptive image steganography based on transform domain via genetic algorithm," Optik, vol. 145, pp. 158-168, 2017. [DOI:10.1016/j.ijleo.2017.07.043]
32. [32] CM.Wang, NI. Wu, CS. Tsai, "A high quality steganographic method with pixel-value differencing and modulus function", J Syst Softw, Vol. 81, pp.150-158, 2008. [DOI:10.1016/j.jss.2007.01.049]
33. [33] CH. Yang, SJ. Wang, C. Weng, "Capacity-raising steganography using multi- -pixel differencing and pixel-value shifting operations", Fundam Informaticae, Vol. 98, pp.321-336, 2010. [DOI:10.3233/FI-2010-229]
34. [34] X. Liao, QY. Wen, ZL. Zhao, "A novel steganographic method with four-pixel differencing and modulus function", Fundam Informaticae, Vol. 118, pp. 281-289, 2012. [DOI:10.3233/FI-2012-714]
35. [35] M. Hussain, AWA. Wahab, ATS. Ho, "A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement", Signal Pro- cess Image Commun, Vol. 50, pp.44-57, 2017. [DOI:10.1016/j.image.2016.10.005]
36. [36] Li. Zhaotong, He.Ying, "Steganography with pixel-value differencing and modulus function based on PSO", Journal of Information Security and Applications, vol. 43, pp. 47-52, 2018. [DOI:10.1016/j.jisa.2018.10.006]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing