Optimized steganography techniques based on PVDS and genetic algorithm

被引:3
作者
Fahim, Alaa [1 ]
Raslan, Yara [2 ]
机构
[1] Assiut Univ, Fac Sci, Math Dept, Assiut, Egypt
[2] Assiut Univ, Fac Comp & Informat, Comp Sci Dept, Assiut, Egypt
关键词
Steganography; Data hiding; Genetic algorithm; DATA HIDING SCHEME; LSB;
D O I
10.1016/j.aej.2023.11.013
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Due to the rapid development of confidential digital communication over international networks, security is the most significant factor. Steganography is the science of concealed communication and is used to conceal the presence of secret information among the various methods of hiding data in communications. Steganography techniques are usually implemented either in spatial or frequency domains. Some spatial domain methods fundamentally utilize the absolute difference value between neighbor pixels to encode the secret message, categorized as Pixel-Value Differencing Steganography methods (PVDS). In PVDS, the hiding capacity of the adjacent pixels depends on their difference value. Consequently, the secret data will be embedded with a high visual quality of the stego-image. Indicator-based PVDS (IPVDS) technique is derived from the PVDS method. It depends on an Indicator pixel (IP) to extract the secret data correctly. The Genetic Algorithm (GA) approach to optimization depends on the concept of survival of the fittest. This paper introduces two proposals, GA-based steganography schemes (GA-IPVD) and (GA-IPVDM). These new techniques encoded secret data using the IPVDS method. Before embedding data in the cover image, the order of the pixels corresponding to the secret data is modified and rearranged. GA controls the operation of rearranging and modifying the order of pixels and all parameters. The current paper addresses steganography as an optimization problem and seeks to determine the optimal order of the pixels that enhance the matching between the cover image and stego-image to reduce distortion despite high embedded capacity. In the first proposed technique GA-IPVD, GA concentrates on the imperceptibility of embedded data and maximizes the quality of the stego-image according to the given secret data. In contrast, the GA maximizes the capacity of embedded data while maintaining an acceptable amount of stego-image quality in the second proposed technique GA-IPVDM. The proposed systems have embedding key that increase the security of proposed schemes. The experimental results demonstrate that the proposed methods can embed a large quantity of secret data while maintaining an acceptable visual quality of the stegoimages. The proposed technique has also demonstrated excellent resistance to a variety of stego-attacks, including the pixel difference histogram (PDH) as well as regular and singular (RS) analyses. Additionally, the out-of boundary pixel issue (BI), which endures in the majority of modern data hiding algorithms, has been successfully resolved.
引用
收藏
页码:245 / 260
页数:16
相关论文
共 48 条
  • [1] Abdulwahedand MN, 2019, INT CONF SYST ENG, P309
  • [2] An Animated GIF Steganography Using Variable Block Partition Scheme
    Alyahya, Maram Abdullah M.
    Ansari, Arshiya S.
    Mohammadi, Mohammad Sajid
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 897 - 914
  • [3] [Anonymous], 2018, The USC-SIPI image database
  • [4] [Anonymous], 2018, Dataset of standard,
  • [5] A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm
    Banimelhem, Omar
    Tawalbeh, Lo'ai
    Mowafi, Moad
    Al-Batati, Mohammed
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 1 - 15
  • [6] Secured steganographic scheme for highly compressed color image using weighted matrix through DCT
    Chowdhuri P.
    Jana B.
    Giri D.
    [J]. International Journal of Computers and Applications, 2021, 43 (01) : 38 - 49
  • [7] A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB
    Darabkh, Khalid A.
    Al-Dhamari, Ahlam K.
    Jafar, Iyad F.
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2017, 46 (01): : 16 - 36
  • [8] Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value Difference Expansion
    Debasis, Giri
    Biswapati, Jana
    Kumar, Mondal Shyamal
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, INDIA 2016, 2016, 434 : 403 - 412
  • [9] Flynn Jeremy R., 2013, Engineering Psychology and Cognitive Ergonomics. Understanding Human Cognition. 10th International Conference, EPCE 2013 Held as Part of HCI International 2013. Proceedings. LNCS 8019, P23, DOI 10.1007/978-3-642-39360-0_3
  • [10] Guzman Anthony Rene, 2022, PhD thesis