An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms

被引:32
作者
Wazirali, Ranyiah [1 ]
Alasmary, Waleed [2 ]
Mahmoud, Mohamed M. E. A. [3 ]
Alhindi, Ahmad [1 ]
机构
[1] Umm Al Qura Univ, Dept Comp Sci, Mecca 21955, Saudi Arabia
[2] Umm Al Qura Univ, Dept Comp Engn, Mecca 21955, Saudi Arabia
[3] Tennessee Technol Univ, Dept Elect & Comp Engn, Cookeville, TN 38505 USA
来源
IEEE ACCESS | 2019年 / 7卷
基金
美国国家科学基金会;
关键词
Data hiding; embedding capacity; evolutionary optimization; genetic algorithms; least significant bits; LSB matching; steganography; IMAGE STEGANOGRAPHY; SCHEME; DOMAIN;
D O I
10.1109/ACCESS.2019.2941440
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In stenography, embedding data within an image has a trade-off between image quality and embedding capacity. Specifically, the more data are concealed within a carrier image, the further distortion the image suffers, causing a decline in the resultant stego image quality. Embedding high capacity of data into an image while preserving the quality of the carrier image can be seen as an optimization problem. In this paper, we propose a novel spatial steganography scheme using genetic algorithms (GAs). Our scheme utilizes new operations to increase least significant bits (LSB) matching between the carrier and the stego image which results in increased embedding capacity and reduced distortion. These operations are optimized pixel scanning in vertical and horizontal directions, circular shifting, flipping secret bits and secret data transposing. We formulate a general GA-based steganography model to search for the optimum solutions. Finally, we use LSB substitution for data embedding. We conduct extensive experimental testing of the proposed scheme and compare it to the state-of-art steganography schemes. The proposed scheme outperforms the relevant GA-based steganography methodologies.
引用
收藏
页码:133496 / 133508
页数:13
相关论文
共 46 条
  • [1] Ahrens K., 2004, Recent Advancement in Chinese Lexical Semantics: Proceedings of 5th Chinese Lexical Semantics Workshop (CLSW-5), P99
  • [2] [Anonymous], 2003, INTRO EVOLUTIONARY C
  • [3] [Anonymous], 2004, ORIGIN SPECIES
  • [4] Back T., 2018, Evolutionary computation 1: Basic algorithms and operators
  • [5] Bandyopadhyay SK., 2010, COMPUT INF SCI, V3, P229
  • [6] Carvajal-Gamez BE., 2013, INT J PHYS SCI, V8, P157, DOI [10.5897/IJPS12.516, DOI 10.5897/IJPS12.516]
  • [7] Hiding data in images by simple LSB substitution
    Chan, CK
    Cheng, LM
    [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
  • [8] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [9] Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275
  • [10] High payload steganography mechanism using hybrid edge detector
    Chen, Wen-Jan
    Chang, Chin-Chen
    Le, T. Hoang Ngan
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (04) : 3292 - 3301