An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms

In stenography, embedding data within an image has a trade-off between image quality and embedding capacity. Specifically, the more data are concealed within a carrier image, the further distortion the image suffers, causing a decline in the resultant stego image quality. Embedding high capacity of data into an image while preserving the quality of the carrier image can be seen as an optimization problem. In this paper, we propose a novel spatial steganography scheme using genetic algorithms (GAs). Our scheme utilizes new operations to increase least significant bits (LSB) matching between the carrier and the stego image which results in increased embedding capacity and reduced distortion. These operations are optimized pixel scanning in vertical and horizontal directions, circular shifting, flipping secret bits and secret data transposing. We formulate a general GA-based steganography model to search for the optimum solutions. Finally, we use LSB substitution for data embedding. We conduct extensive experimental testing of the proposed scheme and compare it to the state-of-art steganography schemes. The proposed scheme outperforms the relevant GA-based steganography methodologies.

[1]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[2]  Cheng-Hsing Yang,et al.  Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.

[3]  Cheng-Hsiung Hsieh,et al.  Generating facial images for steganography based on IGA and image morphing , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[4]  J. K. Mandal,et al.  A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .

[5]  Amandeep Kaur,et al.  STEGANOGRAPHIC APPROACH FOR HIDING IMAGE IN DCT DOMAIN , 2011 .

[6]  Francisco J. Gallegos-Funes,et al.  Adjust of energy with compactly supported orthogonal wavelet for steganographic algorithms using the scaling function , 2013 .

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Wen-Hsiang Tsai,et al.  A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..

[9]  Zenon Chaczko,et al.  Hyper Edge Detection with Clustering for Data Hiding , 2016, J. Inf. Hiding Multim. Signal Process..

[10]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[11]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[12]  Zenon Chaczko,et al.  Data Hiding Based on Intelligent Optimized Edges for Secure Multimedia Communication , 2015, J. Networks.

[13]  Chin-Chen Chang,et al.  High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..

[14]  George Stephanides,et al.  A novel technique for image steganography based on a high payload method and edge detection , 2012, Expert Syst. Appl..

[15]  Zenon Chaczko,et al.  EA based Heuristic Segmentation for Efficient Data Hiding , 2015 .

[16]  Moni Naor,et al.  Visual Cryptography II: Improving the Contrast Via the Cover Base , 1996, Security Protocols Workshop.

[17]  Soleimanpour Mohadeseh,et al.  A NOVEL TECHNIQUE FOR STEGANOGRAPHY METHOD BASED ON IMPROVED GENETIC ALGORITHM OPTIMIZATION IN SPATIAL DOMAIN , 2013 .

[18]  Karim Faez,et al.  Adaptive image steganography based on transform domain via genetic algorithm , 2017 .

[19]  Shweta Joshi,et al.  Selection of Image Blocks using Genetic Algorithm and Effective Embedding with DCT for Steganography , 2016, COMPUTE.

[20]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[21]  David B. Fogel,et al.  Evolution-ary Computation 1: Basic Algorithms and Operators , 2000 .

[22]  N. Pierce Origin of Species , 1914, Nature.

[23]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[24]  Wen-Yuan Chen,et al.  Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques , 2008, Appl. Math. Comput..

[25]  Hedieh Sajedi,et al.  BSS: Boosted steganography scheme with cover image preprocessing , 2010, Expert Syst. Appl..

[26]  Samir Kumar Bandyopadhyay,et al.  A Novel Steganographic Technique Based on 3D-DCT Approach , 2010, Comput. Inf. Sci..

[27]  Z. Azimifar,et al.  Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).

[28]  Ronak Karimi,et al.  Steganography in Image Segments Using Genetic Algorithm , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.

[29]  Hideki Noda,et al.  High-performance JPEG steganography using quantization index modulation in DCT domain , 2006, Pattern Recognit. Lett..

[30]  J. Shanbehzadeh,et al.  High Capacity Image Steganography usingWavelet Transform and Genetic Algorithm , 2011 .

[31]  Zenon Chaczko,et al.  Perceptual threshold in DWT for optimum embedding rate in data hiding using HVS and GA , 2015, 2015 International Conference on Image and Vision Computing New Zealand (IVCNZ).

[32]  Romany F. Mansour,et al.  An evolutionary computing enriched RS attack resilient medical image steganography model for telemedicine applications , 2017, Multidimens. Syst. Signal Process..

[33]  R. S. Bichkar,et al.  A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator , 2018 .

[34]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[35]  Yu-An Ho,et al.  Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[36]  S. Katzenbeisser,et al.  A survey of steganographic techniques , .

[37]  Daoben Zhu,et al.  Immobilization of tetra-tert-butylphthalocyanines on carbon nanotubes: a first step towards the development of new nanomaterials , 2002 .

[38]  Mohammad Mehdi Rashidi,et al.  Increasing image compression rate using steganography , 2013, Expert Syst. Appl..

[39]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[40]  Darrell Whitley,et al.  A genetic algorithm tutorial , 1994, Statistics and Computing.

[41]  Ahmed H. Tewfik,et al.  A novel high-capacity data-embedding system , 2006, IEEE Transactions on Image Processing.

[42]  Yao Zhao,et al.  Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm , 2010, EURASIP J. Adv. Signal Process..

[43]  J. Anitha,et al.  A modified genetic algorithm for performance improvement of transform based image steganography systems , 2018, J. Intell. Fuzzy Syst..

[44]  Kathleen Ahrens,et al.  From Lexical Semantics to Conceptual Metaphors : Mapping Principle Verification with WordNet and SUMO , 2004 .