Skip to main content
Top
Published in: Multimedia Systems 5/2023

28-03-2022 | Special Issue Paper

Optimized multimedia data through computationally intelligent algorithms

Authors: Neha Sharma, Chinmay Chakraborty, Rajeev Kumar

Published in: Multimedia Systems | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the field of data exchange, the security of information is the critical aspect. This void in the security helped the evolution of steganography to address the problem of security, especially when highly critical information exchange is the priority. Better and advanced level of security has been attained using the techniques of steganography with cryptography. However, it has been observed that steganographic techniques principled on computationally intelligent or inspired by nature algorithms are gaining much attention. The paper proposes a method for image steganography in transform domain using hybridization of two computationally intelligent algorithms, i.e., firefly optimization algorithm and ant colony optimization algorithm with Huffman encoding to address the gap of high payload. Comparative analysis of the proposed steganographic tool with other existing methods and analysis of the values obtained against some key performance terms like PSNR (peak signal to noise ratio), MSE (mean square error), BER (bit error rate) and SSI (structural similarity index) determines the proposed algorithm as a powerful method. The proposed tool achieves the PSNR of 68.06 dB and the embedding capacity of 985,682 bits.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH
2.
go back to reference Ghebleh, M., Kanso, A.: A robust chaotic algorithm for digital image steganography. Commun Nonlinear SciNumer Simul 19(6), 1898–1907 (2014)CrossRefMATH Ghebleh, M., Kanso, A.: A robust chaotic algorithm for digital image steganography. Commun Nonlinear SciNumer Simul 19(6), 1898–1907 (2014)CrossRefMATH
3.
go back to reference Tu, T.Y., Wang, C.H.: Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Sig Process 108, 278–328 (2015)CrossRef Tu, T.Y., Wang, C.H.: Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Sig Process 108, 278–328 (2015)CrossRef
4.
go back to reference Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography. In: The Morgan Kaufmann series in multimedia information and systems, 2008. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography. In: The Morgan Kaufmann series in multimedia information and systems, 2008.
5.
go back to reference Samidha, D., Agrawal, D.: Random image steganography in spatial domain, In IEEE, 2013. Samidha, D., Agrawal, D.: Random image steganography in spatial domain, In IEEE, 2013.
6.
go back to reference Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: Spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. 12(15) (2012) Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: Spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. 12(15) (2012)
8.
go back to reference Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. International conference on information and communication technologies (ICICT 2014). Procedia Comput. Sci. 46, 612–618 (2015)CrossRef Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. International conference on information and communication technologies (ICICT 2014). Procedia Comput. Sci. 46, 612–618 (2015)CrossRef
10.
go back to reference Sun, Z., et al.: CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks. Wirel Netw 23(4), 1201–1222 (2017)MathSciNetCrossRef Sun, Z., et al.: CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks. Wirel Netw 23(4), 1201–1222 (2017)MathSciNetCrossRef
17.
go back to reference Amsaveni, A., Arun Kumar, C.: An efficient data hiding scheme using firefly algorithm in spatial domain. In: 2nd International Conference on electronics and communication system, pp. 650–655. 2015. Amsaveni, A., Arun Kumar, C.: An efficient data hiding scheme using firefly algorithm in spatial domain. In: 2nd International Conference on electronics and communication system, pp. 650–655. 2015.
18.
go back to reference Tariq, Z., Al-Tai, Z.T.M., Abass, J.M., Al-Hameed, O.Y.A.: Image steganography between firefly and PSO algorithms. Int. J. Comput. Sci. Inf. Secur. 15(1), 9–21 (2017) Tariq, Z., Al-Tai, Z.T.M., Abass, J.M., Al-Hameed, O.Y.A.: Image steganography between firefly and PSO algorithms. Int. J. Comput. Sci. Inf. Secur. 15(1), 9–21 (2017)
20.
go back to reference Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence. Wiley, West Sussex (2005) Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence. Wiley, West Sussex (2005)
21.
go back to reference Engelbrecht, A.P.: Computational Intelligence: An Introduction. Wiley, West Sussex (2007)CrossRef Engelbrecht, A.P.: Computational Intelligence: An Introduction. Wiley, West Sussex (2007)CrossRef
22.
go back to reference Song, H., Rawat, D., Jeschke, S., Brecher, C.: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 1–514. Academic Press, Boston (2016) Song, H., Rawat, D., Jeschke, S., Brecher, C.: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 1–514. Academic Press, Boston (2016)
23.
go back to reference Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles and Applications, pp. 1–906. Wiley, Hoboken (2017)CrossRef Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles and Applications, pp. 1–906. Wiley, Hoboken (2017)CrossRef
27.
go back to reference Siva Raja, P.M., Baburaj, E.: An efficient data embedding scheme for digital images based on particle swarm optimization with LSBMR. IET Digital Library, 2013, pp. 17–24 Siva Raja, P.M., Baburaj, E.: An efficient data embedding scheme for digital images based on particle swarm optimization with LSBMR. IET Digital Library, 2013, pp. 17–24
28.
go back to reference Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: Abraham, A., et al. (eds.) ACC 2011, Part III, CCIS 192, pp. 259–268, 2011. Springer, Berlin 2011 Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: Abraham, A., et al. (eds.) ACC 2011, Part III, CCIS 192, pp. 259–268, 2011. Springer, Berlin 2011
31.
go back to reference Jiang, M., et al.: Dynamic measurement errors prediction for sensors based on firefly algorithm optimize support vector machine. Sustain. Cities Soc. 35, 250–256 (2017)CrossRef Jiang, M., et al.: Dynamic measurement errors prediction for sensors based on firefly algorithm optimize support vector machine. Sustain. Cities Soc. 35, 250–256 (2017)CrossRef
38.
go back to reference Edward Jero, S., Ramu, P., Swaminathan, R.: Imperceptibility—robustness tradeoff studies for ecg steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)CrossRef Edward Jero, S., Ramu, P., Swaminathan, R.: Imperceptibility—robustness tradeoff studies for ecg steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)CrossRef
39.
go back to reference Priya, A.: High capacity and optimized image steganography technique based on ant colony optimization algorithm. Int. J. Sci. Res. Eng. Dev. 2(1) (2019) Priya, A.: High capacity and optimized image steganography technique based on ant colony optimization algorithm. Int. J. Sci. Res. Eng. Dev. 2(1) (2019)
42.
go back to reference Bajaj, R., Bedi, P., Pal, S.K.: Best hiding capacity scheme for variable length messages using particle swarm optimization. In: SEMCCO, pp. 230–237, 2010 Bajaj, R., Bedi, P., Pal, S.K.: Best hiding capacity scheme for variable length messages using particle swarm optimization. In: SEMCCO, pp. 230–237, 2010
44.
go back to reference Bedi, P., Bansal, R., Sehgal, P.: Using PSO in a spatial domain-based image hiding scheme with distortion tolerance. ComputElectrEng 39, 640–654 (2013) Bedi, P., Bansal, R., Sehgal, P.: Using PSO in a spatial domain-based image hiding scheme with distortion tolerance. ComputElectrEng 39, 640–654 (2013)
45.
go back to reference Nickfarjam, A.M., Azimifar Z.: Image steganography based on pixel ranking and particle swarm optimization. In: Proceedings of the 16th CSI international symposium on artificial intelligence and signal processing, pp. 360–363, 2012. Nickfarjam, A.M., Azimifar Z.: Image steganography based on pixel ranking and particle swarm optimization. In: Proceedings of the 16th CSI international symposium on artificial intelligence and signal processing, pp. 360–363, 2012.
46.
go back to reference Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: ACC, Part III, CCIS 192, pp. 259–268, 2011 Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: ACC, Part III, CCIS 192, pp. 259–268, 2011
49.
go back to reference Jude Hemantha, D., Anithaa, J., Popescub, D.E, Son, L.H.: A modified genetic algorithm for performance improvement of transform-based image steganography systems. J. Intell. Fuzzy Syst. 2018 Jude Hemantha, D., Anithaa, J., Popescub, D.E, Son, L.H.: A modified genetic algorithm for performance improvement of transform-based image steganography systems. J. Intell. Fuzzy Syst. 2018
Metadata
Title
Optimized multimedia data through computationally intelligent algorithms
Authors
Neha Sharma
Chinmay Chakraborty
Rajeev Kumar
Publication date
28-03-2022
Publisher
Springer Berlin Heidelberg
Published in
Multimedia Systems / Issue 5/2023
Print ISSN: 0942-4962
Electronic ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-022-00918-6

Other articles of this Issue 5/2023

Multimedia Systems 5/2023 Go to the issue