Skip to main content
Log in

An efficient steganography technique based on S2OA & DESAE model

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper gives a novel and efficient steganography technique based on hybrid algorithms that improves the various important parameters like PSNR, MSE, IF, capacity, security. It increases the security of the confidential data by using the encryption method and give improved quality of stego images with less error rate. This paper utilizes a grouping of wavelet domain & Salp Swarm based Optimization Algorithm (SSOA) and proposed embedding process for increasing the payload capacity. Initially, the integer discrete wavelet transform is utilized to process the cover image and DWT to extract the hidden image accurately. Furthermore, an edge localization process is proposed to localize the edge region of detail bands efficiently, which can be done by SSO Algorithm. To enhance the quality of the stego pictures, a deep enhanced stacked auto encoder (DESAE) has been proposed. The evaluation result of this technique achieves good image quality and high security. Also, it increases the payload capacity of the existing methods, which confirms the superiority of the proposed method compared to previous related techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

The data that support the findings of this study are available from the first author upon reasonable request.

Code availability

The code is available from the first author upon reasonable request.

References

  1. Bailey K, Curran K (2006) Erratum: an evaluation of image based steganography methods using visual inspection and automated detection techniques (multimedia tools and applications). Multimed Tools Appl 31(3):327

    Article  Google Scholar 

  2. Bhat S, Kapoor V (2019) Secure and Efficient Data Privacy, Authentication and Integrity Schemes Using Hybrid Cryptography, vol. 870. Springer, Singapore

    Google Scholar 

  3. Biswas C, Gupta UD, Haque MM (2019) “An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography,” 2nd Int. Conf Electr Comput Commun Eng ECCE 2019, pp. 1–5

  4. Bukhari S, Arif MS, Anjum MR, Dilbar S (2017) “Enhancing security of images by Steganography and Cryptography techniques,” 2016 Sixth Int. Conf Innov Comput Technol (INTECH), 2016, pp. 531–534. https://doi.org/10.1109/INTECH.2016.7845050

  5. Chauhan S, Jyotsna KJ, Doegar A (2017) “Multiple layer text security using variable block size cryptography and image steganography,” 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), 2017, pp. 1–7. https://doi.org/10.1109/CIACT.2017.7977303

  6. Cogranne R, Giboulot Q, Patrick B (2021) Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector, in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1328–1343, 2022. https://doi.org/10.1109/TIFS.2021.3111713

  7. Dhar PK, Kaium A, Shimamura T (2018) Image Steganography Based on Modified LSB Substitution Method and Data Mapping. Int J Comput Sci Netw 18(3):155–160

    Google Scholar 

  8. Dhawan S, Gupta R (2019) “Comparative Analysis of Domains of Technical Steganographic Techniques,” 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 2019, pp. 885–889

  9. Dhawan S, Gupta R (2020) Analysis of various data security techniques of steganography : a survey. Inf Secur J A Glob Perspect 30(2):1–25

    Google Scholar 

  10. Dhawan S, Gupta R (2021) High-quality steganography scheme using hybrid edge detector and Vernam algorithm based on hybrid fuzzy neural network. Concurr Comput Pract Exp John Wiley Sons, Inc. 33(17):e6448

    Google Scholar 

  11. Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana A, Pani S (2021) SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT. IEEE Access 9:1–1

    Article  Google Scholar 

  12. Febryan A, Purboyo TW, Saputra RE (2017) Steganography methods on text, audio, image and video: a survey. Int J Appl Eng Res 12(21):10485–10490

    Google Scholar 

  13. Geng J, Li W-CHM-W, Wang Y-T (2021) Chaos cloud quantum bat hybrid optimization algorithm. Nonlinear Dyn, Springer 103:1167–1193

    Article  Google Scholar 

  14. Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques, in IEEE Access, vol. 7, pp. 185189–185204, 2019, https://doi.org/10.1109/ACCESS.2019.2960254

  15. Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik (Stuttg) 184(March):205–213

    Article  Google Scholar 

  16. Horé A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. Proc - Int Conf Pattern Recognit:2366–2369

  17. Hosam O (2019) Attacking Image Watermarking and Steganography - A Survey, International Journal of Information Technology and Computer Science(IJITCS), Vol.11, No.3, pp.23–37, 2019. https://doi.org/10.5815/ijitcs.2019.03.03

  18. Irfan P, Prayudi Y, Riadi I (2015) Image encryption using combination of chaotic system and Rivers Shamir Adleman (RSA). Int J Comput Appl 123(6):11–16

    Google Scholar 

  19. Juhi S; Mukesh S (2021) “A Novel Method of high-Capacity Steganography Technique in Double Precision Images,” in 2021 International Conference on Computational Performance Evaluation (ComPE)

  20. Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20–32

    Article  Google Scholar 

  21. Kapoor R, Gupta R, Son LH, Jha S, Kumar R (2018) Boosting performance of power quality event identification with KL Divergence measure and standard deviation, Measurement, Volume 126, 2018, Pages 134-142, https://doi.org/10.1016/j.measurement.2018.05.053. (https://www.sciencedirect.com/science/article/pii/S0263224118304433)

  22. Kovalchuk A, Izonin I, Gregush MM, Lotoshynska N (2019) An approach towards image encryption and decryption using quaternary fractional-linear operations. Procedia Comput Sci 160:491–496

    Article  Google Scholar 

  23. Kovalchuk A, Izonin I, Gregush MM, Kustra N (2019) Information protection service using topological image coverage. Procedia Comput Sci 160:503–508

    Article  Google Scholar 

  24. Kovalchuk A, Izonin I, Gregush MM, Riznyk O (2019) An efficient image encryption scheme using projective transformations. Procedia Comput Sci 160:584–589

    Article  Google Scholar 

  25. Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279–13308

    Article  Google Scholar 

  26. Kumar S, Dhaka V, Nolkha A (2019) Image Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models. In: Smart Systems and IoT Innovations Computing. Springer, Singapore, pp 711–718

    Google Scholar 

  27. Liao X, Yu Y, Li B, Member S (2019) “A New Payload Partition Strategy in Color Image Steganography,” IEEE Trans. Circuits Syst. Video Technol, vol. PP, no. c, p. 1

  28. Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems, Advances in Engineering Software, Volume 114, 2017, Pages 163–191, https://doi.org/10.1016/j.advengsoft.2017.07.002. (https://www.sciencedirect.com/science/article/pii/S0965997816307736)

  29. Nipanikar SI et al (2018) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Int J Comput Appl 771(4):2343–2356

    Google Scholar 

  30. Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) “Performance evaluation parameters of image steganography techniques,” Int Conf Res Adv Integr Navig Syst RAINS 2016, no. May 2018

  31. Punyani P, Gupta R, Kumar A (2019) Neural networks for facial age estimation : a survey on recent advances. Artificial Intelligence Review, Springer, Netherlands

    Google Scholar 

  32. Saleh FAO, Marwa E, Abdelmgeid A, Aly (2016) Data security using cryptography and steganography. Int J Adv Comput Sci Appl 7(06):390–397

    Google Scholar 

  33. Sharma VK, Srivastava DK (2017) Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. Lect Notes Networks Syst 12:353–360

    Article  Google Scholar 

  34. Song H, Tang G, Sun Y, Gao Z (2019) Security security measure for image steganography based on high dimensional KL divergence, Security and Communication Networks, vol. 2019, Article ID 3546367, 13 pages, 2019. https://doi.org/10.1155/2019/3546367

  35. Tan J, Liao X, Liu J, Cao Y, Jiang H (2022) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888–903

    Article  Google Scholar 

  36. Veerashetty S, Patil NB (2019) “Manhattan distance-based histogram of oriented gradients for content-based medical image retrieval,” Int J Comput Appl, 43(9):924–930, https://doi.org/10.1080/1206212X.2019.1653011

  37. Vishwas GK, Kini GNG (2019) “A Secured Steganography Algorithm for Hiding an Image in an Image,” Integr Intell Comput Commun Secur Stud Comput Intell, pp. 539–546

  38. Zhang J, Zhao X, Xiaolei H, Zhang H (2021) Improving the robustness of JPEG steganography with robustness cost, in IEEE Signal Processing Letters, 29:164–168, 2022, https://doi.org/10.1109/LSP.2021.3129419

  39. Zichen Zhang WCH (2021) “Application of variational mode decomposition and chaotic grey wolf optimizer with support vector regression for forecasting electric loads,” Knowledge-Based Syst, vol. 228

Download references

Acknowledgements

This work was supported by PMU Cybersecurity Center Research Grant (PCC-Grant-202222), Prince Mohammad Bin Fahd University, Kingdom of Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ravi Vinayakumar.

Ethics declarations

Conflicts of interest/competing interests

The authors declare no conflict of interest.

Informed consent

None.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dhawan, S., Gupta, R., Bhuyan, H.K. et al. An efficient steganography technique based on S2OA & DESAE model. Multimed Tools Appl 82, 14527–14555 (2023). https://doi.org/10.1007/s11042-022-13798-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13798-9

Keywords

Navigation