A novel algorithm for colour image steganography using a new intelligent technique based on three phases

Steganography architecture with seven security layers. New steganography algorithm.Proposed new intelligent technique.Proposed seven layers of security.Extract byte characteristics.Construct image segmentation. A three-phase intelligent technique has been constructed to improve the data-hiding algorithm in colour images with imperceptibility. The first phase of the learning system (LS) has been applied in advance, whereas the other phases have been applied after the hiding process. The first phase has been constructed to estimate the number of bits to be hidden at each pixel (NBH); this phase is based on adaptive neural networks with an adaptive genetic algorithm using upwind adaptive relaxation (LSANN_AGAUpAR1). The LS of the second phase (LSANN_AGAUpAR2) has been introduced as a detector to check the performance of the proposed steganographic algorithm by creating a rich images model from available cover and stego images. The LS of the last phase (LSCANN_AGAUpAR3) has been implemented through three steps, and it is based on a concurrent approach to improve the stego image and defend against attacks. The adaptive image filtering and adaptive image segmentation algorithms have been introduced to randomly hide a compressed and encrypted secret message into a cover image. The NBH for each pixel has been estimated cautiously using 32 principle situations (PS) with their 6 branch situations (BS). These situations have been worked through seven layers of security to augment protection from attacks. In this paper, hiding algorithms have been produced to fight three types of attacks: visual, structural, and statistical attacks. The simulation results have been discussed and compared with new literature using data hiding algorithms for colour images. The results of the proposed algorithm can efficiently embed a large quantity of data, up to 12bpp (bits per pixel), with better image quality.

[1]  Nameer N. El. Emam,et al.  COMPUTING AN ADAPTIVE MESH IN FLUID PROBLEMS USING NEURAL NETWORK AND GENETIC ALGORITHM WITH ADAPTIVE RELAXATION , 2008 .

[2]  Carlos Alberto Ochoa Ortíz Zezzatti,et al.  Comparison of Competitive Learning for SOM Used in Classification of Partial Discharge , 2012, HAIS.

[3]  Ziba Eslami,et al.  Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..

[4]  Jeng-Shyang Pan,et al.  Reversible data hiding based on multilevel histogram modification and sequential recovery , 2011 .

[5]  Wien Hong,et al.  Adaptive reversible data hiding method based on error energy control and histogram shifting , 2012 .

[6]  Xinxin Niu,et al.  Novel quantum steganography with large payload , 2010 .

[7]  Hossein Najafi A neural network approach to digital data hiding based on the perceptual masking model of the human vision system , 2010, Int. J. Intell. Comput. Cybern..

[8]  Osamah M. Al-Qershi,et al.  High capacity data hiding schemes for medical images based on difference expansion , 2011, J. Syst. Softw..

[9]  Xian-Ting Zeng,et al.  Reversible data hiding scheme using reference pixel and multi-layer embedding , 2012 .

[10]  Bin Li,et al.  High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion , 2013, Signal Process..

[11]  Chao-Tsun Chang,et al.  A compact covering method to exploit embedding capacity for matrix encoding , 2012, Inf. Sci..

[12]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[13]  N. Kamaraj,et al.  Varying radix numeral system based adaptive image steganography , 2011, Inf. Process. Lett..

[14]  Zhengjun Liu,et al.  Image hiding scheme by use of rotating squared sub-image in the gyrator transform domains , 2013 .

[15]  Nameer N. El-Emam,et al.  An intelligent computing technique for fluid flow problems using hybrid adaptive neural network and genetic algorithm , 2011, Appl. Soft Comput..

[16]  Ishak Aris,et al.  Design of an ultra high speed AES processor for next generation IT security , 2011, Comput. Electr. Eng..

[17]  Chin-Chen Chang,et al.  High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..

[18]  Hedieh Sajedi,et al.  BSS: Boosted steganography scheme with cover image preprocessing , 2010, Expert Syst. Appl..

[19]  Jiwu Huang,et al.  A more secure steganography based on adaptive pixel-value differencing scheme , 2011, Multimedia Tools and Applications.

[20]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[21]  Ching-Chiuan Lin,et al.  An information hiding scheme with minimal image distortion , 2011, Comput. Stand. Interfaces.

[22]  Jian Li,et al.  Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation , 2013, Signal Process..

[23]  Fan Zhang,et al.  The upper and lower bounds of the information-hiding capacity of digital images , 2008, Inf. Sci..

[24]  Chi-Nan Lin,et al.  Using quad smoothness to efficiently control capacity-distortion of reversible data hiding , 2010, J. Syst. Softw..

[25]  Chin-Chen Chang,et al.  A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding , 2008, Soft Comput..

[26]  C. Balaji,et al.  Experiment Driven Ann-GA Based Technique for Optimal Distribution of Discrete Heat Sources Under Mixed Convection , 2015 .

[27]  Yao Zhao,et al.  Efficient color image reversible data hiding based on channel-dependent payload partition and adaptive embedding , 2015, Signal Process..

[28]  Chin-Chen Chang,et al.  A novel VQ-based reversible data hiding scheme by using hybrid encoding strategies , 2013, J. Syst. Softw..

[29]  Kuo-Chen Wu,et al.  A distortion-free data hiding scheme for high dynamic range images , 2011, Displays.

[30]  George Stephanides,et al.  A novel technique for image steganography based on a high payload method and edge detection , 2012, Expert Syst. Appl..

[31]  Guorui Feng,et al.  Reversible data hiding of high payload using local edge sensing prediction , 2012, J. Syst. Softw..

[32]  Chin-Feng Lee,et al.  A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..

[33]  Kuo-Liang Chung,et al.  Efficient reversible data hiding algorithm based on gradient-based edge direction prediction , 2013, J. Syst. Softw..

[34]  Ricardo Pérez-Rodríguez,et al.  Simulation optimization for a flexible jobshop scheduling problem using an estimation of distribution algorithm , 2014 .

[35]  Nameer N. El-Emam,et al.  New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm , 2013, J. Syst. Softw..

[36]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[37]  Chin-Feng Lee,et al.  Embedding capacity raising in reversible data hiding based on prediction of difference expansion , 2010, J. Syst. Softw..

[38]  Hsien-Chu Wu,et al.  Reversible image steganographic scheme via predictive coding , 2010, Displays.