Image Steganography Capacity Improvement Using Cohort Intelligence and Modified Multi-Random Start Local Search Methods

In this paper, we have proposed two steganographic techniques which use JPEG compression on greyscale image to hide secret text. JPEG compression is based on discrete cosine transform technique. In order to improve the capacity, a quantization table of size $$16\times 16$$16×16 is practiced instead of a standard JPEG quantization table. Also, the proposed work presents two novel optimization algorithms applied on steganography which are based on the concept of cohort intelligence (CI) with cognitive computing (CC) and Multi-random start local search (MRSLS) algorithm. CI is an emerging optimization algorithm inspired from social learning of one another. This algorithm is being tested to solve unconstrained, constrained and NP-hard combinatorial problems and shows promising results. CC involves self-learning systems and is an emerging area in the field of machine learning. In the proposed work, CI, CC and MRSLS which is inspired from duo-swapping approach and tested to solve NP-hard combinatorial problems, are combined and applied to steganography to produce good results. This work has modified the MRSLS algorithm and applied to steganography to test and validate our results with other comparable algorithms. Experiments are done to test six greyscale images. Experimental results will reveal the quality of stego-images and the secret message embedding capacity.

[1]  Hitoshi Kiya,et al.  A Method of Embedding Binary Data into JPEG Bitstreams , 2002, Systems and Computers in Japan.

[2]  Chin-Chen Chang,et al.  Steganography using JPEG-compressed images , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[3]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[4]  Iwan Setyawan,et al.  Watermarking digital image and video data. A state-of-the-art overview , 2000 .

[5]  Anand Jayant Kulkarni,et al.  Constrained cohort intelligence using static and dynamic penalty function approach for mechanical components design , 2016, Int. J. Parallel Emergent Distributed Syst..

[6]  Rainer Böhme,et al.  Principles of Modern Steganography and Steganalysis , 2010 .

[7]  John Miano,et al.  Compressed image file formats , 1999 .

[8]  Nasir D. Memon,et al.  Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.

[9]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[10]  Hojjat Rakhshani,et al.  Intelligent Multiple Search Strategy Cuckoo Algorithm for Numerical and Engineering Optimization Problems , 2017 .

[11]  Wasan Shaker Awad,et al.  Information Hiding Using Ant Colony Optimization Algorithm , 2011, Int. J. Technol. Diffusion.

[12]  Rina Mishra,et al.  A review on steganography and cryptography , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[13]  Nameer N. El-Emam New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization , 2015, Comput. Secur..

[14]  Jamshid Shanbehzadeh,et al.  High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .

[15]  Swaminathan Ramakrishnan,et al.  Imperceptibility - Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization , 2016, Expert Syst. Appl..

[16]  Anand Jayant Kulkarni,et al.  Solving 0–1 Knapsack Problem using Cohort Intelligence Algorithm , 2016, Int. J. Mach. Learn. Cybern..

[17]  Hideki Noda,et al.  Application of BPCS steganography to wavelet compressed video , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[18]  Robert M. Hierons,et al.  JPEG Steganography: A Performance Evaluation of Quantization Tables , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[19]  John Miano,et al.  Compressed image file formats - JPEG, PNG, GIF, XBM, BMP , 1999 .

[20]  Muhammad Sher,et al.  Secure Digital Steganography for ASCII Text Documents , 2013 .

[21]  Ajith Abraham,et al.  Ideology algorithm: a socio-inspired optimization methodology , 2017, Neural Computing and Applications.

[22]  D. Jude Hemanth,et al.  Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems , 2016 .

[23]  J.-S. Coron What Is Cryptography? , 2006, IEEE Secur. Priv..

[24]  Anand Jayant Kulkarni,et al.  Design of a fractional PIλDμ controller using the cohort intelligence method , 2018, Frontiers of Information Technology & Electronic Engineering.

[25]  Yi Shi,et al.  Embedding image watermarks in dc components , 2000, IEEE Trans. Circuits Syst. Video Technol..

[26]  Anand J. Kulkarni,et al.  Application of the cohort-intelligence optimization method to three selected combinatorial optimization problems , 2016, Eur. J. Oper. Res..

[27]  Shen Wang,et al.  A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..

[28]  Medha Kulkarni,et al.  An information hiding system using 16*16 quantization table , 2015, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).

[29]  Weiming Zhang,et al.  Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.

[30]  P. Yip,et al.  Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .

[31]  Anand Jayant Kulkarni,et al.  Cohort intelligence algorithm for discrete and mixed variable engineering problems , 2018, Int. J. Parallel Emergent Distributed Syst..

[32]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[33]  M. M. Raghuwanshi,et al.  Improved Particle Swarm Optimization Based on Natural Flocking Behavior , 2016 .

[34]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[35]  Mohamed A. El-Dosuky,et al.  Jpeg Image Compression Using Discrete Cosine Transform - A Survey , 2014, ArXiv.

[36]  Chin-Chen Chang,et al.  Hiding secret data in images via predictive coding , 2005, Pattern Recognit..

[37]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[38]  Anand Jayant Kulkarni,et al.  Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm , 2018, Neural Computing and Applications.

[39]  Anand Jayant Kulkarni,et al.  Cohort Intelligence: A Self Supervised Learning Behavior , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[40]  Anand Jayant Kulkarni,et al.  Variations of cohort intelligence , 2018, Soft Comput..

[41]  Yilin Pang,et al.  A high capacity steganographic method based on quantization table modification , 2011, Wuhan University Journal of Natural Sciences.

[42]  Raveendran Paramesran,et al.  A hybrid approach for data clustering based on modified cohort intelligence and K-means , 2014, Expert Syst. Appl..

[43]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[44]  Rinita Roy,et al.  Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-connected PSNR , 2015, KES.

[45]  Z. Azimifar,et al.  Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).

[46]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[47]  G. Prema,et al.  Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).

[48]  Debnath Bhattacharyya,et al.  Image Data Hiding Technique Using Discrete Fourier Transformation , 2011, UCMA.

[49]  J. K. Mandal,et al.  A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .

[50]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[51]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[52]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[53]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..