Abstract
This paper gives a novel and efficient steganography technique based on hybrid algorithms that improves the various important parameters like PSNR, MSE, IF, capacity, security. It increases the security of the confidential data by using the encryption method and give improved quality of stego images with less error rate. This paper utilizes a grouping of wavelet domain & Salp Swarm based Optimization Algorithm (SSOA) and proposed embedding process for increasing the payload capacity. Initially, the integer discrete wavelet transform is utilized to process the cover image and DWT to extract the hidden image accurately. Furthermore, an edge localization process is proposed to localize the edge region of detail bands efficiently, which can be done by SSO Algorithm. To enhance the quality of the stego pictures, a deep enhanced stacked auto encoder (DESAE) has been proposed. The evaluation result of this technique achieves good image quality and high security. Also, it increases the payload capacity of the existing methods, which confirms the superiority of the proposed method compared to previous related techniques.
Similar content being viewed by others
Data availability
The data that support the findings of this study are available from the first author upon reasonable request.
Code availability
The code is available from the first author upon reasonable request.
References
Bailey K, Curran K (2006) Erratum: an evaluation of image based steganography methods using visual inspection and automated detection techniques (multimedia tools and applications). Multimed Tools Appl 31(3):327
Bhat S, Kapoor V (2019) Secure and Efficient Data Privacy, Authentication and Integrity Schemes Using Hybrid Cryptography, vol. 870. Springer, Singapore
Biswas C, Gupta UD, Haque MM (2019) “An Efficient Algorithm for Confidentiality, Integrity and Authentication Using Hybrid Cryptography and Steganography,” 2nd Int. Conf Electr Comput Commun Eng ECCE 2019, pp. 1–5
Bukhari S, Arif MS, Anjum MR, Dilbar S (2017) “Enhancing security of images by Steganography and Cryptography techniques,” 2016 Sixth Int. Conf Innov Comput Technol (INTECH), 2016, pp. 531–534. https://doi.org/10.1109/INTECH.2016.7845050
Chauhan S, Jyotsna KJ, Doegar A (2017) “Multiple layer text security using variable block size cryptography and image steganography,” 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), 2017, pp. 1–7. https://doi.org/10.1109/CIACT.2017.7977303
Cogranne R, Giboulot Q, Patrick B (2021) Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector, in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1328–1343, 2022. https://doi.org/10.1109/TIFS.2021.3111713
Dhar PK, Kaium A, Shimamura T (2018) Image Steganography Based on Modified LSB Substitution Method and Data Mapping. Int J Comput Sci Netw 18(3):155–160
Dhawan S, Gupta R (2019) “Comparative Analysis of Domains of Technical Steganographic Techniques,” 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 2019, pp. 885–889
Dhawan S, Gupta R (2020) Analysis of various data security techniques of steganography : a survey. Inf Secur J A Glob Perspect 30(2):1–25
Dhawan S, Gupta R (2021) High-quality steganography scheme using hybrid edge detector and Vernam algorithm based on hybrid fuzzy neural network. Concurr Comput Pract Exp John Wiley Sons, Inc. 33(17):e6448
Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana A, Pani S (2021) SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT. IEEE Access 9:1–1
Febryan A, Purboyo TW, Saputra RE (2017) Steganography methods on text, audio, image and video: a survey. Int J Appl Eng Res 12(21):10485–10490
Geng J, Li W-CHM-W, Wang Y-T (2021) Chaos cloud quantum bat hybrid optimization algorithm. Nonlinear Dyn, Springer 103:1167–1193
Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An Adaptive Image Steganography Method Based on Histogram of Oriented Gradient and PVD-LSB Techniques, in IEEE Access, vol. 7, pp. 185189–185204, 2019, https://doi.org/10.1109/ACCESS.2019.2960254
Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map. Optik (Stuttg) 184(March):205–213
Horé A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. Proc - Int Conf Pattern Recognit:2366–2369
Hosam O (2019) Attacking Image Watermarking and Steganography - A Survey, International Journal of Information Technology and Computer Science(IJITCS), Vol.11, No.3, pp.23–37, 2019. https://doi.org/10.5815/ijitcs.2019.03.03
Irfan P, Prayudi Y, Riadi I (2015) Image encryption using combination of chaotic system and Rivers Shamir Adleman (RSA). Int J Comput Appl 123(6):11–16
Juhi S; Mukesh S (2021) “A Novel Method of high-Capacity Steganography Technique in Double Precision Images,” in 2021 International Conference on Computational Performance Evaluation (ComPE)
Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform. Cogn Syst Res 60:20–32
Kapoor R, Gupta R, Son LH, Jha S, Kumar R (2018) Boosting performance of power quality event identification with KL Divergence measure and standard deviation, Measurement, Volume 126, 2018, Pages 134-142, https://doi.org/10.1016/j.measurement.2018.05.053. (https://www.sciencedirect.com/science/article/pii/S0263224118304433)
Kovalchuk A, Izonin I, Gregush MM, Lotoshynska N (2019) An approach towards image encryption and decryption using quaternary fractional-linear operations. Procedia Comput Sci 160:491–496
Kovalchuk A, Izonin I, Gregush MM, Kustra N (2019) Information protection service using topological image coverage. Procedia Comput Sci 160:503–508
Kovalchuk A, Izonin I, Gregush MM, Riznyk O (2019) An efficient image encryption scheme using projective transformations. Procedia Comput Sci 160:584–589
Kumar V, Kumar D (2018) A modified DWT-based image steganography technique. Multimed Tools Appl 77(11):13279–13308
Kumar S, Dhaka V, Nolkha A (2019) Image Steganography Using LSB Substitution: A Comparative Analysis on Different Color Models. In: Smart Systems and IoT Innovations Computing. Springer, Singapore, pp 711–718
Liao X, Yu Y, Li B, Member S (2019) “A New Payload Partition Strategy in Color Image Steganography,” IEEE Trans. Circuits Syst. Video Technol, vol. PP, no. c, p. 1
Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems, Advances in Engineering Software, Volume 114, 2017, Pages 163–191, https://doi.org/10.1016/j.advengsoft.2017.07.002. (https://www.sciencedirect.com/science/article/pii/S0965997816307736)
Nipanikar SI et al (2018) A sparse representation based image steganography using particle swarm optimization and wavelet transform. Int J Comput Appl 771(4):2343–2356
Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) “Performance evaluation parameters of image steganography techniques,” Int Conf Res Adv Integr Navig Syst RAINS 2016, no. May 2018
Punyani P, Gupta R, Kumar A (2019) Neural networks for facial age estimation : a survey on recent advances. Artificial Intelligence Review, Springer, Netherlands
Saleh FAO, Marwa E, Abdelmgeid A, Aly (2016) Data security using cryptography and steganography. Int J Adv Comput Sci Appl 7(06):390–397
Sharma VK, Srivastava DK (2017) Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. Lect Notes Networks Syst 12:353–360
Song H, Tang G, Sun Y, Gao Z (2019) Security security measure for image steganography based on high dimensional KL divergence, Security and Communication Networks, vol. 2019, Article ID 3546367, 13 pages, 2019. https://doi.org/10.1155/2019/3546367
Tan J, Liao X, Liu J, Cao Y, Jiang H (2022) Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng 9(2):888–903
Veerashetty S, Patil NB (2019) “Manhattan distance-based histogram of oriented gradients for content-based medical image retrieval,” Int J Comput Appl, 43(9):924–930, https://doi.org/10.1080/1206212X.2019.1653011
Vishwas GK, Kini GNG (2019) “A Secured Steganography Algorithm for Hiding an Image in an Image,” Integr Intell Comput Commun Secur Stud Comput Intell, pp. 539–546
Zhang J, Zhao X, Xiaolei H, Zhang H (2021) Improving the robustness of JPEG steganography with robustness cost, in IEEE Signal Processing Letters, 29:164–168, 2022, https://doi.org/10.1109/LSP.2021.3129419
Zichen Zhang WCH (2021) “Application of variational mode decomposition and chaotic grey wolf optimizer with support vector regression for forecasting electric loads,” Knowledge-Based Syst, vol. 228
Acknowledgements
This work was supported by PMU Cybersecurity Center Research Grant (PCC-Grant-202222), Prince Mohammad Bin Fahd University, Kingdom of Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest/competing interests
The authors declare no conflict of interest.
Informed consent
None.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dhawan, S., Gupta, R., Bhuyan, H.K. et al. An efficient steganography technique based on S2OA & DESAE model. Multimed Tools Appl 82, 14527–14555 (2023). https://doi.org/10.1007/s11042-022-13798-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13798-9