A Novel Image Steganographic Method based on Integer Wavelet Transformation and Particle Swarm Optimization

Abstract Image steganography is a technique of hiding secret data into a cover image and so as to prevent the intruders from accessing the secret data. The efficiency of image steganography techniques are usually evaluated based on perceptual transparency, payload capacity, security, temper resistance and computational costs. Though there has been significant improvement in related research over the decades, available steganographic techniques usually satisfy only a subset of these criteria. This paper presents a novel IWT (Integer Wavelet Transform) based steganography method using PSO (Particle Swarm Optimization) to find the optimal substitution matrix for converting secret data into their substituted forms. In the proposed method, optimal pixel adjustment process is used to improve perceptual transparency so that the obtained stego image has low distortion. The proposed method improves the security, imperceptibility, and robustness of the secret data by hiding them into the wavelet coefficients of an image. Thus, the paper provides a detailed study of the use of PSO in three different image steganographic methods based on (i) LSB (Least Significant Bit) substitution, (ii) DWT (Discrete Wavelet Transform), and (iii) IWT. Experiments are conducted using well-known benchmark images and results are comparatively analyzed. It is found that our proposed approach of PSO based IWT outperforms both PSO based LSB and PSO based DWT from the context of standard quality metrics, statistical analysis, security level estimation, payload capacity, imperceptibility etc. We have also provided a comparative overview of the existing data hiding methods including the proposed approach.

[1]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[2]  Yudong Zhang,et al.  Detection of Alzheimer's disease and mild cognitive impairment based on structural volumetric MR images using 3D-DWT and WTA-KSVM trained by PSOTVAC , 2015, Biomed. Signal Process. Control..

[3]  Reza Safabakhsh,et al.  A novel stability-based adaptive inertia weight for particle swarm optimization , 2016, Appl. Soft Comput..

[4]  Russell C. Eberhart,et al.  Parameter Selection in Particle Swarm Optimization , 1998, Evolutionary Programming.

[5]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[6]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[7]  Ton Kalker,et al.  Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.

[8]  Xiaoxiao Ma,et al.  High-fidelity reversible data hiding scheme based on multi-predictor sorting and selecting mechanism , 2015, J. Vis. Commun. Image Represent..

[9]  Andrea Serani,et al.  Parameter selection in synchronous and asynchronous deterministic particle swarm optimization for ship hydrodynamics problems , 2016, Appl. Soft Comput..

[10]  Wim Sweldens,et al.  The lifting scheme: a construction of second generation wavelets , 1998 .

[11]  Frank Y. Shih,et al.  Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .

[12]  Chin-Chen Chang,et al.  A high payload frequency-based reversible image hiding method , 2010, Inf. Sci..

[13]  Chengyun Yang,et al.  Lossless Data Hiding Using Integer Wavelet Transform and Threshold Embedding Technique , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[14]  R. Eberhart,et al.  Empirical study of particle swarm optimization , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).

[15]  Min Wu,et al.  Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..

[16]  Daniele Peri,et al.  A multistart gradient-based algorithm with surrogate model for global optimization , 2012 .

[17]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[18]  Andrew D. Ker Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.

[19]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[20]  Shu-Fen Tu,et al.  Finding Optimal LSB Substitution Using Ant Colony Optimization Algorithm , 2010, 2010 Second International Conference on Communication Software and Networks.

[21]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[22]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[23]  Nor Ashidi Mat Isa,et al.  Fast retrieval of hidden data using enhanced hidden Markov model in video steganography , 2015, Appl. Soft Comput..

[24]  Ali Kanso,et al.  A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..

[25]  Maurice Clerc,et al.  The particle swarm - explosion, stability, and convergence in a multidimensional complex space , 2002, IEEE Trans. Evol. Comput..

[26]  H. H. Zayed,et al.  An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.

[27]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[28]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[29]  The Duc Kieu,et al.  A reversible steganographic scheme for VQ indices based on joint neighboring and predictive coding , 2016, Multimedia Tools and Applications.

[30]  Nameer N. El-Emam New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization , 2015, Comput. Secur..

[31]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[32]  Chin-Chen Chang,et al.  A reversible compression code hiding using SOC and SMVQ indices , 2015, Inf. Sci..

[33]  Xiaoxiao Ma,et al.  Reversible data hiding scheme for VQ indices based on modified locally adaptive coding and double-layer embedding strategy , 2015, J. Vis. Commun. Image Represent..

[34]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[35]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[36]  Pachiyappan Arulmozhivarman,et al.  RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour , 2015, Secur. Commun. Networks.

[37]  Punam Bedi,et al.  Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..

[38]  Ahmed Al-Ani,et al.  A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..

[39]  Amir-Masoud Eftekhari-Moghadam,et al.  An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..

[40]  Swaminathan Ramakrishnan,et al.  Imperceptibility - Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization , 2016, Expert Syst. Appl..

[41]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[42]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[43]  Shyr-Shen Yu,et al.  A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..

[44]  Bo Zhang,et al.  Packed integer wavelet transform constructed by lifting scheme , 2000, IEEE Trans. Circuits Syst. Video Technol..

[45]  Vijay H. Mankar,et al.  Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..

[46]  Nameer N. El-Emam,et al.  A novel algorithm for colour image steganography using a new intelligent technique based on three phases , 2015, Appl. Soft Comput..

[47]  Xiaolong Li,et al.  A further study of large payloads matrix embedding , 2015, Inf. Sci..

[48]  Jessica J. Fridrich,et al.  Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..

[49]  Chin-Chen Chang,et al.  Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels , 2006, Pattern Recognit..

[50]  Mohammad Mehdi Ebadzadeh,et al.  A novel particle swarm optimization algorithm with adaptive inertia weight , 2011, Appl. Soft Comput..

[51]  Karim Faez,et al.  An image steganography method based on integer wavelet transform , 2017, Multimedia Tools and Applications.

[52]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[53]  Christian Cachin,et al.  An information-theoretic model for steganography , 2004, Inf. Comput..

[54]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[55]  Ioan Cristian Trelea,et al.  The particle swarm optimization algorithm: convergence analysis and parameter selection , 2003, Inf. Process. Lett..

[56]  Harold Joseph Highland,et al.  Data encryption: A non-mathematical approach , 1997, Comput. Secur..

[57]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[58]  Genlin Ji,et al.  Preliminary research on abnormal brain detection by wavelet-energy and quantum- behaved PSO. , 2016, Technology and health care : official journal of the European Society for Engineering and Medicine.

[59]  Punam Bedi,et al.  Using PSO in Image Hiding Scheme Based on LSB Substitution , 2011, ACC.

[60]  Girolamo Fornarelli,et al.  An unsupervised multi-swarm clustering technique for image segmentation , 2013, Swarm Evol. Comput..

[61]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[62]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[63]  Pradeep M. Patil,et al.  Robust and secured image-adaptive data hiding , 2012, Digit. Signal Process..

[64]  Sushil Jajodia,et al.  Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).