Skip to main content

Advertisement

Log in

Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography is used at a large scale in various security systems. It is the science and art of hiding secret information into data. Various steganography schemes have been proposed over the years, but most of them are not promising enough to provide a large capacity of embedding and visually prevent the image’s degradation. Histograms can reveal the existence of secret information, and it is also an essential issue in the security of the data. In this Paper, the main objective is to reduce the bit-flip cost count and maximize the PSNR value to reduce the image distortion and keep the data secure by using secret keys while embedding. In this proposed paper, the genetic algorithm (GA) is employed to select the best chromosome that has the minimum bit-flip cost count and maximum PSNR. Data security is achieved by the secret key generated from Hamiltonian path for embedding and retrieving of data. The proposed technique is robust against steganographic attacks and even if presence of data is observed it not possible to guess the embedding pattern. The result section demonstrates that the proposed technique outperform the existing techniques by increasing the PSNR significantly by approx 7 percent that lead to the increase in PSNR value up to 41.8dB for three bit per pixel embedding.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Bhatti UA, Yu Z, Li J, Nawaz SA, Mehmood A, Zhang K, Yuan L (2020) Hybrid watermarking algorithm using clifford algebra with arnold scrambling and chaotic encryption. IEEE Access 8:76 386–76 398

    Article  Google Scholar 

  2. Bhatti UA, Yu Z, Chanussot J, Zeeshan Z, Yuan L, Luo W, Nawaz SA, Bhatti MA, Ain QU, Mehmood A (2021) Local similarity-based spatial–spectral fusion hyperspectral image classification with deep cnn and gabor filtering. IEEE Trans Geosci Remote Sens 60:1–15

    Article  Google Scholar 

  3. Carvajal-Gamez BE, Gallegos-Funes FJ, Rosales-Silva AJ (2013) Color local complexity estimation based steganographic (clces) method. Expert Syst Appl 40(4):1132–1142

    Article  Google Scholar 

  4. Chan C-K, Cheng L-M (2004) Hiding data in images by simple lsb substitution. Pattern Recog 37(3):469–474

    Article  MATH  Google Scholar 

  5. Chang C-C, Lin C-C, Tseng C-S, Tai W-L (2007) Reversible hiding in dct-based compressed images. Inform Sci 177(13):2768–2786

    Article  Google Scholar 

  6. Chang C-C, Hsieh Y-P, Lin C-H (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    Article  MATH  Google Scholar 

  7. Chefranov AG, Öz G (2022) Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified lsb for grayscale images. J Inf Secur Appl 70:103314

    Google Scholar 

  8. Chen W-Y (2008) Color image steganography scheme using dft, spiht codec, and modified differential phase-shift keying techniques. Appl Math Comput 196(1):40–54

    MathSciNet  MATH  Google Scholar 

  9. Chen W-J, Chang C-C, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292–3301

  10. Duric Z, Jacobs M, Jajodia S (2005) Information hiding: steganography and steganalysis. Handbook of statistics 24:171–187

    Article  Google Scholar 

  11. Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84 (5):803–809

    Article  Google Scholar 

  12. Goyal S, Bhushan S, Kumar Y, Rana AuHS, Bhutta MR, Ijaz MF, Son Y (2021) An optimized framework for energy-resource allocation in a cloud environment based on the whale optimization algorithm. Sensors 21(5):1583

    Article  Google Scholar 

  13. Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39(14):11 51–11 524

    Article  Google Scholar 

  14. Jafari R, Ziou D, Rashidi MM (2013) Increasing image compression rate using steganography. Expert Syst Appl 40(17):6918–6927

    Article  Google Scholar 

  15. Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123–6130

    Article  Google Scholar 

  16. Kaur J, Ahmed S, Kumar Y, Alaboudi A, Jhanjhi N, Ijaz MF (2021) Packet optimization of software defined network using lion optimization. CMC-COMPUTERS MATERIALS & CONTINUA 69(2):2617–2633

    Article  Google Scholar 

  17. Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  18. Lin C-C, Tsai W-H (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  19. Nissar A, Mir AH (2010) Classification of steganalysis techniques: a study. Digit Signal Process 20(6):1758–1770

    Article  Google Scholar 

  20. Noda H, Niimi M, Kawaguchi E (2006) High-performance jpeg steganography using quantization index modulation in dct domain. Pattern Recogn Lett 27(5):455–461

    Article  Google Scholar 

  21. Sajedi H, Jamzad M (2010) Bss: boosted steganography scheme with cover image preprocessing. Expert Syst Appl 37(12):7703–7710

    Article  Google Scholar 

  22. Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recognit Lett 24(9-10):1613–1626

    Article  MATH  Google Scholar 

  23. Wu Q, Zhu C, Li J-J, Chang C-C, Wang Z-H (2016) A magic cube based information hiding scheme of large payload. J Inf Secur Appl 26:1–7

    Google Scholar 

  24. Yadav GS, Ojha A (2018) Hamiltonian path based image steganography scheme with improved imperceptibility and undetectability. Appl Soft Comput 73:497–507

    Article  Google Scholar 

  25. Yang C-H, Weng C-Y, Wang S-J, Sun H-M (2008) Adaptive data hiding in edge areas of images with spatial lsb domain systems. IEEE Trans Inf Forensics Secur 3(3):488–497

    Article  Google Scholar 

  26. Yang C-H, Wang W-J, Huang C-T, Wang S-J (2011) Reversible steganography based on side match and hit pattern for vq-compressed images. Inform Sci 181(11):2218–2230

    Article  Google Scholar 

  27. Yang C-N, Hsu S-C, Kim C (2017) Improving stego image quality in image interpolation based data hiding. Comput Stand Inter 50:209–215

    Article  Google Scholar 

Download references

Funding

This manuscript possesses no funding.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gyan Singh Yadav.

Ethics declarations

Conflict of Interests

This manuscript possesses no conflict of interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yadav, G.S., Mangal, P., Parmar, G. et al. Genetic algorithm and hamilton path based data hiding scheme including embedding cost optimization. Multimed Tools Appl 82, 20233–20249 (2023). https://doi.org/10.1007/s11042-022-14322-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-14322-9

Keywords

Navigation