Skip to main content

2018 | OriginalPaper | Buchkapitel

A Chaotic Steganography Method Using Ant Colony Optimization

verfasst von : Shahzad Alam, Tanvir Ahmad, M. N. Doja

Erschienen in: Intelligent Engineering Informatics

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since ancient times, there is a need to save data from third parties that spy on the data, leads to the practice of steganography to ensure data integrity and privacy. The advent in multimedia technologies and greater need for security has raised the popularity of image steganography. The traditional algorithm used for image steganography is the Least Significant Bit Method (LSB). A better strategy to overcome the LSB method is to hide data only in edge pixel of image. In this paper, first we apply the ant colony optimization (ACO) method to find edges of an image given by Xiaochen Liu et al. then will hide sensitive message in edges of image randomly to provide more security level. The edge detection technique and chaotic scheme-based steganography is introduced based on the ACO. This strategy efficiently finds the edges and does not attract much attraction compared to other traditional methods. Our result indicates the higher value of PSNR that shows the performance of the proposed algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, W.J., Chang, C.C., Le, T.H.N.: High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37(4), 3292–3301 (2010)CrossRef Chen, W.J., Chang, C.C., Le, T.H.N.: High payload steganography mechanism using hybrid edge detector. Expert Syst. Appl. 37(4), 3292–3301 (2010)CrossRef
2.
Zurück zum Zitat Gu, J., Pan, Y., Wang, H.: Research on the improvement of image edge detection algorithm based on artificial neural network. Optik 126, 2974–2978 (2015)CrossRef Gu, J., Pan, Y., Wang, H.: Research on the improvement of image edge detection algorithm based on artificial neural network. Optik 126, 2974–2978 (2015)CrossRef
3.
Zurück zum Zitat Alam, S., Kumar, V., Siddiqui, W.A., Ahmad, M.: Key-Dependent image steganography using edge detection. In: International Conference on Advanced Computing and Communication Technologies, pp. 85–88 (2014) Alam, S., Kumar, V., Siddiqui, W.A., Ahmad, M.: Key-Dependent image steganography using edge detection. In: International Conference on Advanced Computing and Communication Technologies, pp. 85–88 (2014)
4.
Zurück zum Zitat Verma, O.P., Sharma, R.: An optimal edge detection using universal law of gravity and ant colony algorithm. Inf. Commun. Technol (WICT) (2011) Verma, O.P., Sharma, R.: An optimal edge detection using universal law of gravity and ant colony algorithm. Inf. Commun. Technol (WICT) (2011)
5.
Zurück zum Zitat Islam, S., Gupta, P.: Revisiting least two significant bits steganography. In: Paper presented a the 8th International Conference on Intelligent Information Processing (ICIIP), Seoul, Republic of Korea, pp. 90–93 (2013) Islam, S., Gupta, P.: Revisiting least two significant bits steganography. In: Paper presented a the 8th International Conference on Intelligent Information Processing (ICIIP), Seoul, Republic of Korea, pp. 90–93 (2013)
6.
Zurück zum Zitat Modi, M.R., Islam, S., Gupta, P.: Huang, D.-S. Bevilacqua, V., Figueroa, J.C., Premaratne, P.: Edge Based Steganography on Colored Images. Lecture Notes in Computer Science: 9th International Conference on Intelligent Computing (ICIC), vol. 7995, pp. 593–600. Springer, Berlin (2013)CrossRef Modi, M.R., Islam, S., Gupta, P.: Huang, D.-S. Bevilacqua, V., Figueroa, J.C., Premaratne, P.: Edge Based Steganography on Colored Images. Lecture Notes in Computer Science: 9th International Conference on Intelligent Computing (ICIC), vol. 7995, pp. 593–600. Springer, Berlin (2013)CrossRef
7.
Zurück zum Zitat Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. PAMI 8(6), 679–698 (1986)CrossRef Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. PAMI 8(6), 679–698 (1986)CrossRef
8.
Zurück zum Zitat Liu, X., Fang, S.: A convenient and robust edge detection method based on ant colony optimization Liu, X., Fang, S.: A convenient and robust edge detection method based on ant colony optimization
9.
Zurück zum Zitat Ahmad, S.A,T., Doja, M.N.: A novel edge based chaotic steganography method using neural network. In: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, pp. 467–475 Ahmad, S.A,T., Doja, M.N.: A novel edge based chaotic steganography method using neural network. In: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, pp. 467–475
11.
Zurück zum Zitat Alam, S., et al.: Analysis of modified LSB approaches of hiding information in digital images. In: International Conference on Computational Intelligence and Communication Systems, pp. 280–285. IEEE (2013). ISBN: 978-1-4799-7633-1/14/2014 (HIS) Alam, S., et al.: Analysis of modified LSB approaches of hiding information in digital images. In: International Conference on Computational Intelligence and Communication Systems, pp. 280–285. IEEE (2013). ISBN: 978-1-4799-7633-1/14/2014 (HIS)
12.
Zurück zum Zitat Alam, S., Zakariya, S.M., Akhtar, N.: Analysis of modified Triple-A steganography technique using Fisher Yates algorithm. In: International Conference on Hybrid Intelligent Systems. ISBN: 978-1-4799-7633-1/14/2014 Alam, S., Zakariya, S.M., Akhtar, N.: Analysis of modified Triple-A steganography technique using Fisher Yates algorithm. In: International Conference on Hybrid Intelligent Systems. ISBN: 978-1-4799-7633-1/14/2014
13.
Zurück zum Zitat Rafsanjani, M.K., et al.: Edge detection in digital images using Ant Colony Optimization. Comput. Sci. J. Moldova, 23(3), p. 69 (2015) Rafsanjani, M.K., et al.: Edge detection in digital images using Ant Colony Optimization. Comput. Sci. J. Moldova, 23(3), p. 69 (2015)
14.
Zurück zum Zitat May, R.M.: Simple mathematical model with very complicated dynamics. Nature 261, 459–467 (1967)CrossRef May, R.M.: Simple mathematical model with very complicated dynamics. Nature 261, 459–467 (1967)CrossRef
15.
Zurück zum Zitat Alam, S., et al.: Digital Image Authentication and Encryption using Digital Signature. In: International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 332–336 (2015). Print ISBN: 978-1-4673-6911-4/15 Alam, S., et al.: Digital Image Authentication and Encryption using Digital Signature. In: International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 332–336 (2015). Print ISBN: 978-1-4673-6911-4/15
16.
Zurück zum Zitat Islam, S., Modi, M.R. Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. (2014) Islam, S., Modi, M.R. Gupta, P.: Edge-based image steganography. EURASIP J. Inf. Secur. (2014)
Metadaten
Titel
A Chaotic Steganography Method Using Ant Colony Optimization
verfasst von
Shahzad Alam
Tanvir Ahmad
M. N. Doja
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7566-7_42

Premium Partner