Skip to main content
Log in

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With remarkable information technology development, information security has become a major concern in the communication environment, where security must be performed for the multimedia messages exchanged between the sender and the intended recipient. Digital multimedia steganography techniques have been developed to attain a security for covert communication and secure data. This paper proposes an approach for image steganography using the Least Significant Bit Substitution (LSB) and Nature-Inspired Harris Hawks Optimization (HHO) algorithm for efficient concealing of the secret data inside a cover image; thus providing high confidentiality. The HHO based data encoding operation uses the PSNR visual quality metric as an objective function. The objective function is used to determine the ideal encoding vector to convert the secret message to its encoded form. The proposed approach performs better than other state-of-the-art methods in terms of standard measures of visual quality with maintaining high embedding capacity. Comparisons with existing LSB or multi-directional PVD embedding methods demonstrate that the proposed method has more optimized and higher embedding capacity with maintaining visual quality. Besides, the proposed approach achieves high security against statistical StegoExpose analysis, ALASKA2 deep learning steganalysis, and image processing attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. https://www.kaggle.com/c/alaska2-image-steganalysis.

References

  • Almawgani A, Alhawari AR, Hindi AT, Al-Arashi WH, Al-Ashwal A (2022) Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data. Multidimensional Syst Signal Process 33:1–18

    Google Scholar 

  • Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124

    Google Scholar 

  • Bao Z, Guo Y, Li X, Zhang Y, Xu M, Luo X (2021) A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Humaniz Comput 11(5):1889–1901

    Google Scholar 

  • Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39(2):640–654

    Google Scholar 

  • Boehm B (2014) StegExpose—a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656

  • Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    MATH  Google Scholar 

  • Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595

    Google Scholar 

  • Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167

    MATH  Google Scholar 

  • Chaumont M (2020) Deep learning in steganography and steganalysis. Digital media steganography: principles, algorithms, and advances. Elsevier, Amsterdam, pp 321–349

    Google Scholar 

  • Cogranne R, Giboulot Q, Bas P (2019) The ALASKA steganalysis challenge: a first step towards steganalysis. In: ACM workshop on information hiding and multimedia security, pp 125–137

  • Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana AK, Pani SK (2021) SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IOT. IEEE Access 9:87563–87578

    Google Scholar 

  • Dumitrescu S, Wu X, Memon N (2002a) On steganalysis of random LSB embedding in continuous-tone images. In: International conference on image processing, vol 3. IEEE, pp 641–644

  • Dumitrescu S, Wu X, Wang Z (2002b) Detection of LSB steganography via sample pair analysis. In: International workshop on information hiding. Springer, pp 355–372

  • Elharrouss O, Almaadeed N, Al-Maadeed S (2020) An image steganography approach based on k-least significant bits (k-LSB). In: IEEE international conference on informatics, IoT, and enabling technologies. IEEE, pp 131–135

  • Fridrich J, Goljan M, Du R (2001à) Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4):22–28

    Google Scholar 

  • Fridrich J, Goljan M, Du R (2001b) Reliable detection of LSB steganography in color and grayscale images. New challenges. In: Workshop on multimedia and security, pp 27–30

  • Hameed MA, Aly S, Hassaballah M (2018) An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools Appl 77(12):14705–14723

    Google Scholar 

  • Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access 7:185189–185204

    Google Scholar 

  • Hassaballah M (2020) Digital media steganography: principles, algorithms, and advances. Academic Press

    Google Scholar 

  • Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A novel image steganography method for industrial internet of things security. IEEE Trans Ind Inf 17(11):7743–7751

    Google Scholar 

  • Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: Algorithm and applications. Futur Gener Comput Syst 97:849–872

    Google Scholar 

  • Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Humaniz Comput 13:973–988

    Google Scholar 

  • Hsu C-S, Tu,S-F (2010) Finding optimal LSB substitution using ant colony optimization algorithm. In: 2nd International conference on communication software and networks. IEEE, pp 293–297

  • Hu X, Ni J, Zhang W, Huang J (2021) Efficient JPEG batch steganography using intrinsic energy of image contents. IEEE Trans Inf Forensics Secur 16:4544–4558

    Google Scholar 

  • Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66

    Google Scholar 

  • Jaradat A, Taqieddin E, Mowafi M (2021) 2021. A high-capacity image steganography method using chaotic particle swarm optimization. Security and Communication Networks

  • Jegou H, Douze M, Schmid C (2008a) Hamming embedding and weak geometric consistency for large scale image search. In: European conference on computer vision. Springer, pp 304–317

  • Jegou H, Douze M, Schmid C (2008b) Inria holidays dataset. Available http://lear.inrialpes.fr/people/jegou/data.php

  • Kalaichelvi V, Meenakshi P, Devi PV, Manikandan H, Venkateswari P, Swaminathan S (2021) A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique. J Ambient Intell Humaniz Comput 12:7235–7243

    Google Scholar 

  • Kang S, Park H, Park J-I (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimedia Tools Appl 79(29):21155–21175

    Google Scholar 

  • Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. J Inf Secur Appl 40:217–235

    Google Scholar 

  • Karthika P, Vidhya Saraswathi P (2021) IoT using machine learning security enhancement in video steganography allocation for raspberry pi. J Ambient Intell Humaniz Comput 12:5835–5844

    Google Scholar 

  • Kaur R, Singh B (2021) A hybrid algorithm for robust image steganography. Multidimension Syst Signal Process 32(1):1–23

    MathSciNet  MATH  Google Scholar 

  • Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444

    Google Scholar 

  • Li F, Yu Z, Qin C (2022) GAN-based spatial image steganography with cross feedback mechanism. Signal Process 190:108341

    Google Scholar 

  • Liao X, Wen Q-Y, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8

    Google Scholar 

  • Lv Z, Qiao L, Kumar Singh A, Wang Q (2021) AI-empowered IoT security for smart cities. ACM Trans Internet Technol 21(4):1–21

    Google Scholar 

  • Mahto DK, Singh A (2021) A survey of color image watermarking: state-of-the-art and research directions. Comput Electr Eng 93:107255

    Google Scholar 

  • Mishra M, Kumar S, Mishra S (2012) Security enhanced digital image steganography based on successive arnold transformation. In: Advances in computer science, engineering & applications. Springer, pp 221–229

  • Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257

    Google Scholar 

  • Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2021) Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Trans Multimed Comput Commun Appl 16(3s):1–19

    Google Scholar 

  • Nguyen TD, Arch-Int S, Arch-Int N (2016) An adaptive multi bit-plane image steganography using block data-hiding. Multimedia Tools Appl 75(14):8319–8345

    Google Scholar 

  • Pan P, Wu Z, Yang C, Zhao B (2022) Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage. Entropy 24(2):246–267

    MathSciNet  Google Scholar 

  • Pradhan A, Sekhar KR, Swain G (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng 2018:1–12

    Google Scholar 

  • Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101

    MathSciNet  Google Scholar 

  • Qin X, Li B, Tan S, Tang W, Huang J (2022) Gradually enhanced adversarial perturbations on color pixel vectors for image steganography. IEEE Trans Circuits Syst Video Technol

  • Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using lsb technique. Int J Netw Secur 19(4):593–598

    Google Scholar 

  • Roy S, Islam M et al (2022) A hybrid secured approach combining LSB steganography and AES using mosaic images for ensuring data security. SN Comput Sci 3(2):1–12

    Google Scholar 

  • Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sens Imag 21(1):1–21

    Google Scholar 

  • Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389

    Google Scholar 

  • Sajay K, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Humaniz Comput 1–10

  • Sharma N, Batra U (2021) An enhanced Huffman-pso based image optimization algorithm for image steganography. Genet Program Evolvable Mach 22(2):189–205

    Google Scholar 

  • Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444

    Google Scholar 

  • Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press

    Google Scholar 

  • Singh A (2021) Data hiding: current trends, innovation and potential challenges. ACM Trans Multimed Comput Commun Appl 16(3s):1–16

    MathSciNet  Google Scholar 

  • Singh O, Singh A (2021) A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Mach Vis Appl 32(4):1–13

    MathSciNet  Google Scholar 

  • Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimedia Tools Appl 79(23):15901–15921

    Google Scholar 

  • Singh AK, Liu X, Wang H, Ko H (2021) Recent advances in multimedia security and information hiding. Trans Emerg Telecommun Technol 32(2):e4193

    Google Scholar 

  • Sonar R, Swain G (2022) A hybrid steganography technique based on RR, AQVD, and QVC. Glob Perspect Inf Secur J 1–20

  • Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: a review of the recent advances. IEEE Access 9:23409–23423

    Google Scholar 

  • Wenwen P, Yin Y, Wang X, Jing Y, Song M (2022) Seek-and-hide: adversarial steganography via deep reinforcement learning. IEEE Trans Pattern Anal Machine Intell 00(00):1–15

    Google Scholar 

  • Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: International workshop on information hiding. Springer, pp 61–76

  • Wilkes M (1974) The art of computer programming, volume 3, sorting and searching. Comput J 17(4):324–324

    Google Scholar 

  • Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626

    MATH  Google Scholar 

  • You W, Zhang H, Zhao X (2020) A siamese CNN for image steganalysis. IEEE Trans Inf Forensics Secur 16:291–306

    Google Scholar 

  • Zeng K, Chen K, Zhang W, Wang Y, Yu N (2022) Improving robust adaptive steganography via minimizing channel errors. Signal Process 108498

  • Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331–339

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Hassaballah.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hameed, M.A., Abdel-Aleem, O.A. & Hassaballah, M. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Human Comput 14, 4639–4657 (2023). https://doi.org/10.1007/s12652-022-04366-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-04366-y

Keywords

Navigation