Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission

被引:1
作者
Rezaei, Samira [1 ,3 ]
Javadpour, Amir [2 ,3 ]
机构
[1] Leiden Univ, Leiden Inst Adv Comp Sci LIACS, NL-2333 CA Leiden, Netherlands
[2] Harbin Inst Technol, Dept Comp Sci & Technol Cyberspace Secur, Shenzhen, Peoples R China
[3] Inst Politecn Viana Do Castelo, ADiT Lab, Elect & Telecommun Dept, Viana Do Castelo, Portugal
关键词
Genetic Algorithm; Bio-inspired Algorithms; Steganography; Fusion Model; GENETIC ALGORITHM; OPTIMIZATION; WATERMARKING; ENCRYPTION; SCHEME;
D O I
10.1007/s11042-024-18776-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of data sharing over the Internet has given rise to pressing concerns surrounding data security. Addressing these concerns, steganography emerges as a viable mechanism to safeguard data during transmission. It involves concealing messages within other media, such as images, exchanged over networks. In this research, we propose an innovative image steganography approach by harnessing the capabilities of bio-inspired algorithms. A central challenge in steganography revolves around the inherent pixel correlations within cover images, which may inadvertently leak sensitive information to potential intruders. To tackle this challenge head-on, we harness the potential of bio-inspired algorithms, which have exhibited promise in efficiently mitigating these vulnerabilities. This paper introduces a steganography strategy rooted in a fusion model that seamlessly integrates diverse bio-inspired algorithms. Our novel embedding approach ensures the production of robust and high-quality cover images and disrupts bit sequences effectively, thereby enhancing resistance against potential attacks. We meticulously evaluate the performance of our method using a comprehensive dataset encompassing grayscale and JPEG color images. Our particular emphasis on color images arises from their superior capacity to conceal a greater volume of information. The results vividly demonstrate our approach's effectiveness in achieving secure and efficient data concealment within images.
引用
收藏
页码:82247 / 82280
页数:34
相关论文
共 37 条
[1]   A steganography embedding method based on edge identification and XOR coding [J].
Al-Dmour, Hayat ;
Al-Ani, Ahmed .
EXPERT SYSTEMS WITH APPLICATIONS, 2016, 46 :293-306
[2]  
[Anonymous], 2018, Int J Electric Comput Eng (IJECE), DOI DOI 10.11591/IJECE.V8I1.PP379-389
[3]  
Ansari A. S., 2019, International Journal of Computer Network and Information Security, V11, P11, DOI 10.5815/ijcnis.2019.01.02
[4]   Artificial bee colony approach for enhancing LSB based image steganography [J].
Banharnsakun, Anan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) :27491-27504
[5]  
Brazil AL, 2011, ELMAR PROC, P285
[6]  
Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275
[7]  
Chen YH., 2014, Tenth International Conference on, V2014, P21
[8]   Invisibility and application functionalities in perceptual watermarking - An overview [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
PROCEEDINGS OF THE IEEE, 2002, 90 (01) :64-77
[9]   Steganography With Multiple JPEG Images of the Same Scene [J].
Denemark, Tomas ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) :2308-2319
[10]   Steganalysis Features for Content-Adaptive JPEG Steganography [J].
Denemark, Tomas ;
Boroumand, Mehdi ;
Fridrich, Jessica .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (08) :1747-1757