Skip to main content

Advertisement

Log in

Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Internet is used for exchanging information. Sometimes it is required to transmit confidential data over the internet. Here the authors use image steganography to embed confidential data within a cover image. To construct the technique, this article combines the help of Particle Swarm Optimization (PSO), Bi-Orthogonal Wavelet Transform (BWT) and Genetic Algorithm (GA). PSO is included to take the enhanced version of the host image. The enhanced version of the host images is more sharp and bright. Bi-Orthogonal Wavelet Transform is included to choose the selective sub-bands of the host image. Genetic Algorithm is used to select the fittest hidden image among a set of hidden images which are created after mutation. Later, the hidden image would produce a confidential password using an innovative technique. Thus an innovative technique of image steganography is introduced to transmit confidential data in a cover image. This combinational approach of image steganography is quite safe for confidential data transmission and really difficult for the attackers to retrieve the confidential data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Amsaveni A, Vanathi PT (2015) A comprehensive study on image steganography and Steganalysis techniques. Int J Inf Commun Technol 7(4/5):406–424

    Google Scholar 

  2. Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39:640–654

    Article  Google Scholar 

  3. Bhuiyan SSN, Malek NA, Othman Omran Khalifa OO, Rahman FDA (2018) An Improved Image Steganography Algorithm based on PVD. Indonesian Journal of Electrical Engineering and Computer Science 10(2):569–577. https://doi.org/10.11591/ijeecs.v10.i2.pp569-577

    Article  Google Scholar 

  4. Carvalho RLD, Silva WGD, Morais AHOD (2017) Optimizing image steganography using particle swarm optimization algorithm. Int J Comput Appl 164(7):1–5. https://doi.org/10.5120/ijca2017913686

    Article  Google Scholar 

  5. Chen L, Hu R, Liang C, Li Q, Han Z (2015) A novel face super resolution approach for Noisy images using contour feature and standard deviation prior. Multimed Tools Appl 76(2):2467–2493

    Article  Google Scholar 

  6. Fakhredanesh M, Rahmati M, Safabakhsh R (2019) Steganography in discrete wavelet transform based on human visual system and cover model. Multimed Tools Appl 78(13):18475–18502

    Article  Google Scholar 

  7. Ghasemi E, Shanbehzadeh J, Fassihi N (2012) High capacity image steganography based on genetic algorithm and wavelet transform, Intelligent Control and Innovative Computing, pp. 395-404, lecture notes in electrical engineering 110, 10.1007/978-1-4614-1695-1 30

  8. Gu X, Sun Y (2018) Image transformation and information hiding technology based on genetic algorithm. EURASIP Journal on Image and Video Processing 2018:1–10. https://doi.org/10.1186/s13640-018-0348-9

    Article  Google Scholar 

  9. Hemnath DJ, Anitha J, Popescu DE, Son LH (2018) A modified genetic algorithm for performance improvement of transform based image steganography systems. J Intell Fuzzy Syst 35(1):197–209. https://doi.org/10.3233/JIFS-169580

    Article  Google Scholar 

  10. Hemnath DJ, Umamaheswari S, Popescu DE, Antoanela N (2016) Application of genetic algorithm and particle swarm optimization techniques for improved image steganography systems. Open Physics 14:452–462. https://doi.org/10.1515/phys-2016-0052

    Article  Google Scholar 

  11. Kaur S, Jindal S (2017) Improve image steganography using random password generation for secure transmission of data. Proceedings of 5th International Conference on Advancements of Engineering & Technology

  12. Kuar A, Kaur R, Kumar N (2015) Image steganography using discrete wavelet transform and artificial bee Colony optimization, 1st International Conference on Next Generation Computing Technologies, 10.1109/NGCT.2015.7375269

  13. Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279–13308. https://doi.org/10.1007/s11042-017-4947-8

    Article  Google Scholar 

  14. Lorente AS, Berres S (2017) A secure Steganographic algorithm based on frequency domain for the transmission of hidden information. Security and Communication Networks. https://doi.org/10.1155/2017/5397082

  15. Maheswari SU, Hemanth DJ (2015) Performance Enhanced Image Steganography Systems using Transforms and Optimization Techniques. Multimed Tools Appl 76(1):415–436

    Article  Google Scholar 

  16. Nosrati M, Hanani A, Karimi R (2015) Steganography in image segments using genetic algorithm. Fifth International Conference on Advanced Computing & Communication Technologies. https://doi.org/10.1109/acct.2015.57

  17. Pramanik S, Bandyopadhyay SK (2013) Application of steganography in symmetric key cryptography with genetic algorithm. Int J Comput Technol 10(7):1791–1799. https://doi.org/10.24297/ijct.v10i7.7027

    Article  Google Scholar 

  18. Pramanik S, Bandyopadhyay SK (2014) Image steganography using wavelet transform and genetic algorithm. International Journal of Innovative Research in Advanced Engineering 1(1):17–20

    Google Scholar 

  19. Pramanik S, Singh RP, Ghosh R (2019) A New Encrypted Method in Image Steganography. Indonesian Journal of Electrical Engineering and Computer Science 14(3):1412–1419. https://doi.org/10.11591/ijeecs.v13.i3.pp1412-1419

    Article  Google Scholar 

  20. Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A New Adaptive Image Steganography Scheme based on DCT and Chaotic Map. Multimed Tools Appl 76(11):13493–13510

    Article  Google Scholar 

  21. Sanjutha MK (2018) An image steganography using particle swarm optimization and transform domain. International Journal of Engineering and Technology 7(2.24):474–477

    Article  Google Scholar 

  22. Sung J, Choi BY, Ha YH (2014) Image Thresholding using standard deviation. Proceedings of SPIE - The International Society for Optical Engineering 9024. https://doi.org/10.1117/12.2040990

  23. Sweldens W (1996) The lifting scheme: a custom design construction of biorthogonal wavelets. Appl Comput Harmon Anal 3(2):186–200

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sabyasachi Pramanik.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pramanik, S., Singh, R.P. & Ghosh, R. Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. Multimed Tools Appl 79, 17463–17482 (2020). https://doi.org/10.1007/s11042-020-08676-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08676-1

Keywords

Navigation