Abstract
Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high capacity of secret data and ensuring high security and quality of stego image is a major challenge. In this paper, a hybrid steganography method based on Haar Discrete Wavelet Transform, Lempel Ziv Welch algorithm, Genetic Algorithm, and the Optimal Pixel Adjustment Process is proposed to improve the quality of the stego image and increase the capacity for secret data. The cover image is divided into non-overlapping blocks of n × n pixels. Then, the Haar Discrete Wavelet Transform is used to increase the robustness of the stego image against attacks. In order to increase the capacity for, and security of, the hidden image, the Lempel Ziv Welch algorithm is applied on the secret message. After that, the Genetic Algorithm is employed to give the encoded and compressed secret message cover image coefficients. The Genetic Algorithm is used to find the optimal mapping function for each block in the image. Lastly, the Optimal Pixel Adjustment Process is applied to reduce the error, i.e., the difference between the cover image blocks and the stego image blocks. This step is a further improvement to the stego image quality. The proposed method was evaluated using four standard images as covers and three types of secret messages. The results demonstrate higher visual quality of the stego image with a large size of embedded secret data than what is generated by already-known techniques. The experimental results show that the information-hiding capacity of the proposed method reached to 50% with high PSNR (52.83 dB). Thus, the herein proposed hybrid image steganography method improves the quality of the stego image over those of the state-of-the-art methods.
Similar content being viewed by others
References
Abdallah, E. E., Hamza, A. B., & Bhattacharya, P. (2007). MPEG video watermarking using tensor singular value decomposition. In M. Kamel & A. Campilho (Eds.), Image Anal Recognit (pp. 772–783). Springer.
Abdallah, E. E., Hamza, A. B., & Bhattacharya, P. (2010). Video watermarking using wavelet transform and tensor algebra. Signal Image Video Processing, 4, 233–245. https://doi.org/10.1007/s11760-009-0114-7
Al-Arashi, W. H., Ibrahim, H., & Suandi, S. A. (2014). Optimizing principal component analysis performance for face recognition using genetic algorithm. Neuro Computing, 128, 415–420.
Al-Ashwal, A, Y., Al-Mawgani, A. H. M., Al-Arashi, W. H. (2015). An image steganography algorithm for hiding data based on HDWT, LZW and OPAP. Journal of Science and Technology, 20.
Atawneh, S., & Sumari, P. (2013). Hybrid and blind steganographic method for digital Images based on DWT and chaotic map. The Journal of Communication, 8, 690–699.
Bansal, A., Muttoo, S. K., & Kumar, V. (2014). Data hiding approach based on eight-queens problem and pixel mapping method. International Journal of Signal Processing Image Process Pattern Recognition, 7, 47–58.
Bashardoost, M., Sulong, G. B., & Gerami, P. (2013). Enhanced LSB image steganography method by using knight tour algorithm, Vigenere encryption and LZW compression. International Journal of Computer Science Issues (IJCSI), 10, 221–225.
Bhattacharyya, S., & Sanyal, G. (2012). A robust image steganography using dwt difference modulation (DWTDM). International Journal of Computer Network Information Security, 4, 27–40.
Chan, C.-K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37, 469–474.
Chen, P.-Y., & Lin, H.-J. (2006). A DWT based approach for image steganography. International Journal of Applied Science Engineering, 4, 275–290.
Cox, I. J., Miller, M. L., Bloom, J. A., Kalker, T., & Fridrich, J. (2008). Digital watermarking and steganography (2nd ed.). Morgan Kaufmann publications.
El-latif, A. A. A., Abd-el-atty, B., & Venegas-andraca, S. E. (2019). A novel image steganography technique based on quantum substitution boxes. Optics & Laser Technology, 116, 92–102. https://doi.org/10.1016/j.optlastec.2019.03.005
El Safy, R. O., Zayed, H. H. & El Dessouki, A. (2009). An adaptive steganographic technique based on integer wavelet transform. In Int Conf Netw Media Converg (pp. 111–117). IEEE.
Ghasemi, E., Shanbehzadeh, J. & Fassihi, N. (2012). High capacity image steganography based on genetic algorithm and wavelet transform. Intelligent Control and Innovative Computing 395–404.
Goel, S., Kumar, P., & Saraswat, R. (2014). High capacity image steganography method using LZW, IWT and modified pixel indicator technique. International Journal Computer Science Information Technology, 5, 3759–3763.
Kamal, A. H. M. & Islam, M. M. (2016). Enhancing the performance of the data embedment process through encoding errors. Electron, 5.
Kanzariya, N., Nimavat, A. & Patel, H. (2013). Security of digital images using steganography techniques based on LSB, DCT and Huffman encoding. In Proceedings of international conference on advances in signal processing and communication (pp. 826–33).
Kaur, R., & Singh, B. (2021). A hybrid algorithm for robust image steganography. Multidimensional Systems and Signal Processing, 32, 1–23.
Kaur, R., & Toor, R. K. (2012). Coherent steganography using segmentation and DCT. International Journal of Information Technology, 6, 23–25.
Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Processing, 6, 677–686.
Kutter, M. & Petitcolas, F. A. P. (1999). Fair benchmark for image watermarking systems. Electron Imaging ’99 Secur Watermarking Multimed Contents. International Society for Optics and Photonics (pp. 226–39).
Liu, H. & Lee, C. (2019). High-capacity reversible image steganography based on pixel value ordering. EURASIP Journal on Image and Video Processing 1–15.
Manisha, S., & Sharmila, T. S. (2019). A two-level secure data hiding algorithm for video steganography. Multidimensional Systems and Signal Processing, 30, 529–542.
Mohamed, M., Al-Afari, F., & Bamatraf, M. A. (2011). Data hiding by LSB substitution using genetic optimal key-permutation. International Arabian Journal of e-Technology, 2, 11–17.
Nag, A., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). A novel technique for image steganography based on DWT and Huffman encoding. International Journal of Computer Science and Security, 4, 561–570.
Pol, K. (2014). Image steganography based on DWT using Huffman LWZ encoding. International Journal of Engineering and Technology Research, 2, 100–103.
Rajkumar, P., Kar, R., Bhattacharjee, A. K., & Dharmasa, H. (2012). A comparative analysis of steganographic data hiding within digital images. International Journal of Computers and Applications, 53, 1–6.
Reddy, H. S. M., & Raja, K. B. (2012). Wavelet based secure steganography with scrambled payload. International Journal of Innovative Technology and Exploring Engineering, 1, 121–129.
Sharda, S., & Budhiraja, S. (2013). Image steganography: A review. International Journal of Emerging Technology and Advanced Engineering, 3, 707–710.
Singh, S., & Singh, A. (2013). A review on the various recent steganography techniques. International Journal of Computer Science Network, 2, 142–156.
Sohag, S. A., Islam, M. K., & Islam, M. B. (2013). A novel approach for image steganography using dynamic substitution and secret key. American Journal of Engineering Research, 2, 118–126.
Soleimanpour, M., Talebi, S., & Azadi-Motlagh, H. (2013). A novel technique for steganography method based on improved genetic algorithm optimization in spatial domain. Iran Journal of Electrical Electronic Engineering, 9, 67–75.
Thanikaiselvan, V., Kumar, S., Neelima, N., & Amirtharajan, R. (2011). Data battle on the digital field between horse cavalry and interlopers. Journal of Theoretical and Applied Information Technology, 29, 85–91.
Tiwari, A., Yadav, S. R., & Mittal, N. K. (2014). A review on different image steganography techniques. International Journal of Engineering Innovative Technology, 3, 121–124.
Zakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A. & Jung, K. H. (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Science, 10.
Acknowledgements
The authors would like to express their Gratitude to the ministry of education and the deanship of scientific research – Najran University – Kingdom of Saudi Arabia for their financial and Technical support under Code Number (NU/-/SERC/10/581).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Almawgani, A.H.M., Alhawari, A.R.H., Hindi, A.T. et al. Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data. Multidim Syst Sign Process 33, 561–578 (2022). https://doi.org/10.1007/s11045-021-00793-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11045-021-00793-w