Skip to main content
Log in

Optimized multimedia data through computationally intelligent algorithms

  • Special Issue Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In the field of data exchange, the security of information is the critical aspect. This void in the security helped the evolution of steganography to address the problem of security, especially when highly critical information exchange is the priority. Better and advanced level of security has been attained using the techniques of steganography with cryptography. However, it has been observed that steganographic techniques principled on computationally intelligent or inspired by nature algorithms are gaining much attention. The paper proposes a method for image steganography in transform domain using hybridization of two computationally intelligent algorithms, i.e., firefly optimization algorithm and ant colony optimization algorithm with Huffman encoding to address the gap of high payload. Comparative analysis of the proposed steganographic tool with other existing methods and analysis of the values obtained against some key performance terms like PSNR (peak signal to noise ratio), MSE (mean square error), BER (bit error rate) and SSI (structural similarity index) determines the proposed algorithm as a powerful method. The proposed tool achieves the PSNR of 68.06 dB and the embedding capacity of 985,682 bits.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)

    Article  MATH  Google Scholar 

  2. Ghebleh, M., Kanso, A.: A robust chaotic algorithm for digital image steganography. Commun Nonlinear SciNumer Simul 19(6), 1898–1907 (2014)

    Article  MATH  Google Scholar 

  3. Tu, T.Y., Wang, C.H.: Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Sig Process 108, 278–328 (2015)

    Article  Google Scholar 

  4. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography. In: The Morgan Kaufmann series in multimedia information and systems, 2008.

  5. Samidha, D., Agrawal, D.: Random image steganography in spatial domain, In IEEE, 2013.

  6. Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: Spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. 12(15) (2012)

  7. Soria-Lorente, A., Berres, S.: A secure steganographic algorithm based on frequency domain for the transmission of hidden information. Secur. Commun. Netw. (2017). https://doi.org/10.1155/2017/5397082. (Article ID 5397082)

    Article  Google Scholar 

  8. Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. International conference on information and communication technologies (ICICT 2014). Procedia Comput. Sci. 46, 612–618 (2015)

    Article  Google Scholar 

  9. Qiu, T., Zheng, K., Song, H., Han, M., Kantarci, B.: A local-optimization emergency scheduling scheme with self-recovery for a smart grid. IEEE Trans. Ind. Inf. 13(6), 3195–3205 (2017). https://doi.org/10.1109/TII.2017.2715844

    Article  Google Scholar 

  10. Sun, Z., et al.: CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks. Wirel Netw 23(4), 1201–1222 (2017)

    Article  MathSciNet  Google Scholar 

  11. Chen, C., Liu, L., Qiu, T., Yang, K., Gong, F., Song, H.: ASGR: an artificial spider-web-based geographic routing in heterogeneous vehicular networks. IEEE Trans. Intell. Transp. Syst. 20(5), 1604–1620 (2019). https://doi.org/10.1109/TITS.2018.2828025

    Article  Google Scholar 

  12. Sujata, D., Chinmay, C., Sourav, K.G., Subhendu, K.P., Jaroslav, F.: BIFM: big-data driven intelligent forecasting model for COVID-19. IEEE Access. (2021). https://doi.org/10.1109/ACCESS.2021.3094658

    Article  Google Scholar 

  13. Neha, S., Chinmay, C.: Evaluation of bio-inspired algorithms for image optimization. J. Electron. Imaging 31(4), 041206 (2022). https://doi.org/10.1117/1.JEI.31.4.041206

    Article  Google Scholar 

  14. Yang, L., Yu, K., Yang, S.X., Chinmay, C., Liu, Y., Guo, T.: An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things. IEEE Trans. Ind. Inf. (2021). https://doi.org/10.1109/TII.2021.3128954

    Article  Google Scholar 

  15. Hemanta, K.B., Chinmay, C., Subhendu, K.P., Vinayak, K.R.: Feature and sub-feature selection for classification using correlation coefficient and fuzzy model. IEEE Trans. Eng. Manag. (2021). https://doi.org/10.1109/TEM.2021.3065699

    Article  Google Scholar 

  16. Siva Raja, P.M., Baburaj, E.: QR code based image steganography via variable step size firefly algorithm and lifting wavelet transform. In: ICMLSC 2018, February 2–4, 2018, ACM. https://doi.org/10.1145/3184066.3184095

  17. Amsaveni, A., Arun Kumar, C.: An efficient data hiding scheme using firefly algorithm in spatial domain. In: 2nd International Conference on electronics and communication system, pp. 650–655. 2015.

  18. Tariq, Z., Al-Tai, Z.T.M., Abass, J.M., Al-Hameed, O.Y.A.: Image steganography between firefly and PSO algorithms. Int. J. Comput. Sci. Inf. Secur. 15(1), 9–21 (2017)

    Google Scholar 

  19. Hanna, W., Sharaby, Z.: Improving image steganography using a proposed mutated levy-flight firefly algorithm. Int. J. Comput. Appl. (2018). https://doi.org/10.5120/ijca2018917979

    Article  Google Scholar 

  20. Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence. Wiley, West Sussex (2005)

    Google Scholar 

  21. Engelbrecht, A.P.: Computational Intelligence: An Introduction. Wiley, West Sussex (2007)

    Book  Google Scholar 

  22. Song, H., Rawat, D., Jeschke, S., Brecher, C.: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 1–514. Academic Press, Boston (2016)

    Google Scholar 

  23. Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles and Applications, pp. 1–906. Wiley, Hoboken (2017)

    Book  Google Scholar 

  24. Li, X., Wang, J.: Steganographic method based upon JPEG and particle swarm optimization algorithm. Inf. Sci. 177, 3099–3109 (2007). https://doi.org/10.1016/j.ins.2007.02.008

    Article  Google Scholar 

  25. Nipanikar, S.I., Hima Deepthi, V., Kulkarni, N.: A sparse representation based image steganography using particle swarm optimization and wavelet transform. Alex. Eng. J. (2017). https://doi.org/10.1016/j.aej.2017.09.005

    Article  Google Scholar 

  26. Shokranipour, S., Hasanzadeh, M.: High capacity image steganography method by using particle swarm optimization. Modares J. Electr. Eng. (2015). https://doi.org/10.1155/2021/6679284

    Article  Google Scholar 

  27. Siva Raja, P.M., Baburaj, E.: An efficient data embedding scheme for digital images based on particle swarm optimization with LSBMR. IET Digital Library, 2013, pp. 17–24

  28. Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: Abraham, A., et al. (eds.) ACC 2011, Part III, CCIS 192, pp. 259–268, 2011. Springer, Berlin 2011

  29. Hemanth, D.J., Umamaheshwari, S., Popsecu, D.E., Naazi, A.: Application of genetic algorithm and particle swarm optimization techniques for improved image steganography systems. Open Phys. (2016). https://doi.org/10.1515/phys-2016-0052

    Article  Google Scholar 

  30. Qiu, T., Li, B., Zhou, X., Song, H., Lee, I., Lloret, J.: A novel shortcut addition algorithm with particle swarm for multisink internet of things. IEEE Trans. Ind. Inf. 16(5), 3566–3577 (2020). https://doi.org/10.1109/TII.2019.2925023

    Article  Google Scholar 

  31. Jiang, M., et al.: Dynamic measurement errors prediction for sensors based on firefly algorithm optimize support vector machine. Sustain. Cities Soc. 35, 250–256 (2017)

    Article  Google Scholar 

  32. Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Class-incremental learning for wireless device identification in IoT. IEEE Internet Things J. 8(23), 17227–17235 (2021). https://doi.org/10.1109/JIOT.2021.3078407

    Article  Google Scholar 

  33. Rani, S., Ahmed, S.H., Talwar, R., Malhotra, J., Song, H.: IoMT: a reliable cross layer protocol for internet of multimedia things. IEEE Internet Things J. 4(3), 832–839 (2017). https://doi.org/10.1109/JIOT.2017.2671460

    Article  Google Scholar 

  34. Jiang, B., Yang, J., Xu, H., Song, H., Zheng, G.: Multimedia data throughput maximization in internet-of-things system based on optimization of cache-enabled UAV. IEEE Internet Things J. 6(2), 3525–3532 (2019). https://doi.org/10.1109/JIOT.2018.2886964

    Article  Google Scholar 

  35. Pradhan, A., Sahu, A.K., Swain, G., Sekhar, K.R.: Performance evaluation parameters of image steganography techniques. In: Proceedings of the 2016 International Conference on Research Advances in Integrated Navigation Systems, 2016. https://doi.org/10.1109/RAINS.2016.7764399

  36. Wang, S., Zheng, D., Zhao, J., Tam, W.J., Speranza, F.: An image quality evaluation method based on digital watermarking. IEEE Trans. Circuits Syst. Video Technol. 17, 98–105 (2007). https://doi.org/10.1109/TCSVT.2006.887086

    Article  Google Scholar 

  37. Dogan, S.: A new data hiding method based on chaos embedded genetic algorithm for colour image. Artif. Intell. Rev. (2016). https://doi.org/10.1007/s10462-016-9459-9

    Article  Google Scholar 

  38. Edward Jero, S., Ramu, P., Swaminathan, R.: Imperceptibility—robustness tradeoff studies for ecg steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)

    Article  Google Scholar 

  39. Priya, A.: High capacity and optimized image steganography technique based on ant colony optimization algorithm. Int. J. Sci. Res. Eng. Dev. 2(1) (2019)

  40. Alam, S., Ahmad, T., Doja, M.N.: A chaotic steganography method using ant colony optimization. Intell. Eng. Inf. Adv. Intell. Syst. Comput. (2018). https://doi.org/10.1007/978-981-10-7566-7_42

    Article  Google Scholar 

  41. Khan, S., Bianchi, T.: Ant colony optimization (ACO) based data hiding in image complex region. Int. J. Electr. Comput. Eng. IJECE 8(1), 379–389 (2018). https://doi.org/10.11591/ijece.v8i1

    Article  Google Scholar 

  42. Bajaj, R., Bedi, P., Pal, S.K.: Best hiding capacity scheme for variable length messages using particle swarm optimization. In: SEMCCO, pp. 230–237, 2010

  43. Banharnsakun, A.: Artificial bee colony approach for enhancing LSB based image steganography. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-5933-5

    Article  Google Scholar 

  44. Bedi, P., Bansal, R., Sehgal, P.: Using PSO in a spatial domain-based image hiding scheme with distortion tolerance. ComputElectrEng 39, 640–654 (2013)

    Google Scholar 

  45. Nickfarjam, A.M., Azimifar Z.: Image steganography based on pixel ranking and particle swarm optimization. In: Proceedings of the 16th CSI international symposium on artificial intelligence and signal processing, pp. 360–363, 2012.

  46. Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: ACC, Part III, CCIS 192, pp. 259–268, 2011

  47. UmaMaheswari, S., Jude Hemanth, D.: Performance enhanced image steganography systems using transforms and optimization techniques. Multimedia Tools Appl. (2015). https://doi.org/10.1007/s11042-015-3035-1

    Article  Google Scholar 

  48. Sharma, V., Srivastava, D.: Comprehensive data hiding technique for discrete wavelet transform-based image steganography using advance encryption standard. Comput. Netw. Sustain. (2017). https://doi.org/10.1007/978-981-10-3935-5_36

    Article  Google Scholar 

  49. Jude Hemantha, D., Anithaa, J., Popescub, D.E, Son, L.H.: A modified genetic algorithm for performance improvement of transform-based image steganography systems. J. Intell. Fuzzy Syst. 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chinmay Chakraborty.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sharma, N., Chakraborty, C. & Kumar, R. Optimized multimedia data through computationally intelligent algorithms. Multimedia Systems 29, 2961–2977 (2023). https://doi.org/10.1007/s00530-022-00918-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-022-00918-6

Keywords

Navigation