New Method of Image Steganography Based on Particle Swarm Optimization Algorithm in Spatial Domain for High Embedding Capacity

被引:24
作者
Mohsin, A. H. [1 ,2 ]
Zaidan, A. A. [1 ]
Zaidan, B. B. [1 ]
Albahri, O. S. [1 ]
Albahri, A. S. [3 ]
Alsalem, M. A. [4 ]
Mohammed, K., I [1 ]
Nidhal, Shahad [5 ]
Jalood, Nawar S. [6 ]
Jasim, Ali Najm [7 ]
Shareef, Ali H. [8 ]
机构
[1] Univ Pendidikan Sultan Idris, Fac Arts Comp & Creat Ind, Dept Comp, Tanjung Malim 35900, Malaysia
[2] Estab Martyrs, Presidency Minist, Baghdad 10096, Iraq
[3] Iraqi Commiss Comp & Informat, Baghdad 10096, Iraq
[4] Univ Mosul, Coll Adm & Econ, Dept Management Informat Syst, Mosul 41002, Iraq
[5] Dijlah Univ, Dept Comp Technol Engn, Baghdad 10022, Iraq
[6] Minist Educ, Nasiriyah 64001, Iraq
[7] Fdn Alshuhda, Nasiriyah 64001, Iraq
[8] Univ Thi Qar, Comp Sci & Math Coll, Dept Comp Sci, Nasiriyah 64001, Iraq
关键词
High capacity; image steganography; particle swarm optimisation; spatial domain; GENETIC ALGORITHM; MOSAIC IMAGE; HIDDEN DATA; INFORMATION; SCHEME; PSO; SEPARATION; PROTOCOL; NETWORK; FILE;
D O I
10.1109/ACCESS.2019.2949622
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography is a form of technology utilised to safeguard secret data during communication in addition to data repository. Numerous researchers have endeavoured to enhance the performance of steganography techniques through the development of an effective algorithm for the selection of the optimal pixel location within the host image for the concealment of secret bits, for the enhancement of the embedding capacity of the secret data, and for maintaining the visual quality of the host image (stego image) in an accepted rate after the concealment of the secret data. Therefore, steganography is perceived as a challenging task. Thus, the current study proposes a new technique for image steganography based on particle swarm optimisation (PSO) algorithm by using pixel selection for the concealment of a secret image in spatial domain, for the purpose of high embedment capacity. The stego possesses a high level of resistance against a steganalytic attack due to the security provided via image steganography. The function of PSO algorithm is to choose an optimal pixel in grey scale host image for the concealment of secret bits, as the PSO has the ability to achieve an efficient fitness calculation that depends on the cost matrix by dividing the host and secret images into four parts. First of all, the secret bits are modified, which are then embedded within the host image. Several locations in the host image are determined through the order of scanning the host pixels and starting point of the scanning for better least significant bits LSBs of each pixel. The PSO algorithm was utilised to ascertain the ideal initiating point and scanning order. Experimental results show that (1) the average peak signal to noise ratio PSNR value in the benchmark technique based on genetic algorithm for five standard stego images is 45.13%, whereas the result obtained from the recommended technique is 56.60%. (2) The proposed technique has an advantage over the benchmark with a percentage of 33.34%, which encompasses all associated issues within the checklist scenario. Therefore, the performance of the recommended technique is superior over existing techniques.
引用
收藏
页码:168994 / 169010
页数:17
相关论文
共 131 条
[1]  
Abomhara Mohamed, 2010, Journal of Applied Sciences, V10, P1656, DOI 10.3923/jas.2010.1656.1661
[2]  
Abomhara M., 2011, International Journal of the Physical Sciences, V6, P4053
[3]   A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm [J].
Ahmed M.A. ;
Kiah L.M. ;
Zaidan B.B. ;
Zaidan A.A. .
Journal of Applied Sciences, 2010, 10 (01) :59-64
[4]   Estimation of particle swarm distribution algorithms: Combining the benefits of PSO and EDAs [J].
Ahn, Chang Wook ;
An, Jinung ;
Yoo, Jae-Chern .
INFORMATION SCIENCES, 2012, 192 :109-119
[5]   Hiding data in video file: An overview [J].
Al-Frajat A.K. ;
Jalab H.A. ;
Kasirun Z.M. ;
Zaidan A.A. ;
Zaidan B.B. .
Journal of Applied Sciences, 2010, 10 (15) :1644-1649
[6]   A New System for Hidden Data within Header Space for EXE-File Using Object Oriented Technique [J].
AL-Nabhani, Yahya ;
Zaidan, A. A. ;
Zaidan, B. B. ;
Jalab, Hamid A. ;
Alanazi, Hamdan. O. .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, :9-13
[7]  
Al-Salhi YEA, 2017, INT CONF ADV COMMUN, P167, DOI 10.23919/ICACT.2017.7890078
[8]  
Alam GM, 2010, SCI RES ESSAYS, V5, P3254
[9]  
Alanazi H., 2010, J COMPUT, V2, P1
[10]   Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing [J].
Alanazi, H. O. ;
Zaidan, A. A. ;
Zaidan, B. B. ;
Kiah, M. L. Mat ;
Al-Bakri, S. H. .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)