Abstract
Image steganography is the art of hiding highly sensitive information onto the cover image. An ideal approach to image steganography must satisfy two factors: high quality of stego image and high embedding capacity. Conventionally, transform based techniques are widely preferred for these applications. The commonly used transforms for steganography applications are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) etc. In this work, frequency domain transforms such as Fresnelet Transform (FT) and Contourlet Transform (CT) are used for the data hiding process. The secret data is normally hidden in the coefficients of these transforms. However, data hiding in transform coefficients yield less accurate results since the coefficients used for data hiding are selected randomly. Hence, in this work, optimization techniques such as Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) are used for improving the performance of the steganography system. GA and PSO are used to find the best coefficients in order to hide the Quick Response (QR) coded secret data. This approach yields an average PSNR of 52.56 dB and an embedding capacity of 902,136 bits. These experimental results validate the practical feasibility of the proposed methodology for security applications.
Similar content being viewed by others
Abbreviations
- GA:
-
Genetic Algorithm
- PSO:
-
Particle Swarm Optimization
- QR:
-
Quick Response
- LSB:
-
Least Significant Bit
- DFT:
-
Discrete Fourier Transform
- DCT:
-
Discrete Cosine Transform
- DWT:
-
Discrete Wavelet Transform
- CT:
-
Contourlet Transform
- FT:
-
Fresnelet Transform
- PSNR:
-
Peak-Signal to Noise Ration
- MSE:
-
Mean Square Error
- TAF:
-
Tamper Assessment Factor
- NAE:
-
Normalized Absolute Error
References
Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124
Bajaj R, Bedi P, Pal SK (2010) Best hiding capacity scheme for variable length messages using particle swarm optimization. Proc SEMCCO, LNCS 6466:237–244
Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39:640–654
Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP (2009) A HDWT-based reversible data hiding method. J Syst Softw 82:411–421
Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786
Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography – survey and analysis of current methods. J Signal Process 90(3):752–825
Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106
El-Emam NN, RAS AL-Z (2013) New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. The J Syst Softw 86:1465–1481
Gerami P, Ibrahim S, Bashardoost M (2012) Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. Int. J. Comput Appl 55(2):0975–8887
Goldberg DE (1992) Genetic algorithms in search. Optimization and Machine Learning. Addison-Wesley, Reading, MA
Gonzalez R, Woods R (2005) Digital image processing, 2nd edn. PHI
Guillermito (2004) Chi-Square Steganography Test program. http://www.guillermito2.net/stegano/tools/index.html.
Hemalatha S, Acharya DU, Renuka A, Kamath PR (2013) A secure image steganography technique to hide multiple secret images. Computer Networks & Communications (NetCom) 131:613–620
Holland JH (1975) Adaptation in natural and Arti7cial systems, the university of Michigan press. MI, Ann Arbor
Liebling M, Blu T, Unser M (2003) Fresnelets: new multiresolution wavelet bases for digital holography. IEEE Trans Image Process 12(1):29–43
Lin YK (2012) High capacity reversible data hiding scheme based up on discrete cosine transformation. J Syst Softw 85:2395–2404
Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214
Nazeer M, Nargis B, Malik YM, Kim DG (2013) A fresnelet-based encryption of medical images using Arnold transform. Int J Adv Comput Sci Appl 4(3):131–146
Ranjbar S, Zargari F, Ghanbari M (2013) A highly robust two-stage contourlet-based digital image watermarking method. Signal Process Image Commun 28:1526–1536
Sadreazami H, Amini M (2012) A robust spread spectrum based image watermarking in ridgelet domain. Int J Electron Commun (AEÜ) 66:364–371
Sajedi H, Jamzad M (2009) Secure steganography based on embedding capacity. Int J Inf Secur 8:433–445
Sajedi H, Jamzad M (2010) Using contourlet transform and cover selection for secure steganography. Int J Inf Secur 9:337–352
Sharma V (2005) A study of malicious QR codes. Int J Comput intell Inf Secur 3(5):1–6
Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security 48:131–141
Tanga M, Hub J, Songa W (2014) A high capacity image steganography using multi-layer embedding. Optik 125:3972–3976
Wang X, Ding J, Pei Q (2015) A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf Sci 3(10):16–35
Yeh HL, Gue ST, Tsai P, Shih WK (2013) Wavelet bit-plane based data hiding for compressed images. Int J Electron Commun (AEU) 67:808–815
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Uma Maheswari, S., Jude Hemanth, D. Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76, 415–436 (2017). https://doi.org/10.1007/s11042-015-3035-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-3035-1