Abstract
In the field of data exchange, the security of information is the critical aspect. This void in the security helped the evolution of steganography to address the problem of security, especially when highly critical information exchange is the priority. Better and advanced level of security has been attained using the techniques of steganography with cryptography. However, it has been observed that steganographic techniques principled on computationally intelligent or inspired by nature algorithms are gaining much attention. The paper proposes a method for image steganography in transform domain using hybridization of two computationally intelligent algorithms, i.e., firefly optimization algorithm and ant colony optimization algorithm with Huffman encoding to address the gap of high payload. Comparative analysis of the proposed steganographic tool with other existing methods and analysis of the values obtained against some key performance terms like PSNR (peak signal to noise ratio), MSE (mean square error), BER (bit error rate) and SSI (structural similarity index) determines the proposed algorithm as a powerful method. The proposed tool achieves the PSNR of 68.06 dB and the embedding capacity of 985,682 bits.
Similar content being viewed by others
References
Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)
Ghebleh, M., Kanso, A.: A robust chaotic algorithm for digital image steganography. Commun Nonlinear SciNumer Simul 19(6), 1898–1907 (2014)
Tu, T.Y., Wang, C.H.: Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Sig Process 108, 278–328 (2015)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography. In: The Morgan Kaufmann series in multimedia information and systems, 2008.
Samidha, D., Agrawal, D.: Random image steganography in spatial domain, In IEEE, 2013.
Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: Spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. 12(15) (2012)
Soria-Lorente, A., Berres, S.: A secure steganographic algorithm based on frequency domain for the transmission of hidden information. Secur. Commun. Netw. (2017). https://doi.org/10.1155/2017/5397082. (Article ID 5397082)
Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. International conference on information and communication technologies (ICICT 2014). Procedia Comput. Sci. 46, 612–618 (2015)
Qiu, T., Zheng, K., Song, H., Han, M., Kantarci, B.: A local-optimization emergency scheduling scheme with self-recovery for a smart grid. IEEE Trans. Ind. Inf. 13(6), 3195–3205 (2017). https://doi.org/10.1109/TII.2017.2715844
Sun, Z., et al.: CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks. Wirel Netw 23(4), 1201–1222 (2017)
Chen, C., Liu, L., Qiu, T., Yang, K., Gong, F., Song, H.: ASGR: an artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans. Intell. Transp. Syst. 20(5), 1604–1620 (2019). https://doi.org/10.1109/TITS.2018.2828025
Sujata, D., Chinmay, C., Sourav, K.G., Subhendu, K.P., Jaroslav, F.: BIFM: big-data driven intelligent forecasting model for COVID-19. IEEE Access. (2021). https://doi.org/10.1109/ACCESS.2021.3094658
Neha, S., Chinmay, C.: Evaluation of bio-inspired algorithms for image optimization. J. Electron. Imaging 31(4), 041206 (2022). https://doi.org/10.1117/1.JEI.31.4.041206
Yang, L., Yu, K., Yang, S.X., Chinmay, C., Liu, Y., Guo, T.: An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things. IEEE Trans. Ind. Inf. (2021). https://doi.org/10.1109/TII.2021.3128954
Hemanta, K.B., Chinmay, C., Subhendu, K.P., Vinayak, K.R.: Feature and sub-feature selection for classification using correlation coefficient and fuzzy model. IEEE Trans. Eng. Manag. (2021). https://doi.org/10.1109/TEM.2021.3065699
Siva Raja, P.M., Baburaj, E.: QR code based image steganography via variable step size firefly algorithm and lifting wavelet transform. In: ICMLSC 2018, February 2–4, 2018, ACM. https://doi.org/10.1145/3184066.3184095
Amsaveni, A., Arun Kumar, C.: An efficient data hiding scheme using firefly algorithm in spatial domain. In: 2nd International Conference on electronics and communication system, pp. 650–655. 2015.
Tariq, Z., Al-Tai, Z.T.M., Abass, J.M., Al-Hameed, O.Y.A.: Image steganography between firefly and PSO algorithms. Int. J. Comput. Sci. Inf. Secur. 15(1), 9–21 (2017)
Hanna, W., Sharaby, Z.: Improving image steganography using a proposed mutated levy-flight firefly algorithm. Int. J. Comput. Appl. (2018). https://doi.org/10.5120/ijca2018917979
Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence. Wiley, West Sussex (2005)
Engelbrecht, A.P.: Computational Intelligence: An Introduction. Wiley, West Sussex (2007)
Song, H., Rawat, D., Jeschke, S., Brecher, C.: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 1–514. Academic Press, Boston (2016)
Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles and Applications, pp. 1–906. Wiley, Hoboken (2017)
Li, X., Wang, J.: Steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099–3109 (2007). https://doi.org/10.1016/j.ins.2007.02.008
Nipanikar, S.I., Hima Deepthi, V., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alex. Eng. J. (2017). https://doi.org/10.1016/j.aej.2017.09.005
Shokranipour, S., Hasanzadeh, M.: High capacity image steganography method by using particle swarm optimization. Modares J. Electr. Eng. (2015). https://doi.org/10.1155/2021/6679284
Siva Raja, P.M., Baburaj, E.: An efficient data embedding scheme for digital images based on particle swarm optimization with LSBMR. IET Digital Library, 2013, pp. 17–24
Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: Abraham, A., et al. (eds.) ACC 2011, Part III, CCIS 192, pp. 259–268, 2011. Springer, Berlin 2011
Hemanth, D.J., Umamaheshwari, S., Popsecu, D.E., Naazi, A.: Application of genetic algorithm and particle swarm optimization techniques for improved image steganography systems. Open Phys. (2016). https://doi.org/10.1515/phys-2016-0052
Qiu, T., Li, B., Zhou, X., Song, H., Lee, I., Lloret, J.: A novel shortcut addition algorithm with particle swarm for multisink internet of things. IEEE Trans. Ind. Inf. 16(5), 3566–3577 (2020). https://doi.org/10.1109/TII.2019.2925023
Jiang, M., et al.: Dynamic measurement errors prediction for sensors based on firefly algorithm optimize support vector machine. Sustain. Cities Soc. 35, 250–256 (2017)
Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Class-incremental learning for wireless device identification in IoT. IEEE Internet Things J. 8(23), 17227–17235 (2021). https://doi.org/10.1109/JIOT.2021.3078407
Rani, S., Ahmed, S.H., Talwar, R., Malhotra, J., Song, H.: IoMT: a reliable cross layer protocol for internet of multimedia things. IEEE Internet Things J. 4(3), 832–839 (2017). https://doi.org/10.1109/JIOT.2017.2671460
Jiang, B., Yang, J., Xu, H., Song, H., Zheng, G.: Multimedia data throughput maximization in internet-of-things system based on optimization of cache-enabled UAV. IEEE Internet Things J. 6(2), 3525–3532 (2019). https://doi.org/10.1109/JIOT.2018.2886964
Pradhan, A., Sahu, A.K., Swain, G., Sekhar, K.R.: Performance evaluation parameters of image steganography techniques. In: Proceedings of the 2016 International Conference on Research Advances in Integrated Navigation Systems, 2016. https://doi.org/10.1109/RAINS.2016.7764399
Wang, S., Zheng, D., Zhao, J., Tam, W.J., Speranza, F.: An image quality evaluation method based on digital watermarking. IEEE Trans. Circuits Syst. Video Technol. 17, 98–105 (2007). https://doi.org/10.1109/TCSVT.2006.887086
Dogan, S.: A new data hiding method based on chaos embedded genetic algorithm for colour image. Artif. Intell. Rev. (2016). https://doi.org/10.1007/s10462-016-9459-9
Edward Jero, S., Ramu, P., Swaminathan, R.: Imperceptibility—robustness tradeoff studies for ecg steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)
Priya, A.: High capacity and optimized image steganography technique based on ant colony optimization algorithm. Int. J. Sci. Res. Eng. Dev. 2(1) (2019)
Alam, S., Ahmad, T., Doja, M.N.: A chaotic steganography method using ant colony optimization. Intell. Eng. Inf. Adv. Intell. Syst. Comput. (2018). https://doi.org/10.1007/978-981-10-7566-7_42
Khan, S., Bianchi, T.: Ant colony optimization (ACO) based data hiding in image complex region. Int. J. Electr. Comput. Eng. IJECE 8(1), 379–389 (2018). https://doi.org/10.11591/ijece.v8i1
Bajaj, R., Bedi, P., Pal, S.K.: Best hiding capacity scheme for variable length messages using particle swarm optimization. In: SEMCCO, pp. 230–237, 2010
Banharnsakun, A.: Artificial bee colony approach for enhancing LSB based image steganography. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-5933-5
Bedi, P., Bansal, R., Sehgal, P.: Using PSO in a spatial domain-based image hiding scheme with distortion tolerance. ComputElectrEng 39, 640–654 (2013)
Nickfarjam, A.M., Azimifar Z.: Image steganography based on pixel ranking and particle swarm optimization. In: Proceedings of the 16th CSI international symposium on artificial intelligence and signal processing, pp. 360–363, 2012.
Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: ACC, Part III, CCIS 192, pp. 259–268, 2011
UmaMaheswari, S., Jude Hemanth, D.: Performance enhanced image steganography systems using transforms and optimization techniques. Multimedia Tools Appl. (2015). https://doi.org/10.1007/s11042-015-3035-1
Sharma, V., Srivastava, D.: Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. Comput. Netw. Sustain. (2017). https://doi.org/10.1007/978-981-10-3935-5_36
Jude Hemantha, D., Anithaa, J., Popescub, D.E, Son, L.H.: A modified genetic algorithm for performance improvement of transform-based image steganography systems. J. Intell. Fuzzy Syst. 2018
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sharma, N., Chakraborty, C. & Kumar, R. Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29, 2961–2977 (2023). https://doi.org/10.1007/s00530-022-00918-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-022-00918-6