Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission

被引:1
作者
Rezaei, Samira [1 ,3 ]
Javadpour, Amir [2 ,3 ]
机构
[1] Leiden Univ, Leiden Inst Adv Comp Sci LIACS, NL-2333 CA Leiden, Netherlands
[2] Harbin Inst Technol, Dept Comp Sci & Technol Cyberspace Secur, Shenzhen, Peoples R China
[3] Inst Politecn Viana Do Castelo, ADiT Lab, Elect & Telecommun Dept, Viana Do Castelo, Portugal
关键词
Genetic Algorithm; Bio-inspired Algorithms; Steganography; Fusion Model; GENETIC ALGORITHM; OPTIMIZATION; WATERMARKING; ENCRYPTION; SCHEME;
D O I
10.1007/s11042-024-18776-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of data sharing over the Internet has given rise to pressing concerns surrounding data security. Addressing these concerns, steganography emerges as a viable mechanism to safeguard data during transmission. It involves concealing messages within other media, such as images, exchanged over networks. In this research, we propose an innovative image steganography approach by harnessing the capabilities of bio-inspired algorithms. A central challenge in steganography revolves around the inherent pixel correlations within cover images, which may inadvertently leak sensitive information to potential intruders. To tackle this challenge head-on, we harness the potential of bio-inspired algorithms, which have exhibited promise in efficiently mitigating these vulnerabilities. This paper introduces a steganography strategy rooted in a fusion model that seamlessly integrates diverse bio-inspired algorithms. Our novel embedding approach ensures the production of robust and high-quality cover images and disrupts bit sequences effectively, thereby enhancing resistance against potential attacks. We meticulously evaluate the performance of our method using a comprehensive dataset encompassing grayscale and JPEG color images. Our particular emphasis on color images arises from their superior capacity to conceal a greater volume of information. The results vividly demonstrate our approach's effectiveness in achieving secure and efficient data concealment within images.
引用
收藏
页码:82247 / 82280
页数:34
相关论文
共 37 条
[21]   Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm [J].
Mishra, Anurag ;
Agarwal, Charu ;
Sharma, Arpita ;
Bedi, Punam .
EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (17) :7858-7867
[22]  
Noida International University Department of Computer Science and Engineering NCR Delhi Noida India, 2019, International Journal of Computer Network and Information Security, V11, P11, DOI [10.5815/ijcnis.2019.01.02, 10.5815/ijcnis.2019.01.02, DOI 10.5815/IJCNIS.2019.01.02]
[23]   Steganography in Image Segments using Genetic Algorithm [J].
Nosrati, Masoud ;
Hanani, Ali ;
Karimi, Ronak .
2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, :102-107
[24]   Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography [J].
Pandey, Hari Mohan .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 :213-225
[25]   Optimization of Stego Image retaining secret information using Genetic Algorithm with 8-connected PSNR [J].
Roy, Rinita ;
Laha, Sumit .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :468-477
[26]  
Saritha M., 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), P584, DOI 10.1109/SCOPES.2016.7955506
[27]  
Sarmah D.K., 2020, Optimization models in steganography using metaheuristics
[28]   Information security management needs more holistic approach: A literature review [J].
Soomro, Zahoor Ahmed ;
Shah, Mahmood Hussain ;
Ahmed, Javed .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (02) :215-225
[29]  
Suraj A.Anoop., 2014, J ELECTR SYST INF TE, V1, P72, DOI [10.1016/j.jesit.2014.03.006, DOI 10.1016/J.JESIT.2014.03.006]
[30]   AEGA: enhanced feature selection based on ANOVA and extended genetic algorithm for online customer review analysis [J].
Tripathy, Gyananjaya ;
Sharaff, Aakanksha .
JOURNAL OF SUPERCOMPUTING, 2023, 79 (12) :13180-13209