Skip to main content

Advertisement

Log in

Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data

  • Published:
Multidimensional Systems and Signal Processing Aims and scope Submit manuscript

Abstract

Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the tradeoff between managing high capacity of secret data and ensuring high security and quality of stego image is a major challenge. In this paper, a hybrid steganography method based on Haar Discrete Wavelet Transform, Lempel Ziv Welch algorithm, Genetic Algorithm, and the Optimal Pixel Adjustment Process is proposed to improve the quality of the stego image and increase the capacity for secret data. The cover image is divided into non-overlapping blocks of n × n pixels. Then, the Haar Discrete Wavelet Transform is used to increase the robustness of the stego image against attacks. In order to increase the capacity for, and security of, the hidden image, the Lempel Ziv Welch algorithm is applied on the secret message. After that, the Genetic Algorithm is employed to give the encoded and compressed secret message cover image coefficients. The Genetic Algorithm is used to find the optimal mapping function for each block in the image. Lastly, the Optimal Pixel Adjustment Process is applied to reduce the error, i.e., the difference between the cover image blocks and the stego image blocks. This step is a further improvement to the stego image quality. The proposed method was evaluated using four standard images as covers and three types of secret messages. The results demonstrate higher visual quality of the stego image with a large size of embedded secret data than what is generated by already-known techniques. The experimental results show that the information-hiding capacity of the proposed method reached to 50% with high PSNR (52.83 dB). Thus, the herein proposed hybrid image steganography method improves the quality of the stego image over those of the state-of-the-art methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Abdallah, E. E., Hamza, A. B., & Bhattacharya, P. (2007). MPEG video watermarking using tensor singular value decomposition. In M. Kamel & A. Campilho (Eds.), Image Anal Recognit (pp. 772–783). Springer.

    Chapter  Google Scholar 

  • Abdallah, E. E., Hamza, A. B., & Bhattacharya, P. (2010). Video watermarking using wavelet transform and tensor algebra. Signal Image Video Processing, 4, 233–245. https://doi.org/10.1007/s11760-009-0114-7

    Article  MATH  Google Scholar 

  • Al-Arashi, W. H., Ibrahim, H., & Suandi, S. A. (2014). Optimizing principal component analysis performance for face recognition using genetic algorithm. Neuro Computing, 128, 415–420.

    Google Scholar 

  • Al-Ashwal, A, Y., Al-Mawgani, A. H. M., Al-Arashi, W. H. (2015). An image steganography algorithm for hiding data based on HDWT, LZW and OPAP. Journal of Science and Technology, 20.

  • Atawneh, S., & Sumari, P. (2013). Hybrid and blind steganographic method for digital Images based on DWT and chaotic map. The Journal of Communication, 8, 690–699.

    Article  Google Scholar 

  • Bansal, A., Muttoo, S. K., & Kumar, V. (2014). Data hiding approach based on eight-queens problem and pixel mapping method. International Journal of Signal Processing Image Process Pattern Recognition, 7, 47–58.

    Article  Google Scholar 

  • Bashardoost, M., Sulong, G. B., & Gerami, P. (2013). Enhanced LSB image steganography method by using knight tour algorithm, Vigenere encryption and LZW compression. International Journal of Computer Science Issues (IJCSI), 10, 221–225.

    Google Scholar 

  • Bhattacharyya, S., & Sanyal, G. (2012). A robust image steganography using dwt difference modulation (DWTDM). International Journal of Computer Network Information Security, 4, 27–40.

    Article  Google Scholar 

  • Chan, C.-K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37, 469–474.

    Article  Google Scholar 

  • Chen, P.-Y., & Lin, H.-J. (2006). A DWT based approach for image steganography. International Journal of Applied Science Engineering, 4, 275–290.

    Google Scholar 

  • Cox, I. J., Miller, M. L., Bloom, J. A., Kalker, T., & Fridrich, J. (2008). Digital watermarking and steganography (2nd ed.). Morgan Kaufmann publications.

    Google Scholar 

  • El-latif, A. A. A., Abd-el-atty, B., & Venegas-andraca, S. E. (2019). A novel image steganography technique based on quantum substitution boxes. Optics & Laser Technology, 116, 92–102. https://doi.org/10.1016/j.optlastec.2019.03.005

    Article  Google Scholar 

  • El Safy, R. O., Zayed, H. H. & El Dessouki, A. (2009). An adaptive steganographic technique based on integer wavelet transform. In Int Conf Netw Media Converg (pp. 111–117). IEEE.

  • Ghasemi, E., Shanbehzadeh, J. & Fassihi, N. (2012). High capacity image steganography based on genetic algorithm and wavelet transform. Intelligent Control and Innovative Computing 395–404.

  • Goel, S., Kumar, P., & Saraswat, R. (2014). High capacity image steganography method using LZW, IWT and modified pixel indicator technique. International Journal Computer Science Information Technology, 5, 3759–3763.

    Google Scholar 

  • Kamal, A. H. M. & Islam, M. M. (2016). Enhancing the performance of the data embedment process through encoding errors. Electron, 5.

  • Kanzariya, N., Nimavat, A. & Patel, H. (2013). Security of digital images using steganography techniques based on LSB, DCT and Huffman encoding. In Proceedings of international conference on advances in signal processing and communication (pp. 826–33).

  • Kaur, R., & Singh, B. (2021). A hybrid algorithm for robust image steganography. Multidimensional Systems and Signal Processing, 32, 1–23.

    Article  MathSciNet  Google Scholar 

  • Kaur, R., & Toor, R. K. (2012). Coherent steganography using segmentation and DCT. International Journal of Information Technology, 6, 23–25.

    Google Scholar 

  • Khodaei, M., & Faez, K. (2012). New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing. IET Image Processing, 6, 677–686.

    Article  Google Scholar 

  • Kutter, M. & Petitcolas, F. A. P. (1999). Fair benchmark for image watermarking systems. Electron Imaging ’99 Secur Watermarking Multimed Contents. International Society for Optics and Photonics (pp. 226–39).

  • Liu, H. & Lee, C. (2019). High-capacity reversible image steganography based on pixel value ordering. EURASIP Journal on Image and Video Processing 1–15.

  • Manisha, S., & Sharmila, T. S. (2019). A two-level secure data hiding algorithm for video steganography. Multidimensional Systems and Signal Processing, 30, 529–542.

    Article  Google Scholar 

  • Mohamed, M., Al-Afari, F., & Bamatraf, M. A. (2011). Data hiding by LSB substitution using genetic optimal key-permutation. International Arabian Journal of e-Technology, 2, 11–17.

    Google Scholar 

  • Nag, A., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). A novel technique for image steganography based on DWT and Huffman encoding. International Journal of Computer Science and Security, 4, 561–570.

    Google Scholar 

  • Pol, K. (2014). Image steganography based on DWT using Huffman LWZ encoding. International Journal of Engineering and Technology Research, 2, 100–103.

    Google Scholar 

  • Rajkumar, P., Kar, R., Bhattacharjee, A. K., & Dharmasa, H. (2012). A comparative analysis of steganographic data hiding within digital images. International Journal of Computers and Applications, 53, 1–6.

    Article  Google Scholar 

  • Reddy, H. S. M., & Raja, K. B. (2012). Wavelet based secure steganography with scrambled payload. International Journal of Innovative Technology and Exploring Engineering, 1, 121–129.

    Google Scholar 

  • Sharda, S., & Budhiraja, S. (2013). Image steganography: A review. International Journal of Emerging Technology and Advanced Engineering, 3, 707–710.

    Google Scholar 

  • Singh, S., & Singh, A. (2013). A review on the various recent steganography techniques. International Journal of Computer Science Network, 2, 142–156.

    Google Scholar 

  • Sohag, S. A., Islam, M. K., & Islam, M. B. (2013). A novel approach for image steganography using dynamic substitution and secret key. American Journal of Engineering Research, 2, 118–126.

    Google Scholar 

  • Soleimanpour, M., Talebi, S., & Azadi-Motlagh, H. (2013). A novel technique for steganography method based on improved genetic algorithm optimization in spatial domain. Iran Journal of Electrical Electronic Engineering, 9, 67–75.

    Article  Google Scholar 

  • Thanikaiselvan, V., Kumar, S., Neelima, N., & Amirtharajan, R. (2011). Data battle on the digital field between horse cavalry and interlopers. Journal of Theoretical and Applied Information Technology, 29, 85–91.

    Google Scholar 

  • Tiwari, A., Yadav, S. R., & Mittal, N. K. (2014). A review on different image steganography techniques. International Journal of Engineering Innovative Technology, 3, 121–124.

    Google Scholar 

  • Zakaria, A. A., Hussain, M., Wahab, A. W. A., Idris, M. Y. I., Abdullah, N. A. & Jung, K. H. (2018). High-capacity image steganography with minimum modified bits based on data mapping and LSB substitution. Applied Science, 10.

Download references

Acknowledgements

The authors would like to express their Gratitude to the ministry of education and the deanship of scientific research – Najran University – Kingdom of Saudi Arabia for their financial and Technical support under Code Number (NU/-/SERC/10/581).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. H. M. Almawgani.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Almawgani, A.H.M., Alhawari, A.R.H., Hindi, A.T. et al. Hybrid image steganography method using Lempel Ziv Welch and genetic algorithms for hiding confidential data. Multidim Syst Sign Process 33, 561–578 (2022). https://doi.org/10.1007/s11045-021-00793-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11045-021-00793-w

Keywords

Navigation