Improved Cohort Intelligence-A high capacity, swift and secure approach on JPEG image steganography

被引:13
作者
Sarmah, Dipti Kapoor [1 ]
Kulkarni, Anand J. [1 ,2 ]
机构
[1] Deemed Univ, Symbiosis Inst Technol Symbiosis Int, Pune 412115, Maharashtra, India
[2] Univ Windsor, Odette Sch Business, 401 Sunset Ave, Windsor, ON N9B 3P4, Canada
关键词
Information security; Cryptography; Steganography; JPEG compression; Grey scale image; Improved CI; OPTIMIZATION METHOD; GENETIC ALGORITHMS;
D O I
10.1016/j.jisa.2019.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent high level of information security was attained by combining the concepts of cryptography, steganography along with the nature inspired optimization algorithms. However, in today's world computational speed plays a vital role for the success of any scientific method. The optimization algorithms, such as cohort Intelligence with Cognitive Computing (CICC) and Modified-Multi Random Start Local Search (M-MRSLS) were already implemented and applied for JPEG image steganography for 8 x 8 as well as 16 x 16 quantization table, respectively. Although results were satisfactory in terms of image quality and capacity, the computational time was high for most of the test images. To overcome this challenge, the paper proposes modified version of cohort intelligence (CI) algorithm referred to as Improved Cohort Intelligence (CI). The Improved CI algorithm was considered as a cryptography technique and implemented to generate optimized cipher text. Improved CI algorithm was further employed for JPEG image steganography to propose a reversible data hiding scheme. Experimentation was done on grey scale image, of size 256 x 256; both for 8 x 8 and 16 x 16 quantization table. Results validation of the proposed work exhibited very encouraging improvements in the computational cost. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:90 / 106
页数:17
相关论文
共 67 条
[1]   JPEG steganography: a performance evaluation of quantization tables [J].
Almohammad, Adel ;
Ghinea, Gheorghita ;
Hierons, Robert M. .
2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, :471-478
[2]  
[Anonymous], 1999, LECT NOTES COMPUTER, DOI DOI 10.1007/107197245
[3]   Extreme learning machine based optimal embedding location finder for image steganography [J].
Atee, Hayfaa Abdulzahra ;
Ahmad, Robiah ;
Noor, Norliza Mohd ;
Rahma, Abdul Monem S. ;
Aljeroudi, Yazan .
PLOS ONE, 2017, 12 (02)
[4]  
Awad Wasan Shaker, 2011, International Journal of Technology Diffusion, V2, P16, DOI 10.4018/jtd.2011010102
[5]   A Novel DWT based Image Securing Method using Steganography [J].
Baby, Della ;
Thomas, Jitha ;
Augustine, Gisny ;
George, Elsa ;
Michael, Neenu Rosia .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :612-618
[6]  
Baluja S., 2017, Adv. Neural Inf. Process. Syst, P1
[7]  
Bohme R., 2010, ADV STAT STEGANAL IN
[8]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[9]  
Chandramouli R, 2004, LECT NOTES COMPUT SC, V2939, P35
[10]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138