Performance enhanced image steganography systems using transforms and optimization techniques

Image steganography is the art of hiding highly sensitive information onto the cover image. An ideal approach to image steganography must satisfy two factors: high quality of stego image and high embedding capacity. Conventionally, transform based techniques are widely preferred for these applications. The commonly used transforms for steganography applications are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) etc. In this work, frequency domain transforms such as Fresnelet Transform (FT) and Contourlet Transform (CT) are used for the data hiding process. The secret data is normally hidden in the coefficients of these transforms. However, data hiding in transform coefficients yield less accurate results since the coefficients used for data hiding are selected randomly. Hence, in this work, optimization techniques such as Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) are used for improving the performance of the steganography system. GA and PSO are used to find the best coefficients in order to hide the Quick Response (QR) coded secret data. This approach yields an average PSNR of 52.56 dB and an embedding capacity of 902,136 bits. These experimental results validate the practical feasibility of the proposed methodology for security applications.

[1]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Thierry Blu,et al.  Fresnelets: new multiresolution wavelet bases for digital holography , 2003, IEEE Trans. Image Process..

[3]  Parisa Gerami,et al.  Least significant bit image steganography using particle swarm optimization and optical pixel adjustment , 2012 .

[4]  Li-Hong Huang,et al.  A data hiding scheme using pixel value differencing and improving exploiting modification directions , 2015, Comput. Secur..

[5]  S. Hemalatha,et al.  A Secure Image Steganography Technique to Hide Multiple Secret Images , 2013, Netcom 2013.

[6]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[7]  Rafael C. González,et al.  Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[8]  Muhammad Nazeer,et al.  A Fresnelet-Based Encryption of Medical Images using Arnold Transform , 2013, ArXiv.

[9]  Nameer N. El-Emam,et al.  New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm , 2013, J. Syst. Softw..

[10]  Shyr-Shen Yu,et al.  A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..

[11]  D. E. Goldberg,et al.  Genetic Algorithms in Search , 1989 .

[12]  Hedieh Sajedi,et al.  Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.

[13]  Chin-Chen Chang,et al.  Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..

[14]  Minh N. Do,et al.  Ieee Transactions on Image Processing the Contourlet Transform: an Efficient Directional Multiresolution Image Representation , 2022 .

[15]  Xiang Wang,et al.  A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition , 2015, Inf. Sci..

[16]  Hamidreza Sadreazami,et al.  A robust spread spectrum based image watermarking in ridgelet domain , 2012 .

[17]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[18]  Wei-Kuan Shih,et al.  Wavelet bit-plane based data hiding for compressed images , 2013 .

[19]  Punam Bedi,et al.  Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..

[20]  Mingwei Tang,et al.  A high capacity image steganography using multi-layer embedding , 2014 .

[21]  Yih-Kai Lin,et al.  High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..

[22]  Mohammed Ghanbari,et al.  A highly robust two-stage Contourlet-based digital image watermarking method , 2013, Signal Process. Image Commun..

[23]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[24]  Punam Bedi,et al.  Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization , 2010, SEMCCO.

[25]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[26]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[27]  Hedieh Sajedi,et al.  Secure steganography based on embedding capacity , 2009, International Journal of Information Security.