Adaptive image steganography based on transform domain via genetic algorithm

Abstract This paper presents a novel approach for data hiding in frequency domain with the use of genetic algorithm. At first, cover images are mapped to a proper frequency domain using the concepts of adaptive wavelet transform and genetic algorithm. In the obtained space, using a model based on Kieu and Chang, encrypted information will be embedded in the frequency coefficients that represent edges of the image in spatial domain. So the cover image will change the least and have the most compatibility with human visual system. Simulation results show that our proposed method outperforms recently published works in terms of PSNR and PSPNR factors.

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  B Javidi,et al.  Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.

[3]  Malay Kumar Kundu,et al.  Genetic algorithms for optimality of data hiding in digital images , 2008, Soft Comput..

[4]  Arsham Abedini,et al.  Parallel Improved Pulse Coupled Neural Network Application for Edge Detection in Image Processing , 2017 .

[5]  Ahmed Al-Ani,et al.  A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..

[6]  Karim Faez,et al.  An image steganography method based on integer wavelet transform , 2017, Multimedia Tools and Applications.

[7]  S. K. Sudheer,et al.  Performance and analysis of high capacity Steganography of color images involving Wavelet Transform , 2015 .

[8]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[9]  Shahrokh Ghaemmaghami,et al.  One-third probability embedding: Less detectable LSB steganography , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[10]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[11]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[12]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[13]  Chin-Chen Chang,et al.  A steganographic scheme by fully exploiting modification directions , 2011, Expert Syst. Appl..

[14]  Chun-Hsien Chou,et al.  A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile , 1995, IEEE Trans. Circuits Syst. Video Technol..

[15]  Punam Bedi,et al.  Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..

[16]  Al-Sakib Khan Pathan,et al.  Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach , 2014, Comput. Electr. Eng..

[17]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[18]  C. Reeves Modern heuristic techniques for combinatorial problems , 1993 .

[19]  Yongjian Hu,et al.  A high capacity lossless data hiding scheme for JPEG images , 2013, J. Syst. Softw..

[20]  AbduallahWafaa Mustafa,et al.  Mix column transform based on irreducible polynomial mathematics for color image steganography , 2014 .

[21]  Peng Ying-Ning,et al.  The design of a kind of chirp-like mother wavelet by neural network , 1996, Proceedings of Third International Conference on Signal Processing (ICSP'96).

[22]  John T. Sheridan,et al.  Optical encryption by combining image scrambling techniques in fractional Fourier domains , 2013 .

[23]  John T. Sheridan,et al.  A review of optical image encryption techniques , 2014 .

[24]  R. Davis,et al.  The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.