A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

被引:37
作者
Hameed M.A. [1 ]
Abdel-Aleem O.A. [1 ]
Hassaballah M. [2 ,3 ]
机构
[1] Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor
[2] College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, AlKharj
[3] Department of Computer Science, Faculty of Computers and Information, South Valley University, Qena
关键词
Data hiding; Data security; Image steganography; Metaheuristic; Optimization algorithms;
D O I
10.1007/s12652-022-04366-y
中图分类号
学科分类号
摘要
With remarkable information technology development, information security has become a major concern in the communication environment, where security must be performed for the multimedia messages exchanged between the sender and the intended recipient. Digital multimedia steganography techniques have been developed to attain a security for covert communication and secure data. This paper proposes an approach for image steganography using the Least Significant Bit Substitution (LSB) and Nature-Inspired Harris Hawks Optimization (HHO) algorithm for efficient concealing of the secret data inside a cover image; thus providing high confidentiality. The HHO based data encoding operation uses the PSNR visual quality metric as an objective function. The objective function is used to determine the ideal encoding vector to convert the secret message to its encoded form. The proposed approach performs better than other state-of-the-art methods in terms of standard measures of visual quality with maintaining high embedding capacity. Comparisons with existing LSB or multi-directional PVD embedding methods demonstrate that the proposed method has more optimized and higher embedding capacity with maintaining visual quality. Besides, the proposed approach achieves high security against statistical StegoExpose analysis, ALASKA2 deep learning steganalysis, and image processing attacks. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
引用
收藏
页码:4639 / 4657
页数:18
相关论文
共 67 条
[1]  
Almawgani A., Alhawari A.R., Hindi A.T., Al-Arashi W.H., Al-Ashwal A., Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data, Multidimensional Syst Signal Process, 33, pp. 1-18, (2022)
[2]  
Amirtharajan R., Rayappan J.B.B., An intelligent chaotic embedding approach to enhance stego-image quality, Inf Sci, 193, pp. 115-124, (2012)
[3]  
Bao Z., Guo Y., Li X., Zhang Y., Xu M., Luo X., A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients, J Ambient Intell Humaniz Comput, 11, 5, pp. 1889-1901, (2021)
[4]  
Bedi P., Bansal R., Sehgal P., Using PSO in a spatial domain based image hiding scheme with distortion tolerance, Comput Electr Eng, 39, 2, pp. 640-654, (2013)
[5]  
StegExpose—a Tool for Detecting LSB Steganography., (2014)
[6]  
Chan C.-K., Cheng L.-M., Hiding data in images by simple LSB substitution, Pattern Recogn, 37, 3, pp. 469-474, (2004)
[7]  
Chang C.-C., Hsiao J.-Y., Chan C.-S., Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy, Pattern Recogn, 36, 7, pp. 1583-1595, (2003)
[8]  
Chang C.-C., Chan C.-S., Fan Y.-H., Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels, Pattern Recogn, 39, 6, pp. 1155-1167, (2006)
[9]  
Chaumont M., Deep learning in steganography and steganalysis, Digital media steganography: principles, algorithms, and advances, pp. 321-349, (2020)
[10]  
Cogranne R., Giboulot Q., Bas P., The ALASKA steganalysis challenge: A first step towards steganalysis, In: ACM Workshop on Information Hiding and Multimedia Security, pp. 125-137, (2019)