Skip to main content
Erschienen in: Wireless Personal Communications 1/2024

30.03.2024

Image Steganography Method for Securing Multiple Images Using LSB–GA

verfasst von: Palanichamy Naveen, R. Jayaraghavi

Erschienen in: Wireless Personal Communications | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Image steganography is renowned for its flexibility and frequency in the current scenario. This article presents a combination of LSB (Least Significant Bit) and GA (Genetic Algorithm) to hide various forms of data—text, and images. A novel combination of steganography techniques is used to transmit complete secret data. Also, multiple color images are embedded in a single color image, showing increased secret data holding capacity. Furthermore, the application of GA assures increased security. The excellence of the stego image and retrieved images are evaluated in terms of Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Metric (SSIM), Correlation coefficient, and Bit Error Rate (BER). Hence, this article is targeted to transmit multiple color images with no loss and improved security using GA and we achieved SSIM between 0.996 to 1.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.CrossRef Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal Processing, 90(3), 727–752.CrossRef
3.
Zurück zum Zitat Boyat, A. K., Joshi, B. K. (2015). A review paper: Noise models in digital image processing. Signal & Image Processing: An International Journal (SIPIJ), 6(2) Boyat, A. K., Joshi, B. K. (2015). A review paper: Noise models in digital image processing. Signal & Image Processing: An International Journal (SIPIJ), 6(2)
4.
Zurück zum Zitat Khamrui, A., & Mandal, J. K. (2013). A genetic algorithm based steganography using discrete cosine transformation (GASDCT). Procedia Technology, 10, 105–111.CrossRef Khamrui, A., & Mandal, J. K. (2013). A genetic algorithm based steganography using discrete cosine transformation (GASDCT). Procedia Technology, 10, 105–111.CrossRef
7.
Zurück zum Zitat Baby, D., Thomas, J., Augustine, G., George, E., & Michael, N. R. (2015). A novel DWT based image securing method using steganography. Procedia Computer Science, 46, 612–618.CrossRef Baby, D., Thomas, J., Augustine, G., George, E., & Michael, N. R. (2015). A novel DWT based image securing method using steganography. Procedia Computer Science, 46, 612–618.CrossRef
10.
Zurück zum Zitat Faheem Ahmed H, Rizwan U (2013) Embedding multiple images in an image using bit plane slicing. International Journal of Advanced Research in Computer Science and Software Engineering 3(1) Faheem Ahmed H, Rizwan U (2013) Embedding multiple images in an image using bit plane slicing. International Journal of Advanced Research in Computer Science and Software Engineering 3(1)
12.
Zurück zum Zitat Hemalatha S, Acharya UD, Renuka A, Kamath PR, (2013) A secure and high capacity image steganography technique. Signal & Image Processing: An International Journal (SIPIJ) 4(1) Hemalatha S, Acharya UD, Renuka A, Kamath PR, (2013) A secure and high capacity image steganography technique. Signal & Image Processing: An International Journal (SIPIJ) 4(1)
13.
Zurück zum Zitat Mehra, H., Sahu, T. K., Tiwari, G. (2016). Steganography using genetic algorithm along with visual cryptography for wireless network application. International Journal of Advanced Research in Computer and Communication Engineering 5(2). Mehra, H., Sahu, T. K., Tiwari, G. (2016). Steganography using genetic algorithm along with visual cryptography for wireless network application. International Journal of Advanced Research in Computer and Communication Engineering 5(2).
14.
Zurück zum Zitat Kajal, I., Rohil, H., & Kajal, A. (2014). LZW based image steganography using Kekre’s Algorithm. (IJCSIT) International Journal of Computer Science and Information Technologies, 5(2), 2643–2648. Kajal, I., Rohil, H., & Kajal, A. (2014). LZW based image steganography using Kekre’s Algorithm. (IJCSIT) International Journal of Computer Science and Information Technologies, 5(2), 2643–2648.
15.
Zurück zum Zitat Riley, L., Mandal, J. K., & Das, D. (2012). Colour image steganography based on pixel value differencing in spatial domain. International Journal of Information Sciences and Techniques (IJIST) 2. Riley, L., Mandal, J. K., & Das, D. (2012). Colour image steganography based on pixel value differencing in spatial domain. International Journal of Information Sciences and Techniques (IJIST) 2.
16.
Zurück zum Zitat Mandal, J. K., & Khamrui, A. (2014). (2014) ‘A genetic-algorithm-based steganography on color images (GASCI).’ International Journal of Signal and Imaging Systems Engineering, 7(1), 59.CrossRef Mandal, J. K., & Khamrui, A. (2014). (2014) ‘A genetic-algorithm-based steganography on color images (GASCI).’ International Journal of Signal and Imaging Systems Engineering, 7(1), 59.CrossRef
17.
Zurück zum Zitat Kamboj, P., & Rani, V. (2013). A brief study of various noise model and filtering techniques. Journal of Global Research in Computer Science, 4(4), 166–171. Kamboj, P., & Rani, V. (2013). A brief study of various noise model and filtering techniques. Journal of Global Research in Computer Science, 4(4), 166–171.
18.
Zurück zum Zitat Kavitha, K. K., Koshti, A., & Dunghav, P. (2012). Steganography using least significant bit algorithm. International Journal of Engineering Research and Applications, 2(3), 338–341. Kavitha, K. K., Koshti, A., & Dunghav, P. (2012). Steganography using least significant bit algorithm. International Journal of Engineering Research and Applications, 2(3), 338–341.
20.
Zurück zum Zitat Liu, S., Liu, Y., Feng, C., Zhao, H. (2021) An efficient video steganography method based on HEVC. In: Huang, D. S., Jo, K. H., Li, J., Gribova, V., Bevilacqua, V. (Eds.), Intelligent computing theories and application. ICIC 2021. Lecture Notes in Computer Science, Vol 12836. Springer, Cham. https://doi.org/10.1007/978-3-030-84522-3_26 Liu, S., Liu, Y., Feng, C., Zhao, H. (2021) An efficient video steganography method based on HEVC. In: Huang, D. S., Jo, K. H., Li, J., Gribova, V., Bevilacqua, V. (Eds.), Intelligent computing theories and application. ICIC 2021. Lecture Notes in Computer Science, Vol 12836. Springer, Cham. https://​doi.​org/​10.​1007/​978-3-030-84522-3_​26
21.
Zurück zum Zitat Mukherjee, S., Deb, M., Agarwal, P. K., Roy, A. (2012). A new approach to steganography. In: Meghanathan, N., Chaki, N., Nagamalai, D. (Eds.), Advances in computer science and information technology. Networks and communications. CCSIT 2012. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, Vol. 84. Berlin: Springer. https://doi.org/10.1007/978-3-642-27299-8_25 Mukherjee, S., Deb, M., Agarwal, P. K., Roy, A. (2012). A new approach to steganography. In: Meghanathan, N., Chaki, N., Nagamalai, D. (Eds.), Advances in computer science and information technology. Networks and communications. CCSIT 2012. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering, Vol. 84. Berlin: Springer. https://​doi.​org/​10.​1007/​978-3-642-27299-8_​25
23.
Zurück zum Zitat Singh, R., & Chawla, G. (2014). A review on image steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 4, 686–689. Singh, R., & Chawla, G. (2014). A review on image steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 4, 686–689.
24.
Zurück zum Zitat Rehana Begum, R. D., & Pradeep, S. (2014). Best approach for lsb based steganography using genetic algorithm and visual cryptography for secured data hiding and transmission over networks. International Journal of Advanced Research in Computer Science and Software Engineering, 4(6), 114–119. Rehana Begum, R. D., & Pradeep, S. (2014). Best approach for lsb based steganography using genetic algorithm and visual cryptography for secured data hiding and transmission over networks. International Journal of Advanced Research in Computer Science and Software Engineering, 4(6), 114–119.
25.
Zurück zum Zitat Verma, R., Ali, J. (2013). A comparative study of various types of image noise and efficient noise removal techniques. International Journal of Advanced Research in Computer Science and Software Engineering 3(10) Verma, R., Ali, J. (2013). A comparative study of various types of image noise and efficient noise removal techniques. International Journal of Advanced Research in Computer Science and Software Engineering 3(10)
26.
Zurück zum Zitat Laskar, S. A., & Hemachandran, K. (2012). High capacity data hiding using LSB steganography and encryption. International Journal of Database Management Systems (IJDMS), 4(6), 57.CrossRef Laskar, S. A., & Hemachandran, K. (2012). High capacity data hiding using LSB steganography and encryption. International Journal of Database Management Systems (IJDMS), 4(6), 57.CrossRef
27.
Zurück zum Zitat Saha, S., Chakraborty, A., Chatterjee, A., Dhargupta, S., Ghosal, S. K., & Sarkar, R. (2020). Extended exploiting modification direction based steganography using hashed-weightage array. Multimedia Tools and Applications, 79, 20973–20993.CrossRef Saha, S., Chakraborty, A., Chatterjee, A., Dhargupta, S., Ghosal, S. K., & Sarkar, R. (2020). Extended exploiting modification direction based steganography using hashed-weightage array. Multimedia Tools and Applications, 79, 20973–20993.CrossRef
28.
Zurück zum Zitat Wang, S., Yang, B., & Niu, X. (2010). A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing, 1(1), 28–35. Wang, S., Yang, B., & Niu, X. (2010). A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing, 1(1), 28–35.
29.
Zurück zum Zitat Kaur, S., Bansal, S., & Bansal, R. K. (2021). Image steganography for securing secret data using hybrid hiding model. Multimedia Tools and Applications, 80, 7749–7769.CrossRef Kaur, S., Bansal, S., & Bansal, R. K. (2021). Image steganography for securing secret data using hybrid hiding model. Multimedia Tools and Applications, 80, 7749–7769.CrossRef
30.
Zurück zum Zitat Bhattacharya, T., Dey, N., & Bhadra Chaudhuri, S. R. (2012). A session based spatial domain multiple image hiding technique using variable bit replacement and multiple passwords. International Journal of Computers and Applications, 56(3), 0975–8887. Bhattacharya, T., Dey, N., & Bhadra Chaudhuri, S. R. (2012). A session based spatial domain multiple image hiding technique using variable bit replacement and multiple passwords. International Journal of Computers and Applications, 56(3), 0975–8887.
32.
Zurück zum Zitat Naveen, P., & Sivakumar, P. (2021). Human emotions detection using kernel nonlinear collaborative discriminant regression classifier: Human emotions detection using KNCDRC. In: 2021 2nd international conference on smart electronics and communication (ICOSEC), 2021 (pp. 1807–1812). https://doi.org/10.1109/ICOSEC51865.2021.9591878. Naveen, P., & Sivakumar, P. (2021). Human emotions detection using kernel nonlinear collaborative discriminant regression classifier: Human emotions detection using KNCDRC. In: 2021 2nd international conference on smart electronics and communication (ICOSEC), 2021 (pp. 1807–1812). https://​doi.​org/​10.​1109/​ICOSEC51865.​2021.​9591878.
33.
35.
Zurück zum Zitat Ren, K., Zheng, T., Qin, Z., & Liu, X. (2020). Adversarial attacks and defenses in deep learning. Engineering, 6(3), 346–360.CrossRef Ren, K., Zheng, T., Qin, Z., & Liu, X. (2020). Adversarial attacks and defenses in deep learning. Engineering, 6(3), 346–360.CrossRef
Metadaten
Titel
Image Steganography Method for Securing Multiple Images Using LSB–GA
verfasst von
Palanichamy Naveen
R. Jayaraghavi
Publikationsdatum
30.03.2024
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2024
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-024-10945-3

Weitere Artikel der Ausgabe 1/2024

Wireless Personal Communications 1/2024 Zur Ausgabe