A Chaotic Steganography Method Using Ant Colony Optimization

  • Shahzad Alam
  • Tanvir Ahmad
  • M. N. Doja
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 695)


Since ancient times, there is a need to save data from third parties that spy on the data, leads to the practice of steganography to ensure data integrity and privacy. The advent in multimedia technologies and greater need for security has raised the popularity of image steganography. The traditional algorithm used for image steganography is the Least Significant Bit Method (LSB). A better strategy to overcome the LSB method is to hide data only in edge pixel of image. In this paper, first we apply the ant colony optimization (ACO) method to find edges of an image given by Xiaochen Liu et al. then will hide sensitive message in edges of image randomly to provide more security level. The edge detection technique and chaotic scheme-based steganography is introduced based on the ACO. This strategy efficiently finds the edges and does not attract much attraction compared to other traditional methods. Our result indicates the higher value of PSNR that shows the performance of the proposed algorithm.


Steganography Data hiding Edge detection Least Significant Bit (LSB) Pixel Ant colony optimization 


  1. 1.
    Chen, W.J., Chang, C.C., Le, T.H.N.: High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37(4), 3292–3301 (2010)CrossRefGoogle Scholar
  2. 2.
    Gu, J., Pan, Y., Wang, H.: Research on the improvement of image edge detection algorithm based on artificial neural network. Optik 126, 2974–2978 (2015)CrossRefGoogle Scholar
  3. 3.
    Alam, S., Kumar, V., Siddiqui, W.A., Ahmad, M.: Key-Dependent image steganography using edge detection. In: International Conference on Advanced Computing and Communication Technologies, pp. 85–88 (2014)Google Scholar
  4. 4.
    Verma, O.P., Sharma, R.: An optimal edge detection using universal law of gravity and ant colony algorithm. Inf. Commun. Technol (WICT) (2011)Google Scholar
  5. 5.
    Islam, S., Gupta, P.: Revisiting least two significant bits steganography. In: Paper presented a the 8th International Conference on Intelligent Information Processing (ICIIP), Seoul, Republic of Korea, pp. 90–93 (2013)Google Scholar
  6. 6.
    Modi, M.R., Islam, S., Gupta, P.: Huang, D.-S. Bevilacqua, V., Figueroa, J.C., Premaratne, P.: Edge Based Steganography on Colored Images. Lecture Notes in Computer Science: 9th International Conference on Intelligent Computing (ICIC), vol. 7995, pp. 593–600. Springer, Berlin (2013)CrossRefGoogle Scholar
  7. 7.
    Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. PAMI 8(6), 679–698 (1986)CrossRefGoogle Scholar
  8. 8.
    Liu, X., Fang, S.: A convenient and robust edge detection method based on ant colony optimizationGoogle Scholar
  9. 9.
    Ahmad, S.A,T., Doja, M.N.: A novel edge based chaotic steganography method using neural network. In: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, pp. 467–475Google Scholar
  10. 10.
    Tian, J., Yu, W., Xie, S.: An ant colony optimization algorithm for image edge detection. In: Evolutionary Computation, CEC 2008. (IEEE World Congress on Computational Intelligence) (2008).
  11. 11.
    Alam, S., et al.: Analysis of modified LSB approaches of hiding information in digital images. In: International Conference on Computational Intelligence and Communication Systems, pp. 280–285. IEEE (2013). ISBN: 978-1-4799-7633-1/14/2014 (HIS)Google Scholar
  12. 12.
    Alam, S., Zakariya, S.M., Akhtar, N.: Analysis of modified Triple-A steganography technique using Fisher Yates algorithm. In: International Conference on Hybrid Intelligent Systems. ISBN: 978-1-4799-7633-1/14/2014Google Scholar
  13. 13.
    Rafsanjani, M.K., et al.: Edge detection in digital images using Ant Colony Optimization. Comput. Sci. J. Moldova, 23(3), p. 69 (2015)Google Scholar
  14. 14.
    May, R.M.: Simple mathematical model with very complicated dynamics. Nature 261, 459–467 (1967)CrossRefGoogle Scholar
  15. 15.
    Alam, S., et al.: Digital Image Authentication and Encryption using Digital Signature. In: International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 332–336 (2015). Print ISBN: 978-1-4673-6911-4/15Google Scholar
  16. 16.
    Islam, S., Modi, M.R. Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Faculty of Engineering and Technology, Department of Computer EngineeringJamia Millia IslamiaDelhiIndia

Personalised recommendations