Using PSO in Image Hiding Scheme Based on LSB Substitution

  • Punam Bedi
  • Roli Bansal
  • Priti Sehgal
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 192)


With the massive growth in internet applications, there is a continuous need of efficient steganography techniques for the purpose of secret data communication and for the authentication and ownership identification of host data. This paper presents an efficient image hiding scheme using Particle Swarm Optimization (PSO) in the spatial domain of digital images. The proposed technique uses PSO to find the best pixel locations in an image where the secret image pixel data can be embedded. This PSO algorithm uses the Structural similarity Index (SSIM) as the objective function which is based on the simple visual effect of the human visual perception capability. As a result, the pixel positions generated by the proposed method, when used for embedding secret image data, result in minimum distortion of the host image. The results of the proposed technique have been analyzed qualitatively and quantitatively and also compared with some recent LSB techniques. The results show better stego image quality along with high embedding capacity.


Steganography spatial domain particle swarm optimization image hiding 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information hiding techniques for Steganography and Digital Watermarking. Artech House Inc., Boston (2002)Google Scholar
  2. 2.
    Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital Image Steganography, Survey and Analysis of Current Methods. Signal Processing 90(3), 727–752 (2010)CrossRefzbMATHGoogle Scholar
  3. 3.
    Chang, C.C., Lin, M., Lu: A fast and secure image hiding scheme based on LSB substitution. J. Pattern Recognition and Artificial Intelligence 16(4), 319–416 (2002)Google Scholar
  4. 4.
    Xiaolong, L., Yang, B., Cheng, D., Zheng, T.: A Generalization of LSB Matching. IEEE Signal Processing Letters 16(2), 69–72 (2009)CrossRefGoogle Scholar
  5. 5.
    Wu, D.C., Tsei, W.H.: A Stegnographic method for images by pixel-value differencing. Pattern Recognition Letters 24, 1613–1626 (2003)CrossRefGoogle Scholar
  6. 6.
    Wang, C.M., Wu, N., Tsal, C.H., Hwang, M.S.: A high quality stegnographic method with pixel value differencing and modulus function. J. Systems and Software 81(1), 150–158 (2008)CrossRefGoogle Scholar
  7. 7.
    Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge areas of pixels with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security 3(3), 488–497 (2008)CrossRefGoogle Scholar
  8. 8.
    Chan, C.K., Heng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37, 469–474 (2004)CrossRefzbMATHGoogle Scholar
  9. 9.
    Wang, R.Z., Lin, C.F., Lin, J.C.: Image Hiding by Optimal LSB Substitution and Genetic Algorithm. Pattern Recognition 34, 671–683 (2001)CrossRefzbMATHGoogle Scholar
  10. 10.
    Khodaei, M., Faez, K.: Image Hiding by Using Genetic Algorithm and LSB Substitution. In: Elmoataz, A., Lezoray, O., Nouboud, F., Mammass, D., Meunier, J. (eds.) ICISP 2010. LNCS, vol. 6134, pp. 404–411. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Chang, C.C., Chan, C.S., Fan, Y.H.: Image Hiding scheme with Modulus Function and Dyanamic Programming Strategy on Partitioned pixels. Patt. Recog. 39, 1155–1167 (2006)CrossRefzbMATHGoogle Scholar
  12. 12.
    Bajaj, R., Bedi, P., Pal, S.K.: Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization. In: Panigrahi, B.K., Das, S., Suganthan, P.N., Dash, S.S. (eds.) SEMCCO 2010. LNCS, vol. 6466, pp. 230–237. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Barni, M., Bartiloni, F., Cappellini, V., Pivo, A.: A DCT domain system for robust image watermarking. Signal Processing 66, 357–372 (1998)CrossRefzbMATHGoogle Scholar
  14. 14.
    Woo, C.S., Du, J., Pham, B.: Performance Factors Analysis of a Wavelet based Watermarking Method. In: Australasian Information Security Workshop, AISW 2005 (2005)Google Scholar
  15. 15.
    Li, X., Wang, J.: A Stegnographic method based on JPEG and Particle Swarm Optimization algotithm. Pattern Recognition 177, 3099–3109 (2007)Google Scholar
  16. 16.
    Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence. John Wiley & Sons, Inc., West Sussex (2005)Google Scholar
  17. 17.
    Engelbrecht, A.P.: Computational Intelligence: An Introduction. John Wiley & Sons, Inc., West Sussex (2007)CrossRefGoogle Scholar
  18. 18.
    Wang, Z., Bovik, A.C.: A Universal Image Quality Index. IEEE Signal Processing Letters 9(3)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Punam Bedi
    • 1
  • Roli Bansal
    • 1
  • Priti Sehgal
    • 2
  1. 1.Department of Computer ScienceUniversity of DelhiDelhiIndia
  2. 2.Department of Computer Science, Keshav CollegeUniversity of DelhiDelhiIndia

Personalised recommendations