Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter Open Access December 17, 2016

Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems

  • Duraisamy Jude Hemanth EMAIL logo , Subramaniyan Umamaheswari , Daniela Elena Popescu and Antoanela Naaji
From the journal Open Physics

Abstract

Image steganography is one of the ever growing computational approaches which has found its application in many fields. The frequency domain techniques are highly preferred for image steganography applications. However, there are significant drawbacks associated with these techniques. In transform based approaches, the secret data is embedded in random manner in the transform coefficients of the cover image. These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity. In this work, the application of Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) have been explored in the context of determining the optimal coefficients in these transforms. Frequency domain transforms such as Bandelet Transform (BT) and Finite Ridgelet Transform (FRIT) are used in combination with GA and PSO to improve the efficiency of the image steganography system.

1 Introduction

The important issue in media is data security due to the growth of the internet. The information sent through channel requires more data security. Hence, to secure the data, the information hiding approaches like cryptography, watermarking and steganography have been used. Among all these techniques, steganography plays a major role in data security. Steganography hides the secured data on to the original or cover image and the resultant stego image is sent through the channel. The secret data may be video, image, audio or text. The steganography word is obtained from the Greek words ‘stegos’, meaning ‘cover’ and ‘grafia’, meaning ‘writing’ thus it as called as ‘Cover Writing’. During the 5th century, the king Darius had taken a Greek Tyrant Histiaeus as a prisoner in Susa. Tyrant used a steganography method to send message to his son-in-law. He shaved a slave’s head and tattooed the message on his scalp. After few days, slave’s hair was grown which hided the message and slave was sent to his son-in-law with that message on his scalp [1]. There are number of steganography approaches [2] used to embed secret information in the original cover image. The Steganography approaches are commonly divided into spatial domain and frequency domain approaches [3]. In spatial domain, the information is hidden directly in the Least Significant Bit (LSB) plane of cover image [[46]. But the drawback of this approach is fidelity of stego image is not maintained. In frequency domain approaches, the information is hidden in the transform coefficients.

The spatial domain in Steganography has two methods namely, LSB matching and LSB substitution method. In LSB matching, the secret data bits are matched with LSB plane which has been proposed by Luo et al. [4]. In the LSB substitution method, LSB’s plane is replaced directly without modifying the cover image. Bedi et al. [5] has proposed the spatial domain combined with optimization technique in order to find the best pixel location with distortion tolerance. However, emphasis was given on distortion tolerance rather than embedding capacity and quality of stego image. The transforms used in frequency domain approaches are Discrete Fourier Transform (DFT), Discrete Curvelet transform (DCT), Discrete Cosine Transform (DCoT), Contourlet transform, and Discrete Wavelet Transform (DWT). Chang et al. [6] and Lin [7] have hidden the secret data in DCT coefficients with more security. The DWT based data hiding method has been proposed using bit-plane compression technique [8, 9]. Subhedar and Mankar [10] has used the redundant discrete wavelet transform and QR factorization method to hide the data. Jero et al. [11] has used the ant colony optimization to hide the ECG signal in patient data. But, this optimization method is computationally expensive when we need to hide the EEG signals. So, the PSO optimization tools can be used to find the correct set of parameters and also it is simple in method.

In this paper, the Bandelet Transform (BT) and Finite Ridgelet Transform (FRIT) are combined with optimization techniques to improve the fidelity of stego image. The BT and FRIT is chosen to yield the high embedding capacity. GA and PSO find the most significant coefficients for better information hiding. The proposed methodology increases the fidelity of the stego image and embedding capacity and also provides more security. The experimental results of the proposed approaches has been compared with recent works. The GA and PSO are the strong algorithms, these tools in combination with BT and FRIT is a novel attempt to enhance the efficiency of the steganography system. The rest of this paper is organized as follows: Section 2 describes an overview of the BT, FRIT, GA and PSO, Section 3 discusses the proposed methodology, Section 4 gives the experimental results and Section 5 provides the conclusion of proposed work.

2 Overview of Techniques

This section briefly discusses the four techniques: (1) Bandelet transform (2) Finite Ridgelet transform (3) Genetic Algorithm (4) Particle swarm optimization.

2.1 Bandelet Transform (BT)

Bandelet Transform (BT) is a multiscale and multi directional transform which is mainly used to represent the edges and texture of image efficiently [12]. It takes the advantage of sharp image transitions in digital image. In BT, the bandelet bases are formed by geometric flow of vectors which is used to represent the edges of image. The bandelet bases leads to optimal approximation rates for geometrical images. The geometrical images have smooth regions surrounded by regular curves. In most of the applications, the bandelet transform is used for image fusion. In this work, bandelet transform is used for data hiding. Figure 1 shows the geometry flow and sample one level bandelet decomposition of image.

Figure 1 Geometry flow of Lena image.
Figure 1

Geometry flow of Lena image.

2.2 Finite Ridgelet Transform (FRIT)

The finite ridgelet transform has been advanced from the finite radon transform as shown in Figure 2. The ridgelet transform is used for sparse representation of digital images [13]. The periodization effect in the finite transform, Finite Radon Transform (FRA) was introduced. The Finite Ridgelet transform (FRIT) is obtained by performing the one dimensional (1-D) wavelet transform on each direction (d) of FRAT. The FRIT is non-redundant and invertible in nature. It shows optimal performance than the wavelet transform in performing with straight edges. The sample one level FRIT decomposition of image is shown in Figure 3.

Figure 2 Description of finite ridgelet transform.
Figure 2

Description of finite ridgelet transform.

Figure 3 Sample one level FRIT decomposition of Lena image.
Figure 3

Sample one level FRIT decomposition of Lena image.

2.3 Genetic Algorithm (GA)

Genetic algorithm (GA) is an evolutionary search technique based on the fact of natural genetics. It is a random search technique, developed by Holland in 1960 [14] and later it was popularized by Goldberg. One of the significant parameters in the GA is chromosome. Chromosome is represented with binary strings. The elements in the chromosome are adjusted based on fitness value. The fitness value is derived from the fitness function which can be minimization function or maximization function. Based on the fitness value, the chromosomes are changed using reproduction operation. This procedure is repeated for a specific number of iterations. The optimal output is obtained at the end of specified iteration. A detailed approach is given in [15].

2.4 Particle Swarm Optimization (PSO)

Particle Swarm Optimization (PSO) is a population based optimization techniques, which has been developed by Kennedy and Eberhats in 1995. The potential solution is represented by each individual. Each particle’s position is altered according to its neighbors and with its own practical experience. In each iteration, the predetermined particles correspondingly produce fitness value from the fitness function and also have velocity to direct the movement of the particle. Each particle in a population keeps track of its best solution (fitness) in the search space which has achieved so far by that particle. This fitness value is called pbest (personal best). PSO keep track of another best solution that is obtained so far by any particle in the neighborhood of that particle. This is known as gbest (global best). A detailed algorithm is given in [16].

3 Proposed Methodology

The block diagram of embedding phase is shown in Fig. 4. The explanation of data embedding and data extraction phase are given below.

Figure 4 Block diagram of Data embedding.
Figure 4

Block diagram of Data embedding.

3.1 Embedding Phase

The first step of embedding phase is to read the cover image A(x, y). The cover image is decomposed using specific transforms (BT & FRIT).Then, the most significant coefficients are selected using GA and PSO. Embedding the secret data in the most significant coefficients, that will increase the fidelity stego image. The explanation of GA and PSO are given in the next section. The optimized most significant transform coefficients are placed in the matrix Rim for mth block. The matrix X has the specific transform coefficients.

1Rim=[I[1,A(x,y)]I[p+1,A(x,y]]T

Next step is to read the secret data B(x, y). The secret data B(x, y) is hidden in the most significant coefficients according to the following embedding law,

2RiS(x,y)=Rim+δB(x,y)Rim

Where, δ is the scaling factor and its value used in this work is δ = 0.30. Finally, The inverse specific transform (BT and FRIT) is applied to obtain the stego image.

3.2 Extraction Phase

The extraction phase extracts the embedded secret data and cover image separately. Decompose the stego image using specific transform (BT and FRIT). Then use the positions of most significant coefficients to determine the extraction key. The extraction key posses the position of most significant coefficients. The selected most significant coefficient positions are placed in a matrix P*(i, j). A correlation detector (C), which gives the average correlation between each row of R(x, y) and secret message, is obtained by,

3C=1mi=1m1Pj=1PR(x,y)B(x,y)

Thus, the secret message is extracted using equation 4. The cover image is obtained by applying inverse specific transform.

4B(x,y)=CB(x,y)

3.3 Implementation

The implementation aspects of GA and PSO based data embedding and data extraction are discussed below.

3.3.1 GA based data embedding

The procedure of GA for finding the most significant coefficients in BT and FRIT is given below.

Step 1. Parameter Representation: The parameter representation of GA is given in Table 1.

Table 1

Representation of GA Parameter.

ParametersValue
Iteration100
Individuals15
Each individual is256 · 256/8 · 8 = 1024
composedchromosomes
Each chromosome length64
Cross over probability0.25
Mutation probability0.05
Selection probability0.5
No of position to embed the64
secret data

The number of individuals are randomly chosen as 15. Each individual is composed of 1024 chromosomes. The size of specific transform coefficients (256·256) is divided by size of secret message to obtain the number of chromosomes. Length of each chromosome is chosen as 64. The number of positions to hide the secret message depends on the size of the secret message. In this paper, the size of secret message is 8 · 8 = 64. The other parameters are chosen randomly.

Step 2. Fitness Function

In order to enhance the quality of stego image, Peak Signal-to-Noise ratio (PSNR) equation is taken as a fitness function. GA and PSO search for the chromosomes with highest fitness value from the fitness function. PSNR is measured between cover image and stego image. If PSNR value is high, the fidelity of stego image is also high. The fitness function is given in equation 5 and 6.

5MSE=1mni=1mj=1nA(x,y)Stego(x,y)2
6PSNR=10log102552MSE

Step 3. Selection Process:

According to the rank selection method, the 1st rank will be allotted to the highest fitness value and 2nd rank will be allotted to the next highest fitness value. The procedure is adopted for all 1024 chromosomes for each individual. The 15 individuals are reordered according to the rank allotted. The first top two fitness individuals (Pgood) undergo crossover and mutation. The last two weak fitness individuals (Pbad) are discarded and leave a space for 2 new off spring for the next iteration.

Step 4. Reproduction operators: Crossover and mutation are the two reproduction operators.

Two individuals are chosen from Pgood to produce new offspring. In this paper, two point cross over is used for generating new chromosomes. The mutation process is also used for offspring formation. In this method, bits are swapped to form the new chromosomes. After crossover and mutation, the discarded offsprings are replaced with new offsprings.

Step 5. Test for convergence: Repeat the above mentioned procedure for specific number of iteration. The resulting most significant coefficients selected by GA are considered as the optimal solution which will give a better stego image quality.

3.3.2 PSO based data embedding

PSO is used to give the most significant coefficients in BT and FRIT to embed the secret data. The most significant coefficients are obtained by following steps,

Step 1. Parameter Representation: The parameter representation of PSO is given in Table 2.

Table 2

Representation of PSO Parameter

ParametersValue
Iteration100
Inertia weight (w)0.4
c1& c2 (cognitive and social1.49
acceleration factors)
r1(t)& r2(t) (random1
numbers)
No of position to hide the64
secret message

Step 2. Fitness function: The fitness function for PSO is same as used in GA.

Step 3. Initialization: In the 1st iteration, PSO randomly select the position and velocity. Then, for each particle the fitness value is calculated from the fitness function which is measured between cover and stego image.

Step 4. Calculate pbest and gbest: After the fitness function evaluation, estimate pbest as gbest using the equation 7. Considering the maximization problem, the global best position is calculated as,

7gbest=Px(t+1)ifF(Px(t+1)P(pbest)pbestifF(Px(t+1)<P(pbest)

where, P is the fitness function which measures the closest optimum solution.

Step 5. Update particle position and velocity: Let Px(t) be the current position of particle x in the search space at time t. The current position (Px(t)) is updated to new position (Px(t + 1)) according to the velocity Vx(t + 1) is given by,

8Px(t+1)=Px(t)+Vx(t+1)

In every iteration, each particle is updated according to the pbest and gbest value. The velocity of particle x is updated according to the equation 9.

9Vx(t+1)=wVx(t)+c1r1(t)pbestPx(t)+c2r2(t)gbestPx(t)

where, Vx(t) is the current velocity of particle x at time t, w is the inertia weight factor, Px(t) is the current position of particle x at time t, c1& c2 are cognitive and social acceleration constants, r1(t)& r2(t) are the random values in the range between [0,1].

Step 6. Test Convergence: Repeat the above procedure till there is no change in particle positions.

The resulting best coefficients selected by PSO are considered as the optimal solution which will give a better stego image quality. The best positions selected by PSO in the data embedding are taken as key and will be later used in the data extraction for the extraction of secret data.

4 Experimental Results and Discussions

The software used for implementation is MATLAB. Four gray-level images such as “Sailboat”, “Barbara” “Girl” and “Tiffany” are used in this work. The cover gray-level images are shown in Fig. 5.

Figure 5 Sample cover images: (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 5

Sample cover images: (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Figure 6 Stego images using Bandelet transform with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 6

Stego images using Bandelet transform with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

The performance measures used in this paper are Peak signal-to-noise ratio (PSNR) and embedding capacity (bits). The PSNR performance measure is used to measure the quality of stego image. The PSNR is defined through the mean square error (MSE). Embedding capacity (bits) gives the amount of data that can be hidden in the cover image. A high embedding capacity is always required for all steganography system. Tamper Assessment Factor (TAF) measures the quality of retrieved secret data. The value of TAF should be between 0-1. The Normalized absolute error (NAE) measures the quality of reconstructed cover image. Let A(x, y) be the cover image, B(x, y) be the secret message, B(x, y) be the retrieved secret message and C(x, y) be the restored cover image where, x and y denote the row and column. TAF and NAE, are defined in equation 10 & 11 respectively,

10TAF=1mni=1mj=1n[B(x,y)B(x,y)]
11NAE=i=1mj=1n|A(x,y)A(x,y)|i=1mj=1n|A(x,y)|

4.1 Results of Bandelet transform with GA and PSO- Embedding Phase

In the first experiment, Bandelet transform with GA and PSO is performed. The Bandelet transform efficiently represent the sharp edges of cover image. In this paper, GA and PSO are used to increase the fidelity of stego image. GA and PSO are used to give the most significant coefficients in the Bandelet transform. After GA and PSO, the most significant coefficients are obtained to embed the secret data. The stego images using GA and PSO are shown in Fig 6 & 7. The Performance measures of GA based bandelet transform for embedding phase is shown in Table 3 & 4.

Figure 7 Stego images using Bandelet transform with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 7

Stego images using Bandelet transform with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Table 3

Combined GA and Bandelet transform approach- PSNR values

ImagesPSNR(dB)Embedding Capacity (bits)
Barbara37.36350860
Tiffany37.50337516
Sail boat37.17348970
Girl38.23321304
Average37.56339662

From Table 3, it is evident that good fidelity of stego image is obtained at the 100th iteration. An average PSNR value of 37.56 dB and average embedding capacity of 339662 bits has been achieved.

From Table 4, it is evident that the best PSNR value is obtained at the 100th iteration. An average PSNR value of 43.5dB and average embedding capacity of 345744 bits has been achieved.

Table 4

Combined PSO and Bandelet transform approach- PSNR values.

ImagesPSNR(dB)Embedding Capacity (bits)
Barbara43.89350191
Tiffany43.83341297
Sail boat42.68350191
Girl43.83341297
Average43.55345744

4.2 Results of Bandelet transform with GA and PSO- Extraction Phase

The restored cover image of Bandelet transform combined with GA and PSO is shown in Fig 8 & 9. The Performance measures of GA based bandelet transform for extraction phase is shown in Table 5.

Figure 8 Restored cover image using Bandelet transform with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 8

Restored cover image using Bandelet transform with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Figure 9 Restored cover image using Bandelet transform with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 9

Restored cover image using Bandelet transform with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Table 5

Combined optimization techniques and Bandelet transform approach- TAF and NAE values.

ImagesGAPSO
TAFNAETAFNAE
Barbara0.620.0080.020.026
Tiffany0.620.0080.020.026
Sail boat0.620.0080.020.026
Girl0.620.0080.020.026
Average0.620.0080.020.026

From Table 5, the proposed methodology has been achieved, an average TAF value of 0.62 and NAE value of 0.008 for GA and an average TAF value of 0.02 and NAE value of 0.026 for PSO. By comparison made between the BT with GA and PSO in terms of TAF and NAE, the TAF and NAE values are low for PSO than GA. So, BT restores the secret data better and retrieves the cover image better with PSO than GA.

4.3 Results of Finite Ridgelet transform with GA and PSO- Embedding Phase

In the second experiment, finite Ridgelet transform with GA and PSO is performed. GA and PSO are used to find the most significant coefficients in the FRIT. After GA and PSO, the most significant coefficients are obtained to embed the secret data. The stego image using GA and PSO is shown in Fig. 10 & 11. The Performance measures of GA based FRIT for embedding phase is shown in Table 6 & 7.

Figure 10 Stego image using FRIT with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 10

Stego image using FRIT with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Figure 11 Stego image using FRIT with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 11

Stego image using FRIT with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Table 6

Combined GA and FRIT approach- PSNR values.

ImagesPSNR(dB)Embedding Capacity (bits)
Barbara40.45157527
Tiffany40.81157421
Sail boat40.66157554
Girl40.61157172
Average40.63157418
Table 7

Combined PSO and Bandelet transform approach- PSNR values.

ImagesPSNR(dB)Embedding Capacity (bits)
Barbara45.87157728
Tiffany46.28157707
Sail boat46.14157724
Girl45.95157641
Average46.06157700

From Table 6, it is evident that the best PSNR value is obtained at the 100th iteration. An average fitness value of 40.63 dB and average embedding capacity of 1574178 bits has been achieved.

From Table 7, it is evident that the best PSNR value is obtained at the 100th iteration. An average fitness value of 46.06 dB and average embedding capacity of 157700 bits has been achieved.

4.4 Results of FRIT with GA and PSO-Extraction Phase

The restored cover image of FRIT with GA and PSO is shown in Fig. 12 & 13. The Performance measures of GA based FRIT for extraction phase is shown in Table 8.

Figure 12 Restored cover image using FRIT with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 12

Restored cover image using FRIT with GA of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Figure 13 Restored cover image using FRIT with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.
Figure 13

Restored cover image using FRIT with PSO of (a) Babara, (b) Tiffany (c) Sail boat & (d) Girl.

Table 8

Combined optimization techniques and FRIT approach- TAF and NAE values.

ImagesGAPSO
TAFNAETAFNAE
Barbara0.690.0140.690.006
Tiffany0.690.0140.690.006
Sail boat0.690.0140.690.006
Girl0.690.0140.690.006
Average0.690.0140.690.006

From Table 8, the proposed methodology has been achieved, an average TAF value of 0.69 and NAE value of 0.014 for GA and an average TAF value of 0.69 and NAE value of 0.006 for PSO. By comparison made between the FRIT with GA and PSO in terms of TAF and NAE, the TAF and NAE values are low for PSO than GA. So, FRIT restores the secret data better and retrieves the cover image better with PSO than GA.

4.5 Comparative analysis

The comparative analysis of the proposed methodologies is shown in Table 9.

Table 9

Comparison of optimization techniques based Bandelet transform and FRIT- PSNR values.

ImagesPSNR(dB)
BTFRITBTFRIT
GAGAPSOPSO
Barbara37.3640.4543.8945.87
Tiffany37.5040.8143.8346.28
Sail boat38.2340.6143.8345.95
Girl37.5640.6343.5546.06
Average37.3640.4543.8945.87

From Table 9, it is proven that PSO gives better result than GA for both BT and FRIT, because GA is random in nature. An approximate of 3–6 dB is received with FRIT based optimization techniques over the BT based optimization techniques.

Table 10

Comparison of optimization techniques based Bandelet transform and FRIT- Embedding capacity (bits).

ImagesPSNR(dB)
BTFRITBTFRIT
GAGAPSOPSO
Barbara350860157527350191157728
Tiffany337516157421341297157707
Sail boat321304157172341297157641
Girl339662157418345744157700
Average350860157527350191157728

From Table 10, PSNR values and embedding capacity is high for PSO based techniques than GA. The average embedding capacity of 902136 bits is obtained with FRIT with GA and PSO. Thus, the optimization techniques have significantly increased the efficiency of the steganography system.

5 Conclusion

In this paper, the frequency domain Steganography and optimization techniques are combined to design the efficiency improved steganography system. The transform

used are bandelet transform and Finite Ridgelet transform with optimization techniques such as GA and PSO is used in this paper. The proposed algorithm is mainly used for secure communication. The Steganography system is designed with better fidelity of stego image and with high embedding capacity. GA and PSO are used to give the most significant coefficients to embed more amounts of secret data. The proposed methododology maintains the fidelity of stego image with an average PSNR value of 37.56 dB for bandelet combined with GA, average value of 43.55 dB for bandelet combined with PSO, average value of 40.63 dB for Finite Ridgelet combined with GA and average of 46.06 dB Finite Ridgelet combined with PSO. The proposed method performance has been compared with the other related works.

References

1 Neil Johnson F., Sushil J., Steganography: Seeing the Unseen, IEEE Computer., 1998, 26–34.10.1109/MC.1998.4655281Search in Google Scholar

2 Cheddad A., Condell J., Curran K., Mc Kevitt P., Digital image steganography – survey and analysis of current methods, J Signal Process., 2010, 90, 752–825.10.1016/j.sigpro.2009.08.010Search in Google Scholar

3 Gonzalez R., Woods R.., Digital image processing., 2nd edition, Prentice Hall India, 2005.Search in Google Scholar

4 Luo W., Huang F., Huang J., Edge Adaptive Image Steganography Based on LSB Matching Revisited, IEEE Transactions on Information Forensics and Security., 2010, 5, 201–214.10.1109/TIFS.2010.2041812Search in Google Scholar

5 Bedi P., Bansal R., Sehgal P., Using PSO in a spatial domain based image hiding scheme with distortion tolerance, Computers and Electrical Engineering., 2013, 39, 640–654.10.1016/j.compeleceng.2012.12.021Search in Google Scholar

6 Chang C. C., Lin C. C., Tseng C. S., Tai W. L., Reversible hiding in DCT-based compressed images, Information Sciences., 2007, 177, 2768–2786.10.1016/j.ins.2007.02.019Search in Google Scholar

7 Lin Y. K., High capacity reversible data hiding scheme based up on discrete cosine transformation, The Journal of Systems and Software., 2012, 85, 2395–2404.10.1016/j.jss.2012.05.032Search in Google Scholar

8 Chan Y. K., Chen W. T., Yu S. S., Ho Y. A., Tsai C. S., Chu Y. P., A HDWT-based reversible data hiding method, The Journal of Systems and Software., 2009, 82, 411–421.10.1016/j.jss.2008.07.008Search in Google Scholar

9 Yeh H. L., Gue S. T., Tsai P., Shih W. K., Wavelet bit-plane based data hiding for compressed images, International Journal of Electronics and Communication., 2013, 67, 808–815.10.1016/j.aeue.2013.04.003Search in Google Scholar

10 Subhedar M. S., Mankar V. H., Image steganography using redundant discrete wavelet transform and QR factorization, Computers and Electrical Engineering., 2016, 54, 406–422.10.1016/j.compeleceng.2016.04.017Search in Google Scholar

11 Jero E.S., Ramu P., Swaminathan R., Imperceptibility – Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization, Expert Systems With Applications., 2016, 49, 123–135.10.1016/j.eswa.2015.12.010Search in Google Scholar

12 Qu X., Yan J., Xie G., Zhu Z., Chen B., A novel image fusion algorithm based on bandelet transform, Chinese optics letters., 2007, 5, 569–572.Search in Google Scholar

13 Do M. N., Vetterli M., The Finite Ridgelet Transform for Image Representation, IEEE Transactions on Image Processing., 2009, 1, 1–1410.1109/TIP.2002.806252Search in Google Scholar PubMed

14 Holland J. H., Adaptation in Natural and Arti7cial Systems, The University of Michigan Press, Ann Arbor, MI, 1975.Search in Google Scholar

15 Goldberg D. E., Genetic Algorithms in Search, Optimization and Machine Learning, Addison-Wesley, Reading, MA, 1992.Search in Google Scholar

16 Bajaj R., Bedi P., Pal S. K., Best hiding capacity scheme for variable length messages using particle swarm optimization, Proceedings of SEMCCO, LNCS., 2010, 6466, 237–244.10.1007/978-3-642-17563-3_28Search in Google Scholar

Received: 2016-6-21
Accepted: 2016-11-4
Published Online: 2016-12-17
Published in Print: 2016-1-1

© 2016 D. J. Hemanth et al.

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.

Downloaded on 3.6.2024 from https://www.degruyter.com/document/doi/10.1515/phys-2016-0052/html
Scroll to top button