Abstract
Steganography, the hiding technique used to secure sensitive data (i.e., images, audio ) while communication takes place. In this paper, the message is embedded in color image in frequency domain exploiting Genetic Algorithm (GA) which provides the robustness i.e., the algorithm can withstand against any rigorous testing and brutal attack except destruction of the stego image. The fragmentation of 8-bit binary stream of each color component to 4-bit and applying Genetic Algorithm (GA) to increase the robustness of the scheme. Random Multiple bits are chosen to embed secret message which increases security along with the payload. The use of transform domain, hash function based random pixel and bit selections for data hiding, secrete data encryption and more over use of Genetic Algorithm (GA) for optimization is the novelty of the proposed work. Perspective and meticulous statistical analysis has been done to immune the algorithm from any attack. The algorithm proposed here is tested with benchmark tools like StirMark 4.0, Confusion Matrix (Receiver Operating Curve Characteristic (ROC) curve) along with steganalysis and statistical tools. Visual disturbance and distortion in stego image is also very insignificant here.






Similar content being viewed by others
References
Cachin C An Information-Theoretic Model for Steganography, presented at the 2nd Workshop on Information Hiding. In: Aucsmith, D (ed) Lecture Notes in Computer Science, vol 1525. Springer
Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit 36:1583–1595
Chanu YJ, Singh M, Tuithung T (2012) Image steganography and steganalysis - a survey. Int J Comput Appl 52(2):1–11
Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009(1):658047
Chen W-J, Chang C-C, Le Thn (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301
Chen M, Boroumand M, Fridrich J (2018) Deep Learning Regressors for Quantitative Steganalysis. Media Watermarking, Security, and Forensics, pp 160-1-160-7(7)
Chugh G, Yadav R, Saini R (2014) A new image steganographic approach based on mod factor for RGB images. Int J Signal Process Image Process Pattern Recogn 7 (3):27–44
Das S, Muhammad K, Bakshi S, Mukherjee I, Sa PK, Sangaiah AK, Bruno A (2018) Lip Biometric Template Security Framework Using Spatial Steganography, Pattern Recognition Letters. ISSN: 0167-8655
Datta B, Roy S, Roy S, Bandyopadhyay SK (2018) Multi-bit robust image steganography based on modular arithmetic, Multimedia Tools and Applications. ISSN: 1380-7501
Dumitrescu S, Wu X, Memon N (2002) On Steganalysis of Random LSB Embedding in Continuous-tone Images. IEEE ICIP 2002, New York, vol III, pp 641–644
Dumitrescu S, Wu X, Wang Z (2002) Information hiding, 5th international workshop, volume 2578 of lecture notes in computer science, Noordwijkerhout The Netherlands. Springer, New York, pp 355–372. In: Petitcolas FAP (ed)
Fan J, Upadhye S, Worster A (2006) Understanding receiver operating characteristic (ROC) curves. Can J Emerg Med (CJEM) 8(1):19–20. PubMed PMID: 17175625
He J, Lan W, Tang S (2017) A secure image sharing scheme with high quality stego-images based on steganography, Multimedia Tools and Applications, ISSN: 1380-7501 (Print) 1573-7721 (Online), vol 76, no 6, pp 7677–7698
Ioannidou A, Halkidis ST, Stephanides G (2012) A novel technique for image steganography based on a high payload method and edge detection. Expert Syst Appl 39:11517–11524
Johnson NF, Jajodia S (1998) Steganalysis of Images Created using Current Steganographic Software. Inf Hiding 1525:273–289
Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41:6123–6130
Kim C, Shin D, Shin D, Zhang X (2011) Improved steganographic embedding exploiting modification direction in multimedia communications. In: FTRA International Conference on Secure and Trust Computing, Data Management and Application. Springer, pp 130–138
Kim C (2014) Data hiding by an improved exploiting modification direction. Multimed Tools Appl 69(3):569–584
Lee C-F, Chang C-C, Wang K-H (2008) An improvement of emd embedding method for large payloads by pixel segmentation strategy. Image Vis Comput 26 (12):1670–1676
Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543–2554
Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76 (1):333–354
Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition, 2010 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, pp 467–471
Li X, Yang B, Cheng D, Zeng T (2009) A generalization of LSB matching. IEEE Signal Process Lett 16:69–72
Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58(C):146–156. ISSN:0923-5965
Liao X, Guo S, Yin J, Wang H, Li X, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033–10050. ISSN: 1380-7501
Lin C-C (2011) An information hiding scheme with minimal image distortion. Comput Stand Interfaces 33(5):477–484. ISSN: 0920-5489
Lin Y-T, Wang C-M, Chen W-S, Lin F-P, Lin W (2017) A novel data hiding algorithm for high dynamic range images. IEEE Trans Multimed 19(1):196–211
Michalewicz Z (1996) Genetic Algorithms + Data Structures = Evolution Programs. Springer, Berlin. ISBN 978-3540606765
Mitchell M (1996) An Introduction to Genetic Algorithms. MIT Press, Cambridge. ISBN 9780585030944
Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. KSII Trans Internet Inf Syst 9:1938–1962
Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A Novel Magic LSB Substitution Method (m-LSB-SM) using Multi-Level Encryption and Achromatic Component of an Image. J Multimed Tools Appl Arch 75(22):14867–14893
Mukherjee (Ganguly) N, Paul G, Saha SK (2018) An efficient multi-bit steganography algorithm in spatial domain with two-layer security. Multimed Tools Appl 77(14):18451–18481
Petitcolas FAP, Anderson JR, Kuhn GM (1998) Attacks on copyright marking systems Aucsmith D (ed)
Pradhan A, Sahu AK, Swain G, Sekhar KR (2016) Performance evaluation parameters of image steganography techniques, IEEE International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India. ISBN: 978-1-5090-1112-4
Stirmark[online]. Available at http://www.petitcolas.net/fabien/watermarking/stirmark/
Stinson DR (2005) Cryptography: Theory and practice, 3rd edn. CRC Press
Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. J Inf Secur Appl 34(2):142–151
Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognit 34:671–683
Wang H, Wang S (2004) Cyber Warfare: Steganography vs. Steganalysis. Commun ACM 47(10):76–82
Weiqi L, Fangjun H, Jiwu H (2010) Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensic Secur 5:201–214
Wong K, Qi X, Tanaka K (2007) A DCT-based Mod4 steganographic method. Signal Process 87:1251–1263
Xu G, Wu H-Z, Shi YQ (2016) Ensemble of CNNs for steganalysis: An empirical study. In: Perez-Gonzales F, Cayre F, Bas P (eds) The 4th ACM Workshop on Information Hiding and Multimedia Security, IH &MMSec ’16, Vigo, pp 5–10
Xu G, Wu HZ, Shi YQ (2016) Structural design of convolutional neural networks for steganalysis. IEEE Signal Process Lett 23(5):708–712
Xu G, Stamm M, Kirchner M, Voloshynovskiy S (2017) Deep convolutional neural network to detect j-UNIWARD, The 5th ACM Workshop on Information Hiding and Multimedia Security, Philadelphia
Yang CY, Wang WF (2015) Block-Based Colour Image Steganography Using Smart Pixel-Adjustment. In: Proceedings of Genetic and Evolutionary Computing, Advances in Intelligent Systems and Computing. Springer, Cham, vol 329, pp 145–154
Ye J, Ni J, Yi Y (2017) Deep learning hierarchical representations for image steganalysis. IEEE Trans Inf Forensic Secur 12(11):2545–2557
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863–4882
Zhang X, Wang S (2006) Dynamical running coding in digital steganography. IEEE Signal Process Lett 13(3):165–168
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Biswas, R., Bandyapadhay, S.K. Random selection based GA optimization in 2D-DCT domain color image steganography. Multimed Tools Appl 79, 7101–7120 (2020). https://doi.org/10.1007/s11042-019-08497-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08497-x