Skip to main content

Advertisement

Log in

Optimal steganography with blind detection based on Bayesian optimization algorithm

  • Industrial and commercial application
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

An optimal steganography method is provided to embed the secret data into the low-order bits of host pixels. The main idea of the proposed method is that before the embedding process, the secret data are mapped to the optimal values using Bayesian optimization algorithm (along with introducing a novel mutation operator), in order to reduce the mean square error (MSE) and also maintain the structural similarity between the images before and after embedding (i.e., preserving the visual quality of the embedded-image). Then, the mapped data are embedded into the low-order bits of host pixels using modulus function and a systematic and reversible algorithm. Since the proposed method is able to embed data into more significant bits, it has enhanced the payload, while preserving the visual quality of the image. Extraction of data from the host image is possible without requiring the original image. The simulation results show that the proposed algorithm can lead to a minimum loss in MSE criterion and also a minimal reduction in visual quality of the image in terms of diagnostic criteria of the human eye, whereas there is no limitation on the improvement of payload, in comparison with other methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York

    MATH  Google Scholar 

  2. Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proceedings of international conference on information systems, analysis and synthesis, pp 223–229

  3. Wu M, Liu B (2003) Data hiding in image and video. I. Fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695

    Article  MathSciNet  Google Scholar 

  4. Wu M, Yu H, Liu B (2003) Data hiding in image and video. II. Designs and applications. IEEE Trans Image Process 12(6):696–705

    Article  Google Scholar 

  5. Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331–339

    Article  Google Scholar 

  6. Wang C-T, Yu H-F (2012) A Markov-based reversible data hiding method based on histogram shifting. J Vis Commun Image Represent 23(5):798–811

    Article  Google Scholar 

  7. Naji A, Zaidan A, Zaidan B, Hameed SA, Khalifa OO (2009) Novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography. Int J Comput Sci Netw Secur 9(5):294–300

    Google Scholar 

  8. Ahadpour S, Majidpour M, Sadra Y (2012) Public key steganography using discrete cross-coupled chaotic maps. arXiv preprint arXiv:12110086

  9. Alia MA, Yahya A (2010) Public–key steganography based on matching method. Eur J Sci Res 40(2):223–231

    Google Scholar 

  10. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  11. Zou D, Shi YQ, Ni Z, Su W (2006) A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans Circuits Syst Video Technol 16(10):1294–1300

    Article  Google Scholar 

  12. Dosselmann R, Yang XD (2005) Existing and emerging image quality metrics. In: 2005 Canadian conference on electrical and computer engineering. IEEE, pp 1906–1913

  13. Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444

    Article  Google Scholar 

  14. Wang Z, Bovik AC, Lu L (2002) Why is image quality assessment so difficult? In: 2002 IEEE international conference on acoustics, speech, and signal processing (ICASSP). IEEE, pp IV-3313–IV-3316

  15. Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965

    Article  Google Scholar 

  16. Winkler S, Susstrunk S (2004) Visibility of noise in natural images. In: 2004 international society for optics and photonics electronic imaging, pp 121–129

  17. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612

    Article  Google Scholar 

  18. Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Secur (IJCSS) 6(3):168–187

    Google Scholar 

  19. Motamedi H, Jafari A (2012) A new image steganography based on denoising methods in wavelet domain. In: 2012 9th international ISC conference on information security and cryptology (ISCISC). IEEE, pp 18–25

  20. Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4):509–516

    Google Scholar 

  21. Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683

    Article  MATH  Google Scholar 

  22. Thien C-C, Lin J-C (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36(12):2875–2881

    Article  MATH  Google Scholar 

  23. Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167

    Article  MATH  Google Scholar 

  24. Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444

    Article  Google Scholar 

  25. Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287

    Article  Google Scholar 

  26. Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626

    Article  MATH  Google Scholar 

  27. Chang C-C, Kieu TD, Chou Y-C (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 international symposium on electronic commerce and security. IEEE, pp 16–21

  28. Molaei AM, Sedaaghi MH, Ebrahimnezhad H (2014) a blind steganography based on Reed-Solomon codes and optimal substitution table with improving payload and robustness. Tabriz J Electr Eng 43(2):43–59 (In Persian)

    Google Scholar 

  29. Molaei A, Sedaaghi M, Ebrahimnezhad H (2017) Steganography scheme based on Reed-Muller code with improving payload and ability to retrieval of destroyed data for digital images. AUT J Electr Eng 49(1):53–62

    Google Scholar 

  30. Zhang Y, Jiang J, Zha Y, Zhang H, Zhao S (2013) Research on embedding capacity and efficiency of information hiding based on digital images. Int J Intell Sci 3(02):77

    Article  Google Scholar 

  31. Jena B (2014) High payload digital image steganography using mixed edge detection mechanism. MTech thesis, National Institute of Technology Rourkela, India, Retrieved from http://ethesis.nitrkl.ac.in/6468/

  32. Yin Z-X, Chang C-C, Xu Q, Luo B (2015) Second-order steganographic method based on adaptive reference matrix. IET Image Proc 9(4):300–305

    Article  Google Scholar 

  33. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  Google Scholar 

  34. Chang C-C, Chou Y-C, Kieu TD (2008) An information hiding scheme using Sudoku. In: 2008 3rd international conference on innovative computing information and control ICICIC’08. IEEE, p 17

  35. Hong W, Chen T-S, Shiu C-W (2008) A minimal Euclidean distance searching technique for Sudoku steganography. In: 2008 international symposium on information science and engineering. IEEE, pp 515–518

  36. Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:1

    Google Scholar 

  37. Yin Z, Luo B (2015) MDE-based image steganography with large embedding capacity. Secur Commun Netw 9(8):721–728

    Article  Google Scholar 

  38. Ulker M, Arslan B (2018) A novel secure model: image steganography with logistic map and secret key. In: 2018 6th international symposium on digital forensic and security (ISDFS). IEEE, pp 1–5

  39. Pelikan M (2005) Hierarchical Bayesian optimization algorithm. In: Hierarchical Bayesian optimization algorithm. Springer, pp 105–129

  40. Kjaerulff UB, Madsen AL (2008) Bayesian networks and influence diagrams, vol 200. Springer, Berlin, p 114

    Book  MATH  Google Scholar 

  41. Cooper GF (1990) The computational complexity of probabilistic inference using Bayesian belief networks. Artif Intell 42(2–3):393–405

    Article  MathSciNet  MATH  Google Scholar 

  42. Heckerman D, Geiger D, Chickering DM (1995) Learning Bayesian networks: the combination of knowledge and statistical data. Mach Learn 20(3):197–243

    MATH  Google Scholar 

  43. Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309–347

    MATH  Google Scholar 

  44. Castillo E, Gutierrez JM, Hadi AS (2012) Expert systems and probabilistic network models. Springer, Berlin

    MATH  Google Scholar 

  45. Pelikan M, Goldberg DE, Cantu-Paz E (2000) Linkage problem, distribution estimation, and Bayesian networks. Evol Comput 8(3):311–340

    Article  Google Scholar 

  46. Ingemar JC, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann, Burlington

    Google Scholar 

  47. PourArian MR, Hanani A (2016) Blind steganography in color images by double wavelet transform and improved Arnold transform. Indones J Electr Eng Comput Sci 3(3):586–600

    Article  Google Scholar 

  48. Jin Y, Olhofer M, Sendhoff B (2001) Dynamic weighted aggregation for evolutionary multi-objective optimization: Why does it work and how? In: Proceedings of the 3rd annual conference on genetic and evolutionary computation. Morgan Kaufmann Publishers Inc., pp 1042–1049

  49. Da Ronco CC, Benini E (2014) A simplex-crossover-based multi-objective evolutionary algorithm. In: IAENG transactions on engineering technologies. Springer, pp 583–598

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amir Masoud Molaei.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Molaei, A.M., Ebrahimzadeh, A. Optimal steganography with blind detection based on Bayesian optimization algorithm. Pattern Anal Applic 22, 205–219 (2019). https://doi.org/10.1007/s10044-018-00773-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-018-00773-0

Keywords

Navigation