Abstract
With remarkable information technology development, information security has become a major concern in the communication environment, where security must be performed for the multimedia messages exchanged between the sender and the intended recipient. Digital multimedia steganography techniques have been developed to attain a security for covert communication and secure data. This paper proposes an approach for image steganography using the Least Significant Bit Substitution (LSB) and Nature-Inspired Harris Hawks Optimization (HHO) algorithm for efficient concealing of the secret data inside a cover image; thus providing high confidentiality. The HHO based data encoding operation uses the PSNR visual quality metric as an objective function. The objective function is used to determine the ideal encoding vector to convert the secret message to its encoded form. The proposed approach performs better than other state-of-the-art methods in terms of standard measures of visual quality with maintaining high embedding capacity. Comparisons with existing LSB or multi-directional PVD embedding methods demonstrate that the proposed method has more optimized and higher embedding capacity with maintaining visual quality. Besides, the proposed approach achieves high security against statistical StegoExpose analysis, ALASKA2 deep learning steganalysis, and image processing attacks.
Similar content being viewed by others
References
Almawgani A, Alhawari AR, Hindi AT, Al-Arashi WH, Al-Ashwal A (2022) Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data. Multidimensional Syst Signal Process 33:1–18
Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124
Bao Z, Guo Y, Li X, Zhang Y, Xu M, Luo X (2021) A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients. J Ambient Intell Humaniz Comput 11(5):1889–1901
Bedi P, Bansal R, Sehgal P (2013) Using PSO in a spatial domain based image hiding scheme with distortion tolerance. Comput Electr Eng 39(2):640–654
Boehm B (2014) StegExpose—a tool for detecting LSB steganography. arXiv preprint arXiv:1410.6656
Chan C-K, Cheng L-M (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595
Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167
Chaumont M (2020) Deep learning in steganography and steganalysis. Digital media steganography: principles, algorithms, and advances. Elsevier, Amsterdam, pp 321–349
Cogranne R, Giboulot Q, Bas P (2019) The ALASKA steganalysis challenge: a first step towards steganalysis. In: ACM workshop on information hiding and multimedia security, pp 125–137
Dhawan S, Chakraborty C, Frnda J, Gupta R, Rana AK, Pani SK (2021) SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IOT. IEEE Access 9:87563–87578
Dumitrescu S, Wu X, Memon N (2002a) On steganalysis of random LSB embedding in continuous-tone images. In: International conference on image processing, vol 3. IEEE, pp 641–644
Dumitrescu S, Wu X, Wang Z (2002b) Detection of LSB steganography via sample pair analysis. In: International workshop on information hiding. Springer, pp 355–372
Elharrouss O, Almaadeed N, Al-Maadeed S (2020) An image steganography approach based on k-least significant bits (k-LSB). In: IEEE international conference on informatics, IoT, and enabling technologies. IEEE, pp 131–135
Fridrich J, Goljan M, Du R (2001à) Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4):22–28
Fridrich J, Goljan M, Du R (2001b) Reliable detection of LSB steganography in color and grayscale images. New challenges. In: Workshop on multimedia and security, pp 27–30
Hameed MA, Aly S, Hassaballah M (2018) An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimedia Tools Appl 77(12):14705–14723
Hameed MA, Hassaballah M, Aly S, Awad AI (2019) An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access 7:185189–185204
Hassaballah M (2020) Digital media steganography: principles, algorithms, and advances. Academic Press
Hassaballah M, Hameed MA, Awad AI, Muhammad K (2021) A novel image steganography method for industrial internet of things security. IEEE Trans Ind Inf 17(11):7743–7751
Heidari AA, Mirjalili S, Faris H, Aljarah I, Mafarja M, Chen H (2019) Harris hawks optimization: Algorithm and applications. Futur Gener Comput Syst 97:849–872
Hosny KM, Kamal ST, Darwish MM (2022) Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Humaniz Comput 13:973–988
Hsu C-S, Tu,S-F (2010) Finding optimal LSB substitution using ant colony optimization algorithm. In: 2nd International conference on communication software and networks. IEEE, pp 293–297
Hu X, Ni J, Zhang W, Huang J (2021) Efficient JPEG batch steganography using intrinsic energy of image contents. IEEE Trans Inf Forensics Secur 16:4544–4558
Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46–66
Jaradat A, Taqieddin E, Mowafi M (2021) 2021. A high-capacity image steganography method using chaotic particle swarm optimization. Security and Communication Networks
Jegou H, Douze M, Schmid C (2008a) Hamming embedding and weak geometric consistency for large scale image search. In: European conference on computer vision. Springer, pp 304–317
Jegou H, Douze M, Schmid C (2008b) Inria holidays dataset. Available http://lear.inrialpes.fr/people/jegou/data.php
Kalaichelvi V, Meenakshi P, Devi PV, Manikandan H, Venkateswari P, Swaminathan S (2021) A stable image steganography: a novel approach based on modified RSA algorithm and 2–4 least significant bit (LSB) technique. J Ambient Intell Humaniz Comput 12:7235–7243
Kang S, Park H, Park J-I (2020) Combining LSB embedding with modified Octa-PVD embedding. Multimedia Tools Appl 79(29):21155–21175
Karampidis K, Kavallieratou E, Papadourakis G (2018) A review of image steganalysis techniques for digital forensics. J Inf Secur Appl 40:217–235
Karthika P, Vidhya Saraswathi P (2021) IoT using machine learning security enhancement in video steganography allocation for raspberry pi. J Ambient Intell Humaniz Comput 12:5835–5844
Kaur R, Singh B (2021) A hybrid algorithm for robust image steganography. Multidimension Syst Signal Process 32(1):1–23
Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444
Li F, Yu Z, Qin C (2022) GAN-based spatial image steganography with cross feedback mechanism. Signal Process 190:108341
Liao X, Wen Q-Y, Zhang J (2011) A steganographic method for digital images with four-pixel differencing and modified LSB substitution. J Vis Commun Image Represent 22(1):1–8
Lv Z, Qiao L, Kumar Singh A, Wang Q (2021) AI-empowered IoT security for smart cities. ACM Trans Internet Technol 21(4):1–21
Mahto DK, Singh A (2021) A survey of color image watermarking: state-of-the-art and research directions. Comput Electr Eng 93:107255
Mishra M, Kumar S, Mishra S (2012) Security enhanced digital image steganography based on successive arnold transformation. In: Advances in computer science, engineering & applications. Springer, pp 221–229
Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257
Namasudra S, Chakraborty R, Majumder A, Moparthi NR (2021) Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Trans Multimed Comput Commun Appl 16(3s):1–19
Nguyen TD, Arch-Int S, Arch-Int N (2016) An adaptive multi bit-plane image steganography using block data-hiding. Multimedia Tools Appl 75(14):8319–8345
Pan P, Wu Z, Yang C, Zhao B (2022) Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage. Entropy 24(2):246–267
Pradhan A, Sekhar KR, Swain G (2018) Digital image steganography using LSB substitution, PVD, and EMD. Math Probl Eng 2018:1–12
Qazanfari K, Safabakhsh R (2014) A new steganography method which preserves histogram: generalization of LSB++. Inf Sci 277:90–101
Qin X, Li B, Tan S, Tang W, Huang J (2022) Gradually enhanced adversarial perturbations on color pixel vectors for image steganography. IEEE Trans Circuits Syst Video Technol
Rajendran S, Doraipandian M (2017) Chaotic map based random image steganography using lsb technique. Int J Netw Secur 19(4):593–598
Roy S, Islam M et al (2022) A hybrid secured approach combining LSB steganography and AES using mosaic images for ensuring data security. SN Comput Sci 3(2):1–12
Sahu AK, Swain G (2020) Reversible image steganography using dual-layer LSB matching. Sens Imag 21(1):1–21
Sajasi S, Moghadam A-ME (2015) An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl Soft Comput 30:375–389
Sajay K, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Humaniz Comput 1–10
Sharma N, Batra U (2021) An enhanced Huffman-pso based image optimization algorithm for image steganography. Genet Program Evolvable Mach 22(2):189–205
Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444
Shih FY (2017) Digital watermarking and steganography: fundamentals and techniques. CRC Press
Singh A (2021) Data hiding: current trends, innovation and potential challenges. ACM Trans Multimed Comput Commun Appl 16(3s):1–16
Singh O, Singh A (2021) A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Mach Vis Appl 32(4):1–13
Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimedia Tools Appl 79(23):15901–15921
Singh AK, Liu X, Wang H, Ko H (2021) Recent advances in multimedia security and information hiding. Trans Emerg Telecommun Technol 32(2):e4193
Sonar R, Swain G (2022) A hybrid steganography technique based on RR, AQVD, and QVC. Glob Perspect Inf Secur J 1–20
Subramanian N, Elharrouss O, Al-Maadeed S, Bouridane A (2021) Image steganography: a review of the recent advances. IEEE Access 9:23409–23423
Wenwen P, Yin Y, Wang X, Jing Y, Song M (2022) Seek-and-hide: adversarial steganography via deep reinforcement learning. IEEE Trans Pattern Anal Machine Intell 00(00):1–15
Westfeld A, Pfitzmann A (1999) Attacks on steganographic systems. In: International workshop on information hiding. Springer, pp 61–76
Wilkes M (1974) The art of computer programming, volume 3, sorting and searching. Comput J 17(4):324–324
Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626
You W, Zhang H, Zhao X (2020) A siamese CNN for image steganalysis. IEEE Trans Inf Forensics Secur 16:291–306
Zeng K, Chen K, Zhang W, Wang Y, Yu N (2022) Improving robust adaptive steganography via minimizing channel errors. Signal Process 108498
Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331–339
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hameed, M.A., Abdel-Aleem, O.A. & Hassaballah, M. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. J Ambient Intell Human Comput 14, 4639–4657 (2023). https://doi.org/10.1007/s12652-022-04366-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-04366-y