An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method

被引:41
作者
Sajasi, Sara [1 ]
Moghadam, Amir-Masoud Eftekhari [1 ]
机构
[1] Islamic Azad Univ, Qazvin Branch, Fac Comp & Informat Technol Engn, Qazvin, Iran
关键词
Image steganography; Noise Visibility Function (NVF); Hybrid GA/PSO algorithm; Human Visual Sensitivity (HVS); Least Significant Bit (LSB); Cryptography; DIGITAL IMAGES; HIDING SCHEME; SUBSTITUTION; ALGORITHM; ROBUST; PSO;
D O I
10.1016/j.asoc.2015.01.032
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm ( GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:375 / 389
页数:15
相关论文
共 54 条
[31]   Color image encryption based on Coupled Nonlinear Chaotic Map [J].
Mazloom, Sahar ;
Eftekhari-Moghadam, Amir Masud .
CHAOS SOLITONS & FRACTALS, 2009, 42 (03) :1745-1754
[32]  
Provos N., 2001, Proceedings of the 10th conference on USENIX Security Symposium, P24
[33]  
Sarkar A., 2008, P SPIE SEC STEG WAT
[34]   Robust image-adaptive data hiding using erasure and error correction [J].
Solanki, K ;
Jacobsen, N ;
Madhow, U ;
Manjunath, BS ;
Chandrasekaran, S .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (12) :1627-1639
[35]  
Solanki K, 2007, LECT NOTES COMPUT SC, V4567, P16
[36]   BPCS steganography using EZW lossy compressed images [J].
Spaulding, J ;
Noda, H ;
Shirazi, MN ;
Kawaguchi, E .
PATTERN RECOGNITION LETTERS, 2002, 23 (13) :1579-1587
[37]   Steganography in JPEG2000 compressed images [J].
Su, PC ;
Kuo, CCJ .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) :824-832
[38]   A steganographic scheme by fully exploiting modification directions [J].
The Duc Kieu ;
Chang, Chin-Chen .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (08) :10648-10657
[39]   A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function [J].
Thien, CC ;
Lin, JC .
PATTERN RECOGNITION, 2003, 36 (12) :2875-2881
[40]  
TURNER LF, 1989, Patent No. 8908915