Skip to main content

Advertisement

Log in

Performance enhanced image steganography systems using transforms and optimization techniques

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Image steganography is the art of hiding highly sensitive information onto the cover image. An ideal approach to image steganography must satisfy two factors: high quality of stego image and high embedding capacity. Conventionally, transform based techniques are widely preferred for these applications. The commonly used transforms for steganography applications are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) etc. In this work, frequency domain transforms such as Fresnelet Transform (FT) and Contourlet Transform (CT) are used for the data hiding process. The secret data is normally hidden in the coefficients of these transforms. However, data hiding in transform coefficients yield less accurate results since the coefficients used for data hiding are selected randomly. Hence, in this work, optimization techniques such as Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) are used for improving the performance of the steganography system. GA and PSO are used to find the best coefficients in order to hide the Quick Response (QR) coded secret data. This approach yields an average PSNR of 52.56 dB and an embedding capacity of 902,136 bits. These experimental results validate the practical feasibility of the proposed methodology for security applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

Abbreviations

GA:

Genetic Algorithm

PSO:

Particle Swarm Optimization

QR:

Quick Response

LSB:

Least Significant Bit

DFT:

Discrete Fourier Transform

DCT:

Discrete Cosine Transform

DWT:

Discrete Wavelet Transform

CT:

Contourlet Transform

FT:

Fresnelet Transform

PSNR:

Peak-Signal to Noise Ration

MSE:

Mean Square Error

TAF:

Tamper Assessment Factor

NAE:

Normalized Absolute Error

References

  1. Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124

    Article  Google Scholar 

  2. Bajaj R, Bedi P, Pal SK (2010) Best hiding capacity scheme for variable length messages using particle swarm optimization. Proc SEMCCO, LNCS 6466:237–244

    Google Scholar 

  3. Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39:640–654

    Article  Google Scholar 

  4. Chan YK, Chen WT, Yu SS, Ho YA, Tsai CS, Chu YP (2009) A HDWT-based reversible data hiding method. J Syst Softw 82:411–421

    Article  Google Scholar 

  5. Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177:2768–2786

    Article  Google Scholar 

  6. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography – survey and analysis of current methods. J Signal Process 90(3):752–825

    Article  MATH  Google Scholar 

  7. Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091–2106

    Article  Google Scholar 

  8. El-Emam NN, RAS AL-Z (2013) New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm. The J Syst Softw 86:1465–1481

    Article  Google Scholar 

  9. Gerami P, Ibrahim S, Bashardoost M (2012) Least significant bit image steganography using particle swarm optimization and optical pixel adjustment. Int. J. Comput Appl 55(2):0975–8887

    Google Scholar 

  10. Goldberg DE (1992) Genetic algorithms in search. Optimization and Machine Learning. Addison-Wesley, Reading, MA

    Google Scholar 

  11. Gonzalez R, Woods R (2005) Digital image processing, 2nd edn. PHI

  12. Guillermito (2004) Chi-Square Steganography Test program. http://www.guillermito2.net/stegano/tools/index.html.

  13. Hemalatha S, Acharya DU, Renuka A, Kamath PR (2013) A secure image steganography technique to hide multiple secret images. Computer Networks & Communications (NetCom) 131:613–620

    Article  Google Scholar 

  14. Holland JH (1975) Adaptation in natural and Arti7cial systems, the university of Michigan press. MI, Ann Arbor

    Google Scholar 

  15. Liebling M, Blu T, Unser M (2003) Fresnelets: new multiresolution wavelet bases for digital holography. IEEE Trans Image Process 12(1):29–43

    Article  MathSciNet  Google Scholar 

  16. Lin YK (2012) High capacity reversible data hiding scheme based up on discrete cosine transformation. J Syst Softw 85:2395–2404

    Article  Google Scholar 

  17. Luo W, Huang F, Huang J (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics Secur 5(2):201–214

    Article  Google Scholar 

  18. Nazeer M, Nargis B, Malik YM, Kim DG (2013) A fresnelet-based encryption of medical images using Arnold transform. Int J Adv Comput Sci Appl 4(3):131–146

    Google Scholar 

  19. Ranjbar S, Zargari F, Ghanbari M (2013) A highly robust two-stage contourlet-based digital image watermarking method. Signal Process Image Commun 28:1526–1536

    Article  Google Scholar 

  20. Sadreazami H, Amini M (2012) A robust spread spectrum based image watermarking in ridgelet domain. Int J Electron Commun (AEÜ) 66:364–371

    Article  Google Scholar 

  21. Sajedi H, Jamzad M (2009) Secure steganography based on embedding capacity. Int J Inf Secur 8:433–445

    Article  Google Scholar 

  22. Sajedi H, Jamzad M (2010) Using contourlet transform and cover selection for secure steganography. Int J Inf Secur 9:337–352

    Article  Google Scholar 

  23. Sharma V (2005) A study of malicious QR codes. Int J Comput intell Inf Secur 3(5):1–6

    Google Scholar 

  24. Shen SY, Huang LH (2015) A data hiding scheme using pixel value differencing and improving exploiting modification directions. Computers & Security 48:131–141

    Article  Google Scholar 

  25. Tanga M, Hub J, Songa W (2014) A high capacity image steganography using multi-layer embedding. Optik 125:3972–3976

    Article  Google Scholar 

  26. Wang X, Ding J, Pei Q (2015) A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition. Inf Sci 3(10):16–35

    Article  Google Scholar 

  27. Yeh HL, Gue ST, Tsai P, Shih WK (2013) Wavelet bit-plane based data hiding for compressed images. Int J Electron Commun (AEU) 67:808–815

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Jude Hemanth.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Uma Maheswari, S., Jude Hemanth, D. Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76, 415–436 (2017). https://doi.org/10.1007/s11042-015-3035-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-3035-1

Keywords

Navigation