Genetic Algorithm based Approach to Select Suitable Cover Image for Image Steganography

Author(s):  
Pratik D. Shah ◽  
Rajankumar S. Bichkar
2021 ◽  
Vol 15 (3) ◽  
pp. 48-64
Author(s):  
Sabyasachi Pramanik ◽  
Debabrata Samanta ◽  
Samir Kumar Bandyopadhyay ◽  
Ramkrishna Ghosh

Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic algorithm (GA). They use PSO to take the enhanced version of cover image. They use BWT to choose the selective sub bands of cover image and we utilize GA to select a particular stego image among a set of stego images. Thus, an innovative technique of image steganography has been made to transmit confidential data via cover image generating stego image. This combinational approach of image steganography is quite safe for confidential data transmission and makes it hard for the attackers to retrieve the confidential data.


2020 ◽  
Author(s):  
Abdulkarem Almawgani ◽  
Adam Alhawari ◽  
Wlaed Alarashi ◽  
Ali Alshwal

Abstract Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high capacity of secret data and ensuring high security and quality of stego image is a major challenge. In this paper, a hybrid steganography method based on Haar Discrete Wavelet Transform (HDWT), Lempel Ziv Welch (LZW) algorithm, Genetic Algorithm (GA), and the Optimal Pixel Adjustment Process (OPAP) is proposed. The cover image is divided into non-overlapping blocks of nxn pixels. Then, the HDWT is used to increase the robustness of the stego image against attacks. In order to increase the capacity for, and security of, the hidden image, the LZW algorithm is applied on the secret message. After that, the GA is employed to give the encoded and compressed secret message cover image coefficients. The GA is used to find the optimal mapping function for each block in the image. Lastly, the OPAP is applied to reduce the error, i.e., the difference between the cover image blocks and the stego image blocks. This step is a further improvement to the stego image quality. The proposed method was evaluated using four standard images as covers and three types of secret messages. The results demonstrate higher visual quality of the stego image with a large size of embedded secret data than what is generated by already-known techniques. The experimental results show that the information-hiding capacity of the proposed method reached to 50% with high PSNR (52.83 dB). Thus, the herein proposed hybrid image steganography method improves the quality of the stego image over those of the state-of-the-art methods.


The growth rate of the Internet is exceeding that of any previous technology. As the Internet has become the major medium for transferring sensitive information, the security of the transferred message has now become the utmost priority. To ensure the security of the transmitted data, Image steganography has emerged out as an eminent tool of information hiding. The frequency of availability of image file is high and provides high capacity. In this paper, a method of secure data hiding in image is proposed that uses knight tour positions and further 8-queen positions in 8*8 pixel blocks.The cover image is divided into 8*8 pixel blocks and pixels are selected from each block corresponding to the positions of Knight in 8*8 chessboard starting from different pixel positions. 8-pixel values are selected from alternate knight position. Selected pixels values converted to 8-bit ASCII code and result in 8* 8 bit matrix. 8-Queen’s solution on 8*8 chessboard is applied on 8*8 bit matrix. The bits selected from 8-Queens positions and compared with 8-bit ASCII code of message characters. The proposed algorithm changes the LSB of only some of the pixels based on the above comparison. Based on parameters like PSNR and MSE the efficiency of the method is checked after implementation. Then the comparison done with some already proposed techniques. This is how, image steganography showed interesting and promising results when compared with other techniques.


Author(s):  
Anukul Pandey ◽  
Barjinder Singh Saini ◽  
Butta Singh ◽  
Neetu Sood

Signal processing technology comprehends fundamental theory and implementations for processing data. The processed data is stored in different formats. The mechanism of electrocardiogram (ECG) steganography hides the secret information in the spatial or transformed domain. Patient information is embedded into the ECG signal without sacrificing the significant ECG signal quality. The chapter contributes to ECG steganography by investigating the Bernoulli's chaotic map for 2D ECG image steganography. The methodology adopted is 1) convert ECG signal into the 2D cover image, 2) the cover image is loaded to steganography encoder, and 3) secret key is shared with the steganography decoder. The proposed ECG steganography technique stores 1.5KB data inside ECG signal of 60 seconds at 360 samples/s, with percentage root mean square difference of less than 1%. This advanced 2D ECG steganography finds applications in real-world use which includes telemedicine or telecardiology.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xinliang Bi ◽  
Xiaoyuan Yang ◽  
Chao Wang ◽  
Jia Liu

Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.


Author(s):  
Oluwaseun M. Alade ◽  
Elizabeth A. Amusan ◽  
Oluyinka T. Adedeji ◽  
Oluwaseun O. Alo

Steganography deals with the ways of hiding communicated data in such a way that it remains confidential. Finding best position inside cover image to embed text message, maintaining a reasonable trade-off between security, robustness, higher bit embedding rate and imperceptibility are some of the challenges of steganography system. Hence, this paper presents firefly algorithm for finding best positions inside cover image in order to embed text message into cover image using Pixel Value Differencing (PVD) technique. Four different cover image was used. Experimental result showed the cover image with selected location using firefly algorithm as well as the stego image using PVD technique. The stego image was evaluated using Peak Signal to Noise Ratio (PSNR) and Mean square Error (MSE).  Firefly Algorithm with PVD technique produced a promising result for image steganography.


Sign in / Sign up

Export Citation Format

Share Document