Improving Adaptive Steganography Performance with Intelligent Embedding Key Selection Using Optimization Algorithms

Document Type : Original Article

Author

Alzahra university

Abstract

Adaptive steganography methods use variable embedding capacity according to the uniformity or edges of image areas. ALSBMR is an adaptive method with two main stages: Selecting suitable pixels, and embedding them using the LSBMR method. This method utilizes two adaptive keys between the sender and the receiver to determine the block rotation angle and select the embedding path. In the original method, the keys are randomly selected by the sender with no specific criteria and then sent to the receiver. The proposed method models key selection as an optimization problem and uses Genetic Algorithm (GA) and Teaching-Learning-Based Optimization (TLBO) to find the optimal keys. Two fitness functions are used to further evaluate the difference as well as the histogram difference between the cover and stego images. The results show that the image embedded with the proposed method has improved quality and security compared to the base method. Since all steganography methods require embedding keys, intelligent key selection can improve the performance of existing steganography methods.

Keywords

Main Subjects


[1]     Kadhim, I. J.; Premaratne, P.; Vial, P. J.; “Improved Image Steganography Based on Super-Pixel and Coefficient-Plane-Selection”; Signal Process. 2020, 171, 107481.##
[2]     Kadhim, I. J.; Premaratne, P.; Vial P. J.; Halloran, B.; “Comprehensive Survey of Image Steganography: Techniques, Evaluations, and Trends in Future Research”; Neurocomputing 2018, 335, 299-326.##
[3]     Luo, W.; Huang, F.; Huang, J.; “Edge Adaptive Image Steganography Based on LSB Matching Revisited”; IEEE Trans. Inf. Forensics Secur. 2010, 5, 201-214.##
[4]     Hong, W.; Chen, T. S.; “A Novel Data Embedding Method using Adaptive Pixel Pair Matching”; IEEE Trans. Inf. Forensics Secur. 2011, 7, 176-184.##
[5]     Hussain, M.; Abdul Wahab, A. W.; Ho, A. T. S.; Javed, N.; Jung, K. H.; “A Data Hiding Scheme Using Parity-Bit Pixel Value Differencing and Improved Rightmost Digit Replacement”; Signal Process. Image Commun. 2017, 50, 44-57.##
[6]     Liao, X.; Qin, Z.; Ding, L.; “Data Embedding in Digital Images Using Critical Functions”; Signal Process. Image Commun. 2017, 58, 146–156,##
[7]     Chen, J.; “A PVD-Based Data Hiding Method with Histogram Preserving Using Pixel Pair Matching”; Signal Process. Image Commun. 2014, 29, 375–384.##
[8]     Shen, S. Y.; Huang, L. H.; “A Data Hiding Scheme Using Pixel Value Differencing and Improving Exploiting Modification Directions”; Comput. Secur. 2015, 48, 131–141.##
[9]     Hong, W.; Chen, T. S.; Luo, C. W.; “Data Embedding Using Pixel Value Differencing and Diamond Encoding with Multiple-Base Notational System”; J. Syst. Soft. 2012, 85, 1166–1175.##
[10]  Rabie, T.; Kamel, I.; “High-Capacity Steganography: A Global-Adaptive-Region Discrete Cosine Transform Approach”; Multimed. Tools Appl. 2017, 76, 6473–6493.##
[11]  Rabie, T.; Baziyad, M.; Kamel, I.; “Enhanced High Capacity Image Steganography Using Discrete Wavelet Transform and the Laplacian Pyramid”; Multimed. Tools Appl. 2018, 77, 23673-23698.##
[12]  Di, F.; Zhang, M.; Liao, X.; Liu, J.; “High-Fidelity Reversible Data Hiding by Quadtree-Based Pixel Value Ordering”; Multimed. Tools Appl. 2018, 78, 7125-7141.##
[13]  Al-Qershi, O. M.; Khoo, B. E.; “Controlling Hiding Capacity Using Image Characteristics with a 2D-DE Data Hiding Scheme”; AEU-Int. J. Electron C. 2014, 68, 346–350.##
[14]  Ghosal, S. K.; Mandal, J. K.; Sarkar, R.; “High Payload Image Steganography Based on Laplacian of Gaussian (LoG) Edge Detector”; Multimed.Tools  Appl. 2018, 77, 30403-30418.##
[15]  Atta, R.; Ghanbari, M.; “A High Payload Steganography Mechanism Based on Wavelet Packet Transformation and Neutrosophic Set”; J. Vis. Commun. Image R. 2018, 35, 42-54.##
[16]  Gaurav, K; Ghanekar, U.; “Image Steganography Based on Canny Edge Detection, Dilation Operator and Hybrid Coding”; J. Inf. Secur. Appl. 2018, 41, 41-51.##
[17]  Atee, H. A.; Ahmad, R.; Noor, N. M.;  Rahma, A. M. S.; Aljeroudi, Y.; “Extreme Learning Machine Based Optimal Embedding Location Finder for Image Steganography”; PLoS ONE 2017, 12, 1-23.##
[18]  Roy, R.; Laha, S.; “Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-Connected PSNR”; Proc. Comput. Sci. 2015, 60, 468–477.##
[19]  Ghaleb Al-Jbara, H. A.; Mat Kiah, L. B.; Jalab, H. A.; “Increased Capacity of Image Based Steganography Using Artificial Neural Network”; AIP Conf. Proc. 2012, 1482 , 20–25.##
[20]  Nipanikar, S. I.; Deepthi, V. H.; Kulkarni, N.; “A Sparse Representation Based Image Steganography Using Particle Swarm Optimization and Wavelet Transform”; Alex. Eng. J. 2017, 57, 2343-2356.##
[21]  Rao, R. V.; Savsani, V. J.; Vakharia, D. P.; “Teaching–Learning-Based Optimization: A Novel Method for Constrained Mechanical Design Optimization Problems”; Comput. Aided Des. 2011, 43, 303-315.##
[22]  Ker, A.; “Steganalysis of LSB Matching in Grayscale Images”; IEEE Signal Process. Lett. 2005, 12, 441–444.##
[23]  Huang, F.; Li, B.; Huang, J.; “Attack LSB Matching Steganography by Counting Alteration Rate of the Number of Neighbourhood Gray Levels”; Proc. IEEE ICIP 2007, 1, 401-404.##
[24]  Cancelli, G.; Doerr, G.; Cox, I. J.; Barni, M.; “Detection of ±1 LSB Steganography Based on the Amplitude of Histogram Local Extrema”; IEEE Int. Con. Image Process. 2008, 1288-1291.##
[25]  Sabeti, V.; Samavi, S; Shirani, S.; “An Adaptive LSB Matching Steganography Based on Octonary Complexity Measure”; Multimed. Tools Appl. 2013, 64, 777-793.##
[26]  Shah, P. D.; Bichkar, R. S; “A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generator”; Int. Con. Intelli. Comput. Appl. 2018, 119-129.##
[27]  Wazirali, R.; Alasmary, W.; Mahmoud, M. M; Alhindi, A.; “An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms”; IEEE Acc. 2019, 7, 133496-133508.##
[28]  Shah, P.D.; Bichkar, R.S.; “Genetic Algorithm Based Imperceptible Spatial Domain Image Steganography Technique with High Payload Capacity”; Int. J. Rec. Tech. Eng. (IJRTE), 2019, 224-229.##
[29]  Sabeti, V.; Faiazi, S.; Shirinkhah, H.; “Improving Security of LSBM Steganography by Using of Genetic Algorithm, Multi-Key and Blocking”; Iranian J. Elec. Comp. Eng., 2020, 78, 49-58. (In Persian)##