Improved Cohort Intelligence-A high capacity, swift and secure approach on JPEG image steganography

被引:13
作者
Sarmah, Dipti Kapoor [1 ]
Kulkarni, Anand J. [1 ,2 ]
机构
[1] Deemed Univ, Symbiosis Inst Technol Symbiosis Int, Pune 412115, Maharashtra, India
[2] Univ Windsor, Odette Sch Business, 401 Sunset Ave, Windsor, ON N9B 3P4, Canada
关键词
Information security; Cryptography; Steganography; JPEG compression; Grey scale image; Improved CI; OPTIMIZATION METHOD; GENETIC ALGORITHMS;
D O I
10.1016/j.jisa.2019.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the recent high level of information security was attained by combining the concepts of cryptography, steganography along with the nature inspired optimization algorithms. However, in today's world computational speed plays a vital role for the success of any scientific method. The optimization algorithms, such as cohort Intelligence with Cognitive Computing (CICC) and Modified-Multi Random Start Local Search (M-MRSLS) were already implemented and applied for JPEG image steganography for 8 x 8 as well as 16 x 16 quantization table, respectively. Although results were satisfactory in terms of image quality and capacity, the computational time was high for most of the test images. To overcome this challenge, the paper proposes modified version of cohort intelligence (CI) algorithm referred to as Improved Cohort Intelligence (CI). The Improved CI algorithm was considered as a cryptography technique and implemented to generate optimized cipher text. Improved CI algorithm was further employed for JPEG image steganography to propose a reversible data hiding scheme. Experimentation was done on grey scale image, of size 256 x 256; both for 8 x 8 and 16 x 16 quantization table. Results validation of the proposed work exhibited very encouraging improvements in the computational cost. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:90 / 106
页数:17
相关论文
共 67 条
[11]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[12]   What is cryptography? [J].
Coron, JS .
IEEE SECURITY & PRIVACY, 2006, 4 (01) :70-73
[13]  
Cuiling J, 2011, J NAT SCI, V16, P223
[14]   Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm [J].
Dhavle, Shreesh V. ;
Kulkarni, Anand J. ;
Shastri, Apoorva ;
Kale, Ishaan R. .
NEURAL COMPUTING & APPLICATIONS, 2018, 30 (01) :111-125
[15]   Ant colony optimization -: Artificial ants as a computational intelligence technique [J].
Dorigo, Marco ;
Birattari, Mauro ;
Stuetzle, Thomas .
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2006, 1 (04) :28-39
[16]   New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization [J].
El-Emam, Nameer N. .
COMPUTERS & SECURITY, 2015, 55 :21-45
[17]   Comparison among five evolutionary-based optimization algorithms [J].
Elbeltagi, E ;
Hegazy, T ;
Grierson, D .
ADVANCED ENGINEERING INFORMATICS, 2005, 19 (01) :43-53
[18]  
Fridrich J., 1999, WORKSH MULT SEC ACM
[19]   Image steganography based on Canny edge detection, dilation operator and hybrid coding [J].
Gaurav, Kumar ;
Ghanekar, Umesh .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :41-51
[20]  
Ghasemi E, 2012, LECT NOTES ELECT ENG, P110