Skip to main content
Erschienen in: Multimedia Systems 5/2023

28.03.2022 | Special Issue Paper

Optimized multimedia data through computationally intelligent algorithms

verfasst von: Neha Sharma, Chinmay Chakraborty, Rajeev Kumar

Erschienen in: Multimedia Systems | Ausgabe 5/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the field of data exchange, the security of information is the critical aspect. This void in the security helped the evolution of steganography to address the problem of security, especially when highly critical information exchange is the priority. Better and advanced level of security has been attained using the techniques of steganography with cryptography. However, it has been observed that steganographic techniques principled on computationally intelligent or inspired by nature algorithms are gaining much attention. The paper proposes a method for image steganography in transform domain using hybridization of two computationally intelligent algorithms, i.e., firefly optimization algorithm and ant colony optimization algorithm with Huffman encoding to address the gap of high payload. Comparative analysis of the proposed steganographic tool with other existing methods and analysis of the values obtained against some key performance terms like PSNR (peak signal to noise ratio), MSE (mean square error), BER (bit error rate) and SSI (structural similarity index) determines the proposed algorithm as a powerful method. The proposed tool achieves the PSNR of 68.06 dB and the embedding capacity of 985,682 bits.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3), 469–474 (2004)CrossRefMATH
2.
Zurück zum Zitat Ghebleh, M., Kanso, A.: A robust chaotic algorithm for digital image steganography. Commun Nonlinear SciNumer Simul 19(6), 1898–1907 (2014)CrossRefMATH Ghebleh, M., Kanso, A.: A robust chaotic algorithm for digital image steganography. Commun Nonlinear SciNumer Simul 19(6), 1898–1907 (2014)CrossRefMATH
3.
Zurück zum Zitat Tu, T.Y., Wang, C.H.: Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Sig Process 108, 278–328 (2015)CrossRef Tu, T.Y., Wang, C.H.: Reversible data hiding with high payload based on referred frequency for VQ compressed codes index. Sig Process 108, 278–328 (2015)CrossRef
4.
Zurück zum Zitat Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography. In: The Morgan Kaufmann series in multimedia information and systems, 2008. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography. In: The Morgan Kaufmann series in multimedia information and systems, 2008.
5.
Zurück zum Zitat Samidha, D., Agrawal, D.: Random image steganography in spatial domain, In IEEE, 2013. Samidha, D., Agrawal, D.: Random image steganography in spatial domain, In IEEE, 2013.
6.
Zurück zum Zitat Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: Spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. 12(15) (2012) Sravanthi, G.S., Sunitha Devi, B., Riyazoddin, S.M., Janga Reddy, M.: Spatial domain image steganography technique based on plane bit substitution method. Glob. J. Comput. Sci. Technol. Graph. Vis. 12(15) (2012)
8.
Zurück zum Zitat Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. International conference on information and communication technologies (ICICT 2014). Procedia Comput. Sci. 46, 612–618 (2015)CrossRef Baby, D., Thomas, J., Augustine, G., George, E., Michael, N.R.: A novel DWT based image securing method using steganography. International conference on information and communication technologies (ICICT 2014). Procedia Comput. Sci. 46, 612–618 (2015)CrossRef
10.
Zurück zum Zitat Sun, Z., et al.: CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks. Wirel Netw 23(4), 1201–1222 (2017)MathSciNetCrossRef Sun, Z., et al.: CASMOC: a novel complex alliance strategy with multi-objective optimization of coverage in wireless sensor networks. Wirel Netw 23(4), 1201–1222 (2017)MathSciNetCrossRef
17.
Zurück zum Zitat Amsaveni, A., Arun Kumar, C.: An efficient data hiding scheme using firefly algorithm in spatial domain. In: 2nd International Conference on electronics and communication system, pp. 650–655. 2015. Amsaveni, A., Arun Kumar, C.: An efficient data hiding scheme using firefly algorithm in spatial domain. In: 2nd International Conference on electronics and communication system, pp. 650–655. 2015.
18.
Zurück zum Zitat Tariq, Z., Al-Tai, Z.T.M., Abass, J.M., Al-Hameed, O.Y.A.: Image steganography between firefly and PSO algorithms. Int. J. Comput. Sci. Inf. Secur. 15(1), 9–21 (2017) Tariq, Z., Al-Tai, Z.T.M., Abass, J.M., Al-Hameed, O.Y.A.: Image steganography between firefly and PSO algorithms. Int. J. Comput. Sci. Inf. Secur. 15(1), 9–21 (2017)
20.
Zurück zum Zitat Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence. Wiley, West Sussex (2005) Engelbrecht, A.P.: Fundamentals of Computational Swarm Intelligence. Wiley, West Sussex (2005)
21.
Zurück zum Zitat Engelbrecht, A.P.: Computational Intelligence: An Introduction. Wiley, West Sussex (2007)CrossRef Engelbrecht, A.P.: Computational Intelligence: An Introduction. Wiley, West Sussex (2007)CrossRef
22.
Zurück zum Zitat Song, H., Rawat, D., Jeschke, S., Brecher, C.: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 1–514. Academic Press, Boston (2016) Song, H., Rawat, D., Jeschke, S., Brecher, C.: Cyber-Physical Systems: Foundations, Principles and Applications, pp. 1–514. Academic Press, Boston (2016)
23.
Zurück zum Zitat Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles and Applications, pp. 1–906. Wiley, Hoboken (2017)CrossRef Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles and Applications, pp. 1–906. Wiley, Hoboken (2017)CrossRef
27.
Zurück zum Zitat Siva Raja, P.M., Baburaj, E.: An efficient data embedding scheme for digital images based on particle swarm optimization with LSBMR. IET Digital Library, 2013, pp. 17–24 Siva Raja, P.M., Baburaj, E.: An efficient data embedding scheme for digital images based on particle swarm optimization with LSBMR. IET Digital Library, 2013, pp. 17–24
28.
Zurück zum Zitat Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: Abraham, A., et al. (eds.) ACC 2011, Part III, CCIS 192, pp. 259–268, 2011. Springer, Berlin 2011 Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: Abraham, A., et al. (eds.) ACC 2011, Part III, CCIS 192, pp. 259–268, 2011. Springer, Berlin 2011
31.
Zurück zum Zitat Jiang, M., et al.: Dynamic measurement errors prediction for sensors based on firefly algorithm optimize support vector machine. Sustain. Cities Soc. 35, 250–256 (2017)CrossRef Jiang, M., et al.: Dynamic measurement errors prediction for sensors based on firefly algorithm optimize support vector machine. Sustain. Cities Soc. 35, 250–256 (2017)CrossRef
38.
Zurück zum Zitat Edward Jero, S., Ramu, P., Swaminathan, R.: Imperceptibility—robustness tradeoff studies for ecg steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)CrossRef Edward Jero, S., Ramu, P., Swaminathan, R.: Imperceptibility—robustness tradeoff studies for ecg steganography using continuous ant colony optimization. Expert Syst. Appl. 49, 123–135 (2016)CrossRef
39.
Zurück zum Zitat Priya, A.: High capacity and optimized image steganography technique based on ant colony optimization algorithm. Int. J. Sci. Res. Eng. Dev. 2(1) (2019) Priya, A.: High capacity and optimized image steganography technique based on ant colony optimization algorithm. Int. J. Sci. Res. Eng. Dev. 2(1) (2019)
42.
Zurück zum Zitat Bajaj, R., Bedi, P., Pal, S.K.: Best hiding capacity scheme for variable length messages using particle swarm optimization. In: SEMCCO, pp. 230–237, 2010 Bajaj, R., Bedi, P., Pal, S.K.: Best hiding capacity scheme for variable length messages using particle swarm optimization. In: SEMCCO, pp. 230–237, 2010
44.
Zurück zum Zitat Bedi, P., Bansal, R., Sehgal, P.: Using PSO in a spatial domain-based image hiding scheme with distortion tolerance. ComputElectrEng 39, 640–654 (2013) Bedi, P., Bansal, R., Sehgal, P.: Using PSO in a spatial domain-based image hiding scheme with distortion tolerance. ComputElectrEng 39, 640–654 (2013)
45.
Zurück zum Zitat Nickfarjam, A.M., Azimifar Z.: Image steganography based on pixel ranking and particle swarm optimization. In: Proceedings of the 16th CSI international symposium on artificial intelligence and signal processing, pp. 360–363, 2012. Nickfarjam, A.M., Azimifar Z.: Image steganography based on pixel ranking and particle swarm optimization. In: Proceedings of the 16th CSI international symposium on artificial intelligence and signal processing, pp. 360–363, 2012.
46.
Zurück zum Zitat Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: ACC, Part III, CCIS 192, pp. 259–268, 2011 Bedi, P., Bansal, R., Sehgal, P.: Using PSO in image hiding scheme based on LSB substitution. In: ACC, Part III, CCIS 192, pp. 259–268, 2011
49.
Zurück zum Zitat Jude Hemantha, D., Anithaa, J., Popescub, D.E, Son, L.H.: A modified genetic algorithm for performance improvement of transform-based image steganography systems. J. Intell. Fuzzy Syst. 2018 Jude Hemantha, D., Anithaa, J., Popescub, D.E, Son, L.H.: A modified genetic algorithm for performance improvement of transform-based image steganography systems. J. Intell. Fuzzy Syst. 2018
Metadaten
Titel
Optimized multimedia data through computationally intelligent algorithms
verfasst von
Neha Sharma
Chinmay Chakraborty
Rajeev Kumar
Publikationsdatum
28.03.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
Multimedia Systems / Ausgabe 5/2023
Print ISSN: 0942-4962
Elektronische ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-022-00918-6

Weitere Artikel der Ausgabe 5/2023

Multimedia Systems 5/2023 Zur Ausgabe