Optimizing least-significant-bit substitution using cat swarm optimization strategy

Embedding secret data into a cover image using simple least-significant-bit substitution can degrade the image quality dramatically, especially when a large number of bits are substituted. The exhaustive least-significant-bit substitution method is proposed to solve this problem. However, the idea has no practical application due to its long computation time. This paper adopts the cat swarm optimization (CSO) strategy to obtain the optimal or near optimal solution of the stego-image quality problem. The CSO strategy is generated by observing the behavior of cats, which has been proved to achieve better performance on finding the best global solutions. We revised the CSO strategy in our proposed scheme to make it practicable and suitable to solve the mentioned problem. The experimental results show that the proposed scheme can obtain a better solution with less computation time.

[1]  Jeng-Shyang Pan,et al.  Robust image watermarking based on multiple description vector quantisation , 2004 .

[2]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[3]  Mathieu Serrurier,et al.  Improving inductive logic programming by using simulated annealing , 2008, Inf. Sci..

[4]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[5]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[6]  Yujia Wang,et al.  Particle swarm optimization with preference order ranking for multi-objective optimization , 2009, Inf. Sci..

[7]  Ihsan Kaya,et al.  A genetic algorithm approach to determine the sample size for attribute control charts , 2009, Inf. Sci..

[8]  Jeng-Shyang Pan,et al.  Reversible Data Hiding Using the Companding Technique and Improved DE Method , 2008 .

[9]  Shu-Chuan Chu,et al.  COMPUTATIONAL INTELLIGENCE BASED ON THE BEHAVIOR OF CATS , 2007 .

[10]  Man Young Rhee Cryptography and Secure Communications , 1993 .

[11]  Harold Joseph Highland,et al.  Data encryption: A non-mathematical approach , 1997, Comput. Secur..

[12]  R. Davis,et al.  The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.

[13]  Yao Zhao,et al.  Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.

[14]  Paul H. Calamai,et al.  Exchange strategies for multiple Ant Colony System , 2007, Inf. Sci..

[15]  C. Chang,et al.  Hiding secret data adaptively in vector quantisation index tables , 2006 .

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Jeng-Shyang Pan,et al.  Robust VQ-based digital watermarking for memoryless binary symmetric channel , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).