Skip to main content
Erschienen in: Pattern Analysis and Applications 1/2019

12.01.2019 | Industrial and commercial application

Optimal steganography with blind detection based on Bayesian optimization algorithm

verfasst von: Amir Masoud Molaei, Ataollah Ebrahimzadeh

Erschienen in: Pattern Analysis and Applications | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An optimal steganography method is provided to embed the secret data into the low-order bits of host pixels. The main idea of the proposed method is that before the embedding process, the secret data are mapped to the optimal values using Bayesian optimization algorithm (along with introducing a novel mutation operator), in order to reduce the mean square error (MSE) and also maintain the structural similarity between the images before and after embedding (i.e., preserving the visual quality of the embedded-image). Then, the mapped data are embedded into the low-order bits of host pixels using modulus function and a systematic and reversible algorithm. Since the proposed method is able to embed data into more significant bits, it has enhanced the payload, while preserving the visual quality of the image. Extraction of data from the host image is possible without requiring the original image. The simulation results show that the proposed algorithm can lead to a minimum loss in MSE criterion and also a minimal reduction in visual quality of the image in terms of diagnostic criteria of the human eye, whereas there is no limitation on the improvement of payload, in comparison with other methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New YorkMATH Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New YorkMATH
2.
Zurück zum Zitat Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proceedings of international conference on information systems, analysis and synthesis, pp 223–229 Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proceedings of international conference on information systems, analysis and synthesis, pp 223–229
3.
Zurück zum Zitat Wu M, Liu B (2003) Data hiding in image and video. I. Fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695MathSciNetCrossRef Wu M, Liu B (2003) Data hiding in image and video. I. Fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695MathSciNetCrossRef
4.
Zurück zum Zitat Wu M, Yu H, Liu B (2003) Data hiding in image and video. II. Designs and applications. IEEE Trans Image Process 12(6):696–705CrossRef Wu M, Yu H, Liu B (2003) Data hiding in image and video. II. Designs and applications. IEEE Trans Image Process 12(6):696–705CrossRef
5.
Zurück zum Zitat Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331–339CrossRef Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331–339CrossRef
6.
Zurück zum Zitat Wang C-T, Yu H-F (2012) A Markov-based reversible data hiding method based on histogram shifting. J Vis Commun Image Represent 23(5):798–811CrossRef Wang C-T, Yu H-F (2012) A Markov-based reversible data hiding method based on histogram shifting. J Vis Commun Image Represent 23(5):798–811CrossRef
7.
Zurück zum Zitat Naji A, Zaidan A, Zaidan B, Hameed SA, Khalifa OO (2009) Novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography. Int J Comput Sci Netw Secur 9(5):294–300 Naji A, Zaidan A, Zaidan B, Hameed SA, Khalifa OO (2009) Novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography. Int J Comput Sci Netw Secur 9(5):294–300
8.
Zurück zum Zitat Ahadpour S, Majidpour M, Sadra Y (2012) Public key steganography using discrete cross-coupled chaotic maps. arXiv preprint arXiv:12110086 Ahadpour S, Majidpour M, Sadra Y (2012) Public key steganography using discrete cross-coupled chaotic maps. arXiv preprint arXiv:​12110086
9.
Zurück zum Zitat Alia MA, Yahya A (2010) Public–key steganography based on matching method. Eur J Sci Res 40(2):223–231 Alia MA, Yahya A (2010) Public–key steganography based on matching method. Eur J Sci Res 40(2):223–231
11.
Zurück zum Zitat Zou D, Shi YQ, Ni Z, Su W (2006) A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans Circuits Syst Video Technol 16(10):1294–1300CrossRef Zou D, Shi YQ, Ni Z, Su W (2006) A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans Circuits Syst Video Technol 16(10):1294–1300CrossRef
12.
Zurück zum Zitat Dosselmann R, Yang XD (2005) Existing and emerging image quality metrics. In: 2005 Canadian conference on electrical and computer engineering. IEEE, pp 1906–1913 Dosselmann R, Yang XD (2005) Existing and emerging image quality metrics. In: 2005 Canadian conference on electrical and computer engineering. IEEE, pp 1906–1913
13.
Zurück zum Zitat Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444CrossRef Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444CrossRef
14.
Zurück zum Zitat Wang Z, Bovik AC, Lu L (2002) Why is image quality assessment so difficult? In: 2002 IEEE international conference on acoustics, speech, and signal processing (ICASSP). IEEE, pp IV-3313–IV-3316 Wang Z, Bovik AC, Lu L (2002) Why is image quality assessment so difficult? In: 2002 IEEE international conference on acoustics, speech, and signal processing (ICASSP). IEEE, pp IV-3313–IV-3316
15.
Zurück zum Zitat Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965CrossRef Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965CrossRef
16.
Zurück zum Zitat Winkler S, Susstrunk S (2004) Visibility of noise in natural images. In: 2004 international society for optics and photonics electronic imaging, pp 121–129 Winkler S, Susstrunk S (2004) Visibility of noise in natural images. In: 2004 international society for optics and photonics electronic imaging, pp 121–129
17.
Zurück zum Zitat Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRef Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612CrossRef
18.
Zurück zum Zitat Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Secur (IJCSS) 6(3):168–187 Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Secur (IJCSS) 6(3):168–187
19.
Zurück zum Zitat Motamedi H, Jafari A (2012) A new image steganography based on denoising methods in wavelet domain. In: 2012 9th international ISC conference on information security and cryptology (ISCISC). IEEE, pp 18–25 Motamedi H, Jafari A (2012) A new image steganography based on denoising methods in wavelet domain. In: 2012 9th international ISC conference on information security and cryptology (ISCISC). IEEE, pp 18–25
20.
Zurück zum Zitat Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4):509–516 Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4):509–516
21.
Zurück zum Zitat Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683MATHCrossRef Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683MATHCrossRef
22.
Zurück zum Zitat Thien C-C, Lin J-C (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36(12):2875–2881MATHCrossRef Thien C-C, Lin J-C (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36(12):2875–2881MATHCrossRef
23.
Zurück zum Zitat Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167MATHCrossRef Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167MATHCrossRef
24.
Zurück zum Zitat Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444CrossRef Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444CrossRef
25.
Zurück zum Zitat Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287CrossRef Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287CrossRef
26.
Zurück zum Zitat Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626MATHCrossRef Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626MATHCrossRef
27.
Zurück zum Zitat Chang C-C, Kieu TD, Chou Y-C (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 international symposium on electronic commerce and security. IEEE, pp 16–21 Chang C-C, Kieu TD, Chou Y-C (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 international symposium on electronic commerce and security. IEEE, pp 16–21
28.
Zurück zum Zitat Molaei AM, Sedaaghi MH, Ebrahimnezhad H (2014) a blind steganography based on Reed-Solomon codes and optimal substitution table with improving payload and robustness. Tabriz J Electr Eng 43(2):43–59 (In Persian) Molaei AM, Sedaaghi MH, Ebrahimnezhad H (2014) a blind steganography based on Reed-Solomon codes and optimal substitution table with improving payload and robustness. Tabriz J Electr Eng 43(2):43–59 (In Persian)
29.
Zurück zum Zitat Molaei A, Sedaaghi M, Ebrahimnezhad H (2017) Steganography scheme based on Reed-Muller code with improving payload and ability to retrieval of destroyed data for digital images. AUT J Electr Eng 49(1):53–62 Molaei A, Sedaaghi M, Ebrahimnezhad H (2017) Steganography scheme based on Reed-Muller code with improving payload and ability to retrieval of destroyed data for digital images. AUT J Electr Eng 49(1):53–62
30.
Zurück zum Zitat Zhang Y, Jiang J, Zha Y, Zhang H, Zhao S (2013) Research on embedding capacity and efficiency of information hiding based on digital images. Int J Intell Sci 3(02):77CrossRef Zhang Y, Jiang J, Zha Y, Zhang H, Zhao S (2013) Research on embedding capacity and efficiency of information hiding based on digital images. Int J Intell Sci 3(02):77CrossRef
32.
Zurück zum Zitat Yin Z-X, Chang C-C, Xu Q, Luo B (2015) Second-order steganographic method based on adaptive reference matrix. IET Image Proc 9(4):300–305CrossRef Yin Z-X, Chang C-C, Xu Q, Luo B (2015) Second-order steganographic method based on adaptive reference matrix. IET Image Proc 9(4):300–305CrossRef
33.
Zurück zum Zitat Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783CrossRef Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783CrossRef
34.
Zurück zum Zitat Chang C-C, Chou Y-C, Kieu TD (2008) An information hiding scheme using Sudoku. In: 2008 3rd international conference on innovative computing information and control ICICIC’08. IEEE, p 17 Chang C-C, Chou Y-C, Kieu TD (2008) An information hiding scheme using Sudoku. In: 2008 3rd international conference on innovative computing information and control ICICIC’08. IEEE, p 17
35.
Zurück zum Zitat Hong W, Chen T-S, Shiu C-W (2008) A minimal Euclidean distance searching technique for Sudoku steganography. In: 2008 international symposium on information science and engineering. IEEE, pp 515–518 Hong W, Chen T-S, Shiu C-W (2008) A minimal Euclidean distance searching technique for Sudoku steganography. In: 2008 international symposium on information science and engineering. IEEE, pp 515–518
36.
Zurück zum Zitat Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:1 Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:1
37.
Zurück zum Zitat Yin Z, Luo B (2015) MDE-based image steganography with large embedding capacity. Secur Commun Netw 9(8):721–728CrossRef Yin Z, Luo B (2015) MDE-based image steganography with large embedding capacity. Secur Commun Netw 9(8):721–728CrossRef
38.
Zurück zum Zitat Ulker M, Arslan B (2018) A novel secure model: image steganography with logistic map and secret key. In: 2018 6th international symposium on digital forensic and security (ISDFS). IEEE, pp 1–5 Ulker M, Arslan B (2018) A novel secure model: image steganography with logistic map and secret key. In: 2018 6th international symposium on digital forensic and security (ISDFS). IEEE, pp 1–5
39.
Zurück zum Zitat Pelikan M (2005) Hierarchical Bayesian optimization algorithm. In: Hierarchical Bayesian optimization algorithm. Springer, pp 105–129 Pelikan M (2005) Hierarchical Bayesian optimization algorithm. In: Hierarchical Bayesian optimization algorithm. Springer, pp 105–129
40.
Zurück zum Zitat Kjaerulff UB, Madsen AL (2008) Bayesian networks and influence diagrams, vol 200. Springer, Berlin, p 114MATHCrossRef Kjaerulff UB, Madsen AL (2008) Bayesian networks and influence diagrams, vol 200. Springer, Berlin, p 114MATHCrossRef
41.
Zurück zum Zitat Cooper GF (1990) The computational complexity of probabilistic inference using Bayesian belief networks. Artif Intell 42(2–3):393–405MathSciNetMATHCrossRef Cooper GF (1990) The computational complexity of probabilistic inference using Bayesian belief networks. Artif Intell 42(2–3):393–405MathSciNetMATHCrossRef
42.
Zurück zum Zitat Heckerman D, Geiger D, Chickering DM (1995) Learning Bayesian networks: the combination of knowledge and statistical data. Mach Learn 20(3):197–243MATH Heckerman D, Geiger D, Chickering DM (1995) Learning Bayesian networks: the combination of knowledge and statistical data. Mach Learn 20(3):197–243MATH
43.
Zurück zum Zitat Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309–347MATH Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309–347MATH
44.
Zurück zum Zitat Castillo E, Gutierrez JM, Hadi AS (2012) Expert systems and probabilistic network models. Springer, BerlinMATH Castillo E, Gutierrez JM, Hadi AS (2012) Expert systems and probabilistic network models. Springer, BerlinMATH
45.
Zurück zum Zitat Pelikan M, Goldberg DE, Cantu-Paz E (2000) Linkage problem, distribution estimation, and Bayesian networks. Evol Comput 8(3):311–340CrossRef Pelikan M, Goldberg DE, Cantu-Paz E (2000) Linkage problem, distribution estimation, and Bayesian networks. Evol Comput 8(3):311–340CrossRef
46.
Zurück zum Zitat Ingemar JC, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann, Burlington Ingemar JC, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann, Burlington
47.
Zurück zum Zitat PourArian MR, Hanani A (2016) Blind steganography in color images by double wavelet transform and improved Arnold transform. Indones J Electr Eng Comput Sci 3(3):586–600CrossRef PourArian MR, Hanani A (2016) Blind steganography in color images by double wavelet transform and improved Arnold transform. Indones J Electr Eng Comput Sci 3(3):586–600CrossRef
48.
Zurück zum Zitat Jin Y, Olhofer M, Sendhoff B (2001) Dynamic weighted aggregation for evolutionary multi-objective optimization: Why does it work and how? In: Proceedings of the 3rd annual conference on genetic and evolutionary computation. Morgan Kaufmann Publishers Inc., pp 1042–1049 Jin Y, Olhofer M, Sendhoff B (2001) Dynamic weighted aggregation for evolutionary multi-objective optimization: Why does it work and how? In: Proceedings of the 3rd annual conference on genetic and evolutionary computation. Morgan Kaufmann Publishers Inc., pp 1042–1049
49.
Zurück zum Zitat Da Ronco CC, Benini E (2014) A simplex-crossover-based multi-objective evolutionary algorithm. In: IAENG transactions on engineering technologies. Springer, pp 583–598 Da Ronco CC, Benini E (2014) A simplex-crossover-based multi-objective evolutionary algorithm. In: IAENG transactions on engineering technologies. Springer, pp 583–598
Metadaten
Titel
Optimal steganography with blind detection based on Bayesian optimization algorithm
verfasst von
Amir Masoud Molaei
Ataollah Ebrahimzadeh
Publikationsdatum
12.01.2019
Verlag
Springer London
Erschienen in
Pattern Analysis and Applications / Ausgabe 1/2019
Print ISSN: 1433-7541
Elektronische ISSN: 1433-755X
DOI
https://doi.org/10.1007/s10044-018-00773-0

Weitere Artikel der Ausgabe 1/2019

Pattern Analysis and Applications 1/2019 Zur Ausgabe

Industrial and Commercial Application

A new method for image encryption by 3D chaotic map