Advertisement

Pattern Analysis and Applications

, Volume 22, Issue 1, pp 205–219 | Cite as

Optimal steganography with blind detection based on Bayesian optimization algorithm

  • Amir Masoud MolaeiEmail author
  • Ataollah Ebrahimzadeh
Industrial and commercial application
  • 75 Downloads

Abstract

An optimal steganography method is provided to embed the secret data into the low-order bits of host pixels. The main idea of the proposed method is that before the embedding process, the secret data are mapped to the optimal values using Bayesian optimization algorithm (along with introducing a novel mutation operator), in order to reduce the mean square error (MSE) and also maintain the structural similarity between the images before and after embedding (i.e., preserving the visual quality of the embedded-image). Then, the mapped data are embedded into the low-order bits of host pixels using modulus function and a systematic and reversible algorithm. Since the proposed method is able to embed data into more significant bits, it has enhanced the payload, while preserving the visual quality of the image. Extraction of data from the host image is possible without requiring the original image. The simulation results show that the proposed algorithm can lead to a minimum loss in MSE criterion and also a minimal reduction in visual quality of the image in terms of diagnostic criteria of the human eye, whereas there is no limitation on the improvement of payload, in comparison with other methods.

Keywords

Optimal steganography Bayesian optimization algorithm Optimal mapping vector Mutation 

Notes

References

  1. 1.
    Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New YorkzbMATHGoogle Scholar
  2. 2.
    Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proceedings of international conference on information systems, analysis and synthesis, pp 223–229Google Scholar
  3. 3.
    Wu M, Liu B (2003) Data hiding in image and video. I. Fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695MathSciNetGoogle Scholar
  4. 4.
    Wu M, Yu H, Liu B (2003) Data hiding in image and video. II. Designs and applications. IEEE Trans Image Process 12(6):696–705Google Scholar
  5. 5.
    Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331–339Google Scholar
  6. 6.
    Wang C-T, Yu H-F (2012) A Markov-based reversible data hiding method based on histogram shifting. J Vis Commun Image Represent 23(5):798–811Google Scholar
  7. 7.
    Naji A, Zaidan A, Zaidan B, Hameed SA, Khalifa OO (2009) Novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography. Int J Comput Sci Netw Secur 9(5):294–300Google Scholar
  8. 8.
    Ahadpour S, Majidpour M, Sadra Y (2012) Public key steganography using discrete cross-coupled chaotic maps. arXiv preprint arXiv:12110086
  9. 9.
    Alia MA, Yahya A (2010) Public–key steganography based on matching method. Eur J Sci Res 40(2):223–231Google Scholar
  10. 10.
    Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654MathSciNetzbMATHGoogle Scholar
  11. 11.
    Zou D, Shi YQ, Ni Z, Su W (2006) A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans Circuits Syst Video Technol 16(10):1294–1300Google Scholar
  12. 12.
    Dosselmann R, Yang XD (2005) Existing and emerging image quality metrics. In: 2005 Canadian conference on electrical and computer engineering. IEEE, pp 1906–1913Google Scholar
  13. 13.
    Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444Google Scholar
  14. 14.
    Wang Z, Bovik AC, Lu L (2002) Why is image quality assessment so difficult? In: 2002 IEEE international conference on acoustics, speech, and signal processing (ICASSP). IEEE, pp IV-3313–IV-3316Google Scholar
  15. 15.
    Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965Google Scholar
  16. 16.
    Winkler S, Susstrunk S (2004) Visibility of noise in natural images. In: 2004 international society for optics and photonics electronic imaging, pp 121–129Google Scholar
  17. 17.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612Google Scholar
  18. 18.
    Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Secur (IJCSS) 6(3):168–187Google Scholar
  19. 19.
    Motamedi H, Jafari A (2012) A new image steganography based on denoising methods in wavelet domain. In: 2012 9th international ISC conference on information security and cryptology (ISCISC). IEEE, pp 18–25Google Scholar
  20. 20.
    Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4):509–516Google Scholar
  21. 21.
    Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683zbMATHGoogle Scholar
  22. 22.
    Thien C-C, Lin J-C (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36(12):2875–2881zbMATHGoogle Scholar
  23. 23.
    Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167zbMATHGoogle Scholar
  24. 24.
    Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444Google Scholar
  25. 25.
    Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287Google Scholar
  26. 26.
    Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626zbMATHGoogle Scholar
  27. 27.
    Chang C-C, Kieu TD, Chou Y-C (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 international symposium on electronic commerce and security. IEEE, pp 16–21Google Scholar
  28. 28.
    Molaei AM, Sedaaghi MH, Ebrahimnezhad H (2014) a blind steganography based on Reed-Solomon codes and optimal substitution table with improving payload and robustness. Tabriz J Electr Eng 43(2):43–59 (In Persian) Google Scholar
  29. 29.
    Molaei A, Sedaaghi M, Ebrahimnezhad H (2017) Steganography scheme based on Reed-Muller code with improving payload and ability to retrieval of destroyed data for digital images. AUT J Electr Eng 49(1):53–62Google Scholar
  30. 30.
    Zhang Y, Jiang J, Zha Y, Zhang H, Zhao S (2013) Research on embedding capacity and efficiency of information hiding based on digital images. Int J Intell Sci 3(02):77Google Scholar
  31. 31.
    Jena B (2014) High payload digital image steganography using mixed edge detection mechanism. MTech thesis, National Institute of Technology Rourkela, India, Retrieved from http://ethesis.nitrkl.ac.in/6468/
  32. 32.
    Yin Z-X, Chang C-C, Xu Q, Luo B (2015) Second-order steganographic method based on adaptive reference matrix. IET Image Proc 9(4):300–305Google Scholar
  33. 33.
    Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783Google Scholar
  34. 34.
    Chang C-C, Chou Y-C, Kieu TD (2008) An information hiding scheme using Sudoku. In: 2008 3rd international conference on innovative computing information and control ICICIC’08. IEEE, p 17Google Scholar
  35. 35.
    Hong W, Chen T-S, Shiu C-W (2008) A minimal Euclidean distance searching technique for Sudoku steganography. In: 2008 international symposium on information science and engineering. IEEE, pp 515–518Google Scholar
  36. 36.
    Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:1Google Scholar
  37. 37.
    Yin Z, Luo B (2015) MDE-based image steganography with large embedding capacity. Secur Commun Netw 9(8):721–728Google Scholar
  38. 38.
    Ulker M, Arslan B (2018) A novel secure model: image steganography with logistic map and secret key. In: 2018 6th international symposium on digital forensic and security (ISDFS). IEEE, pp 1–5Google Scholar
  39. 39.
    Pelikan M (2005) Hierarchical Bayesian optimization algorithm. In: Hierarchical Bayesian optimization algorithm. Springer, pp 105–129Google Scholar
  40. 40.
    Kjaerulff UB, Madsen AL (2008) Bayesian networks and influence diagrams, vol 200. Springer, Berlin, p 114Google Scholar
  41. 41.
    Cooper GF (1990) The computational complexity of probabilistic inference using Bayesian belief networks. Artif Intell 42(2–3):393–405MathSciNetzbMATHGoogle Scholar
  42. 42.
    Heckerman D, Geiger D, Chickering DM (1995) Learning Bayesian networks: the combination of knowledge and statistical data. Mach Learn 20(3):197–243zbMATHGoogle Scholar
  43. 43.
    Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309–347zbMATHGoogle Scholar
  44. 44.
    Castillo E, Gutierrez JM, Hadi AS (2012) Expert systems and probabilistic network models. Springer, BerlinzbMATHGoogle Scholar
  45. 45.
    Pelikan M, Goldberg DE, Cantu-Paz E (2000) Linkage problem, distribution estimation, and Bayesian networks. Evol Comput 8(3):311–340Google Scholar
  46. 46.
    Ingemar JC, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann, BurlingtonGoogle Scholar
  47. 47.
    PourArian MR, Hanani A (2016) Blind steganography in color images by double wavelet transform and improved Arnold transform. Indones J Electr Eng Comput Sci 3(3):586–600Google Scholar
  48. 48.
    Jin Y, Olhofer M, Sendhoff B (2001) Dynamic weighted aggregation for evolutionary multi-objective optimization: Why does it work and how? In: Proceedings of the 3rd annual conference on genetic and evolutionary computation. Morgan Kaufmann Publishers Inc., pp 1042–1049Google Scholar
  49. 49.
    Da Ronco CC, Benini E (2014) A simplex-crossover-based multi-objective evolutionary algorithm. In: IAENG transactions on engineering technologies. Springer, pp 583–598Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2019

Authors and Affiliations

  1. 1.Faculty of Electrical and Computer EngineeringBabol Noshirvani University of TechnologyBabolIran

Personalised recommendations