International Journal of Mechanical Engineering and Technology (IJMET) Volume 10, Issue 01, January 2019, pp. 2066-2074, Article ID: IJMET_10_01_202 Available online at http://www.iaeme.com/ijmet/issues.asp?JType=IJMET&VType=10&IType=1 ISSN Print: 0976-6340 and ISSN Online: 0976-6359 © IAEME Publication Scopus Indexed GENETIC ALGORITHM BASED STEGANOGRAPHY USING ADAPTIVE RECTANGULAR EMBEDDING AREA AHMED KAWTHER HUSSEIN Department of Computer Science, College of Education, Mustansiriyah University, Baghdad-Iraq ABSTRACT Image steganography is to hide an image inside an image for security purpose. Different approaches were applied for image steganography some of them are based on spatial domain and others are based on frequency domain. Spatial domain steganography approaches are simpler because they do not involve applying any transformation to the image. In this article, genetic algorithm is presented for searching for the best locations to hide the image bits inside the image. The image can be embedded in an adaptive block inside the host image. Furthermore, the secret bits can be reserved and inverted before embedding in order to optimize the hiding performance measures. Results show superiority over the baseline approach with respect to all evaluation measures Keywords: Stenography, genetic algorithm, meta heuristic searching, image embedding. Cite this Article: AHMED KAWTHER HUSSEIN, Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area, International Journal of Mechanical Engineering and Technology, 10(1), 2019, pp. 2066-2074. http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=10&IType=1 1. INTRODUCTION The science of hiding messages in a medium called cover or carrier object is Steganography like Text, image, audio, video, etc. [13] in a way that presence of the message is not discovered. Today, like transaction and communication have become on the Internet wellknown, securities of information technology and communication have become essential. Steganography is playing very important part in securing the digital world communication. The essential steganography intentions are to assure the necessary of the steganography system security, defend the confidential data from being increase the embedding capability and reached by invadors. Among all steganography techniques, image steganography has an advantage that the digital images have a right amount of irrelevant data, which can be formed to cover hidden http://www.iaeme.com/IJMET/index.asp 2066 editor@iaeme.com AHMED KAWTHER HUSSEIN information without influencing too much distortion in the cover image. The reason of preferring image steganography over other types is that images are the most exchanged medium between people in the virtual world which makes very convenient to hide secret messages in images. Various steganography techniques hide the information behind image files, one of them is Spatial Domain Techniques, and this technique encodes the message by using pixel gray level along with their color values. Three types of embedding approaches for steganography were followed: the first type uses the frequency domain for embedding. Examples are found in [6] [10], [20], [22], [1] while the second type uses the spatial domain, examples are found in [17], [3].In the third type, combination of them. Some researchers have combined the spatial and frequency domains. The spatial domain aims at inserting the secret bits in the lower weights bits [19],[18],[3],[23],[14],[16]. Example is to use the least significant bit of the cover image to hide a whole message. The limitations of the spatial embedding techniques are their vulnerabilities to image-processing operations, noise attacks; lossy compression, filtering and they are subject to statistical attacks. Examples of steganalysis methods [2], [4], [15]. In the frequency-domain steganography, various domain transforms are used such as discrete cosine transforms (DCT), discrete wavelet transforms (DWT), and discrete Fourier transforms (DFT). DWT is preferred because of its robustness against image-processing operations, statistical and noise attacks as well as distortion [5]. However, both DCT and DWT have smaller capacities. Also, DCT was used by numerous researchers DCT [6], [10], [9],[8] and DWT [1], [20]. DFT is not preferred because of rounding error in the inverse transform. The three mentioned type’s techniques are used with other techniques including artificial neural networks (ANN), meta-heuristic approaches or both to attain enhanced stenographic performances. Spatial-domain genetic algorithms GAs are used [14], [15] to decrease the distortion. Genetic algorithm and artificial neural networks are used [7] to accelerate the training speed. Frequency-domain ANN is used [21] to increase the embedding capacity. Spatial domain artificial neural networks (ANN) is utilized [12] to attain a realize good approximation capacity, faster convergence, and a more stable performance surface. This type of artificial neural networks (ANN) is moreover used [11], [23] to decrease the distortion and increase the approximation capacity. 2. PPROPOSED METHOD Our proposed approach is based on some terms and concepts were presented by [15]. We define them as: Raster order: It represents the order of pixels while scanning the image for embedding. There are 16 possible directions in the raster order, and they are presented in Figure 1 More number of possibilities of raster orders is to change the starting point. For 3 3 pixels image, there are 144=9 16 case. Other http://www.iaeme.com/IJMET/index.asp 2067 editor@iaeme.com Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area Figure 1 Raster order and different possible orientation of the raster order [15] have proposed the information in the table 1 to be represented in the solutions: Table 1 The information of inserting bits inside spatial domain Information Roster direction Starting point Bit-planes Bit-planes direction Secret poles Secret bits direction Meaning The direction of host image pixel scanning for embedding The starting point of scanning in the host image The positions from LSB in the host image pixels for embedding The direction of embedding in the pixels of the host image The bits of secret are embedded as they are or after inverse The direction of inserting the secret bits In [15] authors proposed a method for hiding message bits inside an image called host image using Genetic Algorithms GA. Hiding a message in an image could be done in different places where each place causes different distortion in the image. GA has been used to determine the best place for hiding data in the host image. The best place means the place that the message could be hid inside with least possible distortion. This method determines the start pixel, number of used least significant bits in each pixel, and the sequence of scanning image pixels in order to hide message bits. Because the mentioned paper uses sequential method in scanning image pixels (columns from right to left or reverse) and (rows from up to down or reverse) in the whole image, it puts a constraint in finding the best place to hide the message where it could be better to scan inside a window from the image instead of scanning inside the whole image. In order to enhance the ability of the mentioned method, the sequential scanning inside whole image has been replaced to sequential scanning inside a window from the image with suitable size for the message. In this manner, the old way is a http://www.iaeme.com/IJMET/index.asp 2068 editor@iaeme.com AHMED KAWTHER HUSSEIN particular case from the proposed method and the new method is a generalization of the old method. In the proposed way, the solution has the following variables: Where represents the offset of the embedding sub-area with respect to x axis represents the offset of the embedding sub-area with respect to y axis represents the direction of the embedding sub-area in the host image represents the positions of the embedding bits in the host image represents the bit poles in the secret image represents the bit direction in the secret image represents the width of the embedding sub-area with respect to x axis represents the width of the embedding sub-area with respect to y axis It is important to note that this optimization follows the following constraints the dimension of window in the x-axis the dimension of window in the y-axis Also, there are two constraints must be satisfied: + <= number of host columns + < number of host rows (Strict inequality because the last line is used for hiding chromosome bites) The particular bits are embedded in the last row of message in order to extract the information in the destination. The objective function that has been used is the PSNR between the host image and stegoimge. The default genetic toolbox in MATLAB was used for the purpose of performing the optimization. 3. EXPERIMENYAL RESUULTS This section presents the experimental work for evaluating the developed approach. We selected six images from different domains; they are shown in the figure-2-. We ran the optimization algorithm on the six images; it converged to the best area to embed the image inside the host image. Figure-3- shows the results of embedding, the red box is the sub-area where the secret image was embedded inside the host image. http://www.iaeme.com/IJMET/index.asp 2069 editor@iaeme.com Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area Figure 2 The host images for testing our developed stego approach Figure 3 Images after Embedding The Secret Image With Showing The Red Box Where The Secret Image Was Embedded Four evaluation measures were generated for each image and compared for the host image and the stego image. Figure 4 show PSNR between host and stego images for both our approach and the baseline approach for the six images. Obviously, our developed approach has achieved higher PSNR which indicates to better quality of embedding. The same is applied for the SSI shown in Figures 5 and correlation measures shown in Figures-7-. Also, Figure 6 show MSE between host and stego images for both our approach and the baseline approach for the six images. Obviously, our developed approach has achieved lower MSE which indicates to better quality of embedding. http://www.iaeme.com/IJMET/index.asp 2070 editor@iaeme.com AHMED KAWTHER HUSSEIN Figure 4 PSNR Between Host and Stego Image for The Tested Images Figure 5 SSI Between Host and Stego Image for The Tested Images http://www.iaeme.com/IJMET/index.asp 2071 editor@iaeme.com Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area Figure 6 MSE Between Host and Stego Image for The Tested Images Figure 7 Correlation between Host and Stego image for The Tested Images 4. COMPARISON BETWEEN THE BASELINE AND OUR APPROACH The essential difference between our approach and the baseline approach is the more degree of freedom that is attained in our approach when embedding the secret bits inside the host image. In our approach we do not consider that the secret bits should be hidden in sequential manner, rather, it assumes that any block with any height and width can be applied to embed the bits of secret. As a result, our approach avoided local minima in the searching and provided better results than the baseline approach. 5. CONCLUSION In this article, the article has relied on the original work of [14] that uses genetic algorithm for modeling the steganography problem. In this article, a generalization of the optimization http://www.iaeme.com/IJMET/index.asp 2072 editor@iaeme.com AHMED KAWTHER HUSSEIN approach developed by [14] that allows embedding the image in any sub-area inside the host image with adaptive height and width of the embedding area in order to maintain best embedding measures. Results have shown a superiority of our developed approach over the baseline approach with respect to all evaluation measures: PSNR, SSI, MSE, and correlation. Future work is to more develop the approach to increase the freedom degree of the embedding process. ACKNOWLEDGMENTS The author would like to thank the Mustansiriyah university (www.uomustansiriyah.edu.iq) Baghdad - Iraq for its support in the present work. REFRENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Abdelwahab, Ahmed A., and Lobna A. Hassaan. "A discrete wavelet transform based technique for image data hiding." In Radio Science Conference, 2008. NRSC 2008. National, pp. 1-9. IEEE, 2008. Amirkhani, Hossein, and Mohammad Rahmati. "New framework for using image contents in blind steganalysis systems." Journal of Electronic Imaging 20, no. 1 (2011): 013016. Banerjee, Indradip, Souvik Bhattacharyya, and Gautam Sanyal. "Hiding & analyzing data in image using extended PMM." Procedia Technology 10 (2013): 157-166. Barni, Mauro. "Steganography in Digital Media: Principles, Algorithms, and Applications (Fridrich, J. 2010)[Book Reviews]." IEEE Signal Processing Magazine 28, no. 5 (2011): 142-144. Cheddad, Abbas, Joan Condell, Kevin Curran, and Paul Mc Kevitt. "Digital image steganography: Survey and analysis of current methods." Signal processing 90, no. 3 (2010): 727-752. Cho, Seongho, Byung-Ho Cha, Martin Gawecki, and C-C. Jay Kuo. "Block-based image steganalysis: Algorithm and performance evaluation." Journal of Visual Communication and Image Representation 24, no. 7 (2013): 846-856. El-Emam, Nameer N., and Rasheed Abdul Shaheed Al-Zubidy. "New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm." Journal of Systems and Software 86, no. 6 (2013): 1465-1481. Filler, Tomáš, Jan Judas, and Jessica Fridrich. "Minimizing additive distortion in steganography using syndrome-trellis codes." IEEE Transactions on Information Forensics and Security 6, no. 3 (2011): 920-935. Filler, Tomás, and Jessica Fridrich. "Design of adaptive steganographic schemes for digital images." In Media Watermarking, Security, and Forensics III, vol. 7880, p. 78800F. International Society for Optics and Photonics, 2011. Fridrich, Jessica, Tomáš Pevný, and Jan Kodovský. "Statistically undetectable jpeg steganography: dead ends challenges, and opportunities." In Proceedings of the 9th workshop on Multimedia & security, pp. 3-14. ACM, 2007. Ghaleb Al-Jbara, Hamsah A., Laiha Binti Mat Kiah, and Hamid A. Jalab. "Increased capacity of image based steganography using artificial neural network." In AIP Conference Proceedings, vol. 1482, no. 1, pp. 20-25. AIP, 2012. Husien, Sabah, and Haitham Badi. "Artificial neural network for steganography." Neural Computing and Applications 26, no. 1 (2015): 111-116. Hussain, Mehdi, Ainuddin Wahid Abdul Wahab, Yamani Idna Bin Idris, Anthony TS Ho, and Ki-Hyun Jung. "Image steganography in spatial domain: A survey." Signal Processing: Image Communication 65 (2018): 46-66 http://www.iaeme.com/IJMET/index.asp 2073 editor@iaeme.com Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area [14] [15] [16] [17] [18] [19] [20] [21] [22] Iranpour, Mehran, and Mohammad Rahmati. "An efficient steganographic framework based on dynamic blocking and genetic algorithm." Multimedia Tools and Applications 74, no. 24 (2015): 11429-11450. Kanan, Hamidreza Rashidy, and Bahram Nazeri. "A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm." Expert Systems with Applications 41, no. 14 (2014): 6123-6130. Ker, Andrew D., and Rainer Böhme. "Revisiting weighted stego-image steganalysis." In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, p. 681905. International Society for Optics and Photonics, 2008. Luo, Weiqi, Fangjun Huang, and Jiwu Huang. "Edge adaptive image steganography based on LSB matching revisited." IEEE Transactions on information forensics and security 5, no. 2 (2010): 201-214. Muhammad, Khan, Jamil Ahmad, Haleem Farman, Zahoor Jan, Muhammad Sajjad, and Sung Wook Baik. "A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption." TIIS 9, no. 5 (2015): 1938-1962. Pevný, Tomáš, Tomáš Filler, and Patrick Bas. "Using high-dimensional image models to perform highly undetectable steganography." In International Workshop on Information Hiding, pp. 161-177. Springer, Berlin, Heidelberg, 2010. Prabakaran, G., and R. Bhavani. "A modified secure digital image steganography based on Discrete Wavelet Transform." In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on, pp. 1096-1100. IEEE, 2012. Tsai, Du-Shiau, Gwoboa Horng, Tzung-Her Chen, and Yao-Te Huang. "A novel secret image sharing scheme for true-color images with size constraint." Information Sciences 179, no. 19 (2009): 3247-3254. Wu, Hsien-Chu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, and Hung-Ruei Chen. "A high capacity reversible data hiding scheme with edge prediction and difference expansion." Journal of Systems and Software 82, no. 12 (2009): 1966-1973. Zaidan, B. B., A. A. Zaidan, Alaa Taqa, Gazi Mahabubul Alam, ML Mat Kiah, and A. Hamid Jalab. "StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem." International Journal of Physical Sciences 5, no. 11 (2010): 1796-1806. http://www.iaeme.com/IJMET/index.asp 2074 editor@iaeme.com