Secure data hiding by fruit fly optimization improved hybridized seeker algorithm

The recent growth of World Wide Web (WWW) and development of the next-generation internet facilitates a huge amount of data being conveniently transmitted via wireless networks. The sensitive information transmitted is potentially vulnerable in the communication channel like wireless networks. Unauthorized users could potentially intercept and negatively exploit the true intent of the information being exchanged between legitimate users. The efficient steganography techniques are very useful to prevent such undesirable interception of information. In this work, we propose and evaluate an efficient image steganography using Fruit Fly Optimization hybridized Improved Seeker (FOIS) algorithm. The FOIS provides information security and safeguards the medical data to avoid medical related cybercrimes. FOIS efficiently determines the optimal locations of pixels adaptively in the spatial domain of the cover image. Initially, the cover image is divided into n blocks of $$8 \times 8$$, on which a permutation combination is applied to find the number of blocks for further processing. This method improves the image quality and secures data. The secret messages are embedded in each block using optimal pixels selection and Least Significant Bit (LSB) of Discrete Cosine Transform coefficients. Moreover, in order to ensure seamless communication over an insecure communication channel, a dual cryptosystem model is developed which consist of the proposed steganography scheme and Rivest Cipher (RC4) cryptosystem. This work validates the security level of the stego image, and finally the performance is compared with state-of-the-art methods such as LSB, Particle Swarm Optimization and Genetic Algorithm. The performance assessment reveals that the proposed steganography model outperforms other optimization based approaches in terms of Peak Signal-to-Noise Ratio, embedding capacity and imperceptibility.

[1]  A. W. Wahab,et al.  High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution , 2018, Applied Sciences.

[2]  Thomas Stützle,et al.  Frankenstein's PSO: A Composite Particle Swarm Optimization Algorithm , 2009, IEEE Transactions on Evolutionary Computation.

[3]  Sakir Sezer,et al.  Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes , 2016, IEEE Transactions on Image Processing.

[4]  Ki-Hyun Jung,et al.  High-capacity index based data hiding method , 2014, Multimedia Tools and Applications.

[5]  S. P. Rajagopalan,et al.  A stegano - visual cryptography technique for multimedia security , 2019, Multimedia Tools and Applications.

[6]  Özlem Uzuner,et al.  Annotating risk factors for heart disease in clinical narratives for diabetic patients , 2015, J. Biomed. Informatics.

[7]  Xinpeng Zhang,et al.  Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.

[8]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[9]  Bin Li,et al.  Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Bin Li,et al.  A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.

[11]  R. Haff,et al.  Detection of Fruit-fly Infestation in Olives using X-Ray Imaging: Algorithm Development and Prospects , 2016 .

[12]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[13]  Amod Kumar,et al.  A Secure and High-Capacity Data-Hiding Method Using Compression, Encryption and Optimized Pixel Value Differencing , 2018, IEEE Access.

[14]  Karim Faez,et al.  Adaptive image steganography based on transform domain via genetic algorithm , 2017 .

[15]  F. Pezzella,et al.  A genetic algorithm for the Flexible Job-shop Scheduling Problem , 2008, Comput. Oper. Res..

[16]  Tamma Bheemarjuna Reddy,et al.  On improving SINR in LTE HetNets with D2D relays , 2016, Comput. Commun..

[17]  Ahmed Al-Ani,et al.  A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..

[18]  Punam Bedi,et al.  Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..

[19]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[20]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[21]  Warley Gramacho Da Silva,et al.  Optimizing Image Steganography using Particle Swarm Optimization Algorithm , 2017 .

[22]  Lisheng Xu,et al.  A High Capacity Spatial Domain Data Hiding Scheme for Medical Images , 2017, J. Signal Process. Syst..

[23]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[24]  Inan Güler,et al.  A novel fuzzy logic-based image steganography method to ensure medical data security , 2015, Comput. Biol. Medicine.

[25]  Chaohua Dai,et al.  Seeker Optimization Algorithm for Optimal Reactive Power Dispatch , 2009, IEEE Transactions on Power Systems.

[26]  Ahmad Hamad,et al.  Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..

[27]  Wen Gao,et al.  SSIM based perceptual distortion rate optimization coding , 2010, Visual Communications and Image Processing.

[28]  Alan C. Bovik,et al.  Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.

[29]  Te-Ming Tu,et al.  A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..

[30]  Ambika,et al.  Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique , 2020, Health and Technology.

[31]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[32]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[33]  Xiaoyun Wang,et al.  High capacity data hiding based on interpolated image , 2016, Multimedia Tools and Applications.

[34]  Daniel R. Jeske,et al.  Mean Squared Error of Estimation or Prediction under a General Linear Model , 1992 .

[35]  Devesh Kumar Srivastava,et al.  Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard , 2017 .

[36]  Michel C. Jeruchim,et al.  Techniques for Estimating the Bit Error Rate in the Simulation of Digital Communication Systems , 1984, IEEE J. Sel. Areas Commun..

[37]  Chaohua Dai,et al.  Seeker Optimization Algorithm for Digital IIR Filter Design , 2010, IEEE Transactions on Industrial Electronics.

[38]  Sheila S. Hemami,et al.  VSNR: A Wavelet-Based Visual Signal-to-Noise Ratio for Natural Images , 2007, IEEE Transactions on Image Processing.

[39]  Harsh K. Verma,et al.  A high capacity text steganography scheme based on LZW compression and color coding , 2017 .

[40]  Anan Banharnsakun,et al.  Artificial bee colony approach for enhancing LSB based image steganography , 2018, Multimedia Tools and Applications.