Skip to main content

Advertisement

Log in

Random selection based GA optimization in 2D-DCT domain color image steganography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography, the hiding technique used to secure sensitive data (i.e., images, audio ) while communication takes place. In this paper, the message is embedded in color image in frequency domain exploiting Genetic Algorithm (GA) which provides the robustness i.e., the algorithm can withstand against any rigorous testing and brutal attack except destruction of the stego image. The fragmentation of 8-bit binary stream of each color component to 4-bit and applying Genetic Algorithm (GA) to increase the robustness of the scheme. Random Multiple bits are chosen to embed secret message which increases security along with the payload. The use of transform domain, hash function based random pixel and bit selections for data hiding, secrete data encryption and more over use of Genetic Algorithm (GA) for optimization is the novelty of the proposed work. Perspective and meticulous statistical analysis has been done to immune the algorithm from any attack. The algorithm proposed here is tested with benchmark tools like StirMark 4.0, Confusion Matrix (Receiver Operating Curve Characteristic (ROC) curve) along with steganalysis and statistical tools. Visual disturbance and distortion in stego image is also very insignificant here.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Cachin C An Information-Theoretic Model for Steganography, presented at the 2nd Workshop on Information Hiding. In: Aucsmith, D (ed) Lecture Notes in Computer Science, vol 1525. Springer

  2. Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit 36:1583–1595

    Article  Google Scholar 

  3. Chanu YJ, Singh M, Tuithung T (2012) Image steganography and steganalysis - a survey. Int J Comput Appl 52(2):1–11

    Google Scholar 

  4. Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009(1):658047

    Article  Google Scholar 

  5. Chen W-J, Chang C-C, Le Thn (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301

  6. Chen M, Boroumand M, Fridrich J (2018) Deep Learning Regressors for Quantitative Steganalysis. Media Watermarking, Security, and Forensics, pp 160-1-160-7(7)

  7. Chugh G, Yadav R, Saini R (2014) A new image steganographic approach based on mod factor for RGB images. Int J Signal Process Image Process Pattern Recogn 7 (3):27–44

    Google Scholar 

  8. Das S, Muhammad K, Bakshi S, Mukherjee I, Sa PK, Sangaiah AK, Bruno A (2018) Lip Biometric Template Security Framework Using Spatial Steganography, Pattern Recognition Letters. ISSN: 0167-8655

  9. Datta B, Roy S, Roy S, Bandyopadhyay SK (2018) Multi-bit robust image steganography based on modular arithmetic, Multimedia Tools and Applications. ISSN: 1380-7501

  10. Dumitrescu S, Wu X, Memon N (2002) On Steganalysis of Random LSB Embedding in Continuous-tone Images. IEEE ICIP 2002, New York, vol III, pp 641–644

  11. Dumitrescu S, Wu X, Wang Z (2002) Information hiding, 5th international workshop, volume 2578 of lecture notes in computer science, Noordwijkerhout The Netherlands. Springer, New York, pp 355–372. In: Petitcolas FAP (ed)

  12. Fan J, Upadhye S, Worster A (2006) Understanding receiver operating characteristic (ROC) curves. Can J Emerg Med (CJEM) 8(1):19–20. PubMed PMID: 17175625

    Google Scholar 

  13. He J, Lan W, Tang S (2017) A secure image sharing scheme with high quality stego-images based on steganography, Multimedia Tools and Applications, ISSN: 1380-7501 (Print) 1573-7721 (Online), vol 76, no 6, pp 7677–7698

  14. Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524

    Article  Google Scholar 

  15. Johnson NF, Jajodia S (1998) Steganalysis of Images Created using Current Steganographic Software. Inf Hiding 1525:273–289

    Article  Google Scholar 

  16. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41:6123–6130

    Article  Google Scholar 

  17. Kim C, Shin D, Shin D, Zhang X (2011) Improved steganographic embedding exploiting modification direction in multimedia communications. In: FTRA International Conference on Secure and Trust Computing, Data Management and Application. Springer, pp 130–138

  18. Kim C (2014) Data hiding by an improved exploiting modification direction. Multimed Tools Appl 69(3):569–584

    Article  Google Scholar 

  19. Lee C-F, Chang C-C, Wang K-H (2008) An improvement of emd embedding method for large payloads by pixel segmentation strategy. Image Vis Comput 26 (12):1670–1676

    Article  Google Scholar 

  20. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554

    Google Scholar 

  21. Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76 (1):333–354

    Article  Google Scholar 

  22. Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition, 2010 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, pp 467–471

  23. Li X, Yang B, Cheng D, Zeng T (2009) A generalization of LSB matching. IEEE Signal Process Lett 16:69–72

    Article  Google Scholar 

  24. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58(C):146–156. ISSN:0923-5965

    Article  Google Scholar 

  25. Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050. ISSN: 1380-7501

    Article  Google Scholar 

  26. Lin C-C (2011) An information hiding scheme with minimal image distortion. Comput Stand Interfaces 33(5):477–484. ISSN: 0920-5489

    Article  Google Scholar 

  27. Lin Y-T, Wang C-M, Chen W-S, Lin F-P, Lin W (2017) A novel data hiding algorithm for high dynamic range images. IEEE Trans Multimed 19(1):196–211

    Article  Google Scholar 

  28. Michalewicz Z (1996) Genetic Algorithms + Data Structures = Evolution Programs. Springer, Berlin. ISBN 978-3540606765

  29. Mitchell M (1996) An Introduction to Genetic Algorithms. MIT Press, Cambridge. ISBN 9780585030944

  30. Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans Internet Inf Syst 9:1938–1962

    Google Scholar 

  31. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A Novel Magic LSB Substitution Method (m-LSB-SM) using Multi-Level Encryption and Achromatic Component of an Image. J Multimed Tools Appl Arch 75(22):14867–14893

    Article  Google Scholar 

  32. Mukherjee (Ganguly) N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77(14):18451–18481

    Article  Google Scholar 

  33. Petitcolas FAP, Anderson JR, Kuhn GM (1998) Attacks on copyright marking systems Aucsmith D (ed)

  34. Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques, IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India. ISBN: 978-1-5090-1112-4

  35. Stirmark[online]. Available at http://www.petitcolas.net/fabien/watermarking/stirmark/

  36. Stinson DR (2005) Cryptography: Theory and practice, 3rd edn. CRC Press

  37. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34(2):142–151

    Google Scholar 

  38. Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 34:671–683

    Article  Google Scholar 

  39. Wang H, Wang S (2004) Cyber Warfare: Steganography vs. Steganalysis. Commun ACM 47(10):76–82

    Article  Google Scholar 

  40. Weiqi L, Fangjun H, Jiwu H (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensic Secur 5:201–214

    Article  Google Scholar 

  41. Wong K, Qi X, Tanaka K (2007) A DCT-based Mod4 steganographic method. Signal Process 87:1251–1263

    Article  Google Scholar 

  42. Xu G, Wu H-Z, Shi YQ (2016) Ensemble of CNNs for steganalysis: An empirical study. In: Perez-Gonzales F, Cayre F, Bas P (eds) The 4th ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec ’16, Vigo, pp 5–10

  43. Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712

    Article  Google Scholar 

  44. Xu G, Stamm M, Kirchner M, Voloshynovskiy S (2017) Deep convolutional neural network to detect j-UNIWARD, The 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia

  45. Yang CY, Wang WF (2015) Block-Based Colour Image Steganography Using Smart Pixel-Adjustment. In: Proceedings of Genetic and Evolutionary Computing, Advances in Intelligent Systems and Computing. Springer, Cham, vol 329, pp 145–154

  46. Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensic Secur 12(11):2545–2557

    Article  Google Scholar 

  47. Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882

    Article  Google Scholar 

  48. Zhang X, Wang S (2006) Dynamical running coding in digital steganography. IEEE Signal Process Lett 13(3):165–168

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajib Biswas.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Biswas, R., Bandyapadhay, S.K. Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79, 7101–7120 (2020). https://doi.org/10.1007/s11042-019-08497-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08497-x

Keywords

Navigation