Uploaded by IAEME PUBLICATION

GENETIC ALGORITHM BASED STEGANOGRAPHY USING ADAPTIVE RECTANGULAR EMBEDDING AREA

advertisement
International Journal of Mechanical Engineering and Technology (IJMET)
Volume 10, Issue 01, January 2019, pp. 2066-2074, Article ID: IJMET_10_01_202
Available online at http://www.iaeme.com/ijmet/issues.asp?JType=IJMET&VType=10&IType=1
ISSN Print: 0976-6340 and ISSN Online: 0976-6359
© IAEME Publication
Scopus Indexed
GENETIC ALGORITHM BASED
STEGANOGRAPHY USING ADAPTIVE
RECTANGULAR EMBEDDING AREA
AHMED KAWTHER HUSSEIN
Department of Computer Science, College of Education,
Mustansiriyah University, Baghdad-Iraq
ABSTRACT
Image steganography is to hide an image inside an image for security purpose.
Different approaches were applied for image steganography some of them are based
on spatial domain and others are based on frequency domain. Spatial domain
steganography approaches are simpler because they do not involve applying any
transformation to the image. In this article, genetic algorithm is presented for
searching for the best locations to hide the image bits inside the image. The image can
be embedded in an adaptive block inside the host image. Furthermore, the secret bits
can be reserved and inverted before embedding in order to optimize the hiding
performance measures. Results show superiority over the baseline approach with
respect to all evaluation measures
Keywords: Stenography, genetic algorithm, meta heuristic searching, image
embedding.
Cite this Article: AHMED KAWTHER HUSSEIN, Genetic Algorithm Based
Steganography using Adaptive Rectangular Embedding Area, International Journal of
Mechanical Engineering and Technology, 10(1), 2019, pp. 2066-2074.
http://www.iaeme.com/IJMET/issues.asp?JType=IJMET&VType=10&IType=1
1. INTRODUCTION
The science of hiding messages in a medium called cover or carrier object is Steganography
like Text, image, audio, video, etc. [13] in a way that presence of the message is not
discovered. Today, like transaction and communication have become on the Internet wellknown, securities of information technology and communication have become essential.
Steganography is playing very important part in securing the digital world communication.
The essential steganography intentions are to assure the necessary of the steganography
system security, defend the confidential data from being increase the embedding capability
and reached by invadors.
Among all steganography techniques, image steganography has an advantage that the
digital images have a right amount of irrelevant data, which can be formed to cover hidden
http://www.iaeme.com/IJMET/index.asp
2066
editor@iaeme.com
AHMED KAWTHER HUSSEIN
information without influencing too much distortion in the cover image. The reason of
preferring image steganography over other types is that images are the most exchanged
medium between people in the virtual world which makes very convenient to hide secret
messages in images. Various steganography techniques hide the information behind image
files, one of them is Spatial Domain Techniques, and this technique encodes the message by
using pixel gray level along with their color values. Three types of embedding approaches for
steganography were followed: the first type uses the frequency domain for embedding.
Examples are found in [6] [10], [20], [22], [1] while the second type uses the spatial domain,
examples are found in [17], [3].In the third type, combination of them. Some researchers have
combined the spatial and frequency domains. The spatial domain aims at inserting the secret
bits in the lower weights bits [19],[18],[3],[23],[14],[16]. Example is to use the least
significant bit of the cover image to hide a whole message. The limitations of the spatial
embedding techniques are their vulnerabilities to image-processing operations, noise attacks;
lossy compression, filtering and they are subject to statistical attacks. Examples of
steganalysis methods [2], [4], [15]. In the frequency-domain steganography, various domain
transforms are used such as discrete cosine transforms (DCT), discrete wavelet transforms
(DWT), and discrete Fourier transforms (DFT). DWT is preferred because of its robustness
against image-processing operations, statistical and noise attacks as well as distortion [5].
However, both DCT and DWT have smaller capacities. Also, DCT was used by numerous
researchers DCT [6], [10], [9],[8] and DWT [1], [20]. DFT is not preferred because of
rounding error in the inverse transform. The three mentioned type’s techniques are used with
other techniques including artificial neural networks (ANN), meta-heuristic approaches or
both to attain enhanced stenographic performances. Spatial-domain genetic algorithms GAs
are used [14], [15] to decrease the distortion. Genetic algorithm and artificial neural networks
are used [7] to accelerate the training speed. Frequency-domain ANN is used [21] to increase
the embedding capacity. Spatial domain artificial neural networks (ANN) is utilized [12] to
attain a realize good approximation capacity, faster convergence, and a more stable
performance surface. This type of artificial neural networks (ANN) is moreover used [11],
[23] to decrease the distortion and increase the approximation capacity.
2. PPROPOSED METHOD
Our proposed approach is based on some terms and concepts were presented by [15]. We
define them as: Raster order: It represents the order of pixels while scanning the image for
embedding. There are 16 possible directions in the raster order, and they are presented in
Figure 1 More number of possibilities of raster orders is to change the starting point. For 3 3
pixels image, there are 144=9 16 case. Other
http://www.iaeme.com/IJMET/index.asp
2067
editor@iaeme.com
Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area
Figure 1 Raster order and different possible orientation of the raster order
[15] have proposed the information in the table 1 to be represented in the solutions:
Table 1 The information of inserting bits inside spatial domain
Information
Roster direction
Starting point
Bit-planes
Bit-planes
direction
Secret poles
Secret bits
direction
Meaning
The direction of host image pixel scanning for
embedding
The starting point of scanning in the host image
The positions from LSB in the host image pixels for
embedding
The direction of embedding in the pixels of the host
image
The bits of secret are embedded as they are or after
inverse
The direction of inserting the secret bits
In [15] authors proposed a method for hiding message bits inside an image called host
image using Genetic Algorithms GA. Hiding a message in an image could be done in
different places where each place causes different distortion in the image. GA has been used
to determine the best place for hiding data in the host image. The best place means the place
that the message could be hid inside with least possible distortion. This method determines
the start pixel, number of used least significant bits in each pixel, and the sequence of
scanning image pixels in order to hide message bits. Because the mentioned paper uses
sequential method in scanning image pixels (columns from right to left or reverse) and (rows
from up to down or reverse) in the whole image, it puts a constraint in finding the best place
to hide the message where it could be better to scan inside a window from the image instead
of scanning inside the whole image. In order to enhance the ability of the mentioned method,
the sequential scanning inside whole image has been replaced to sequential scanning inside a
window from the image with suitable size for the message. In this manner, the old way is a
http://www.iaeme.com/IJMET/index.asp
2068
editor@iaeme.com
AHMED KAWTHER HUSSEIN
particular case from the proposed method and the new method is a generalization of the old
method.
In the proposed way, the solution has the following variables:
Where
represents the offset of the embedding sub-area with respect to x axis
represents the offset of the embedding sub-area with respect to y axis
represents the direction of the embedding sub-area in the host image
represents the positions of the embedding bits in the host image
represents the bit poles in the secret image
represents the bit direction in the secret image
represents the width of the embedding sub-area with respect to x axis
represents the width of the embedding sub-area with respect to y axis
It is important to note that this optimization follows the following constraints
the dimension of window in the x-axis
the dimension of window in the y-axis
Also, there are two constraints must be satisfied:
+ <= number of host columns
+ < number of host rows (Strict inequality because the last line is used for hiding
chromosome bites)
The particular bits are embedded in the last row of message in order to extract the
information in the destination.
The objective function that has been used is the PSNR between the host image and stegoimge. The default genetic toolbox in MATLAB was used for the purpose of performing the
optimization.
3. EXPERIMENYAL RESUULTS
This section presents the experimental work for evaluating the developed approach. We
selected six images from different domains; they are shown in the figure-2-. We ran the
optimization algorithm on the six images; it converged to the best area to embed the image
inside the host image. Figure-3- shows the results of embedding, the red box is the sub-area
where the secret image was embedded inside the host image.
http://www.iaeme.com/IJMET/index.asp
2069
editor@iaeme.com
Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area
Figure 2 The host images for testing our developed stego approach
Figure 3 Images after Embedding The Secret Image With Showing The Red Box Where The Secret
Image Was Embedded
Four evaluation measures were generated for each image and compared for the host
image and the stego image. Figure 4 show PSNR between host and stego images for both our
approach and the baseline approach for the six images. Obviously, our developed approach
has achieved higher PSNR which indicates to better quality of embedding. The same is
applied for the SSI shown in Figures 5 and correlation measures shown in Figures-7-. Also,
Figure 6 show MSE between host and stego images for both our approach and the baseline
approach for the six images. Obviously, our developed approach has achieved lower MSE
which indicates to better quality of embedding.
http://www.iaeme.com/IJMET/index.asp
2070
editor@iaeme.com
AHMED KAWTHER HUSSEIN
Figure 4 PSNR Between Host and Stego Image for The Tested Images
Figure 5 SSI Between Host and Stego Image for The Tested Images
http://www.iaeme.com/IJMET/index.asp
2071
editor@iaeme.com
Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area
Figure 6 MSE Between Host and Stego Image for The Tested Images
Figure 7 Correlation between Host and Stego image for The Tested Images
4. COMPARISON BETWEEN THE BASELINE AND OUR APPROACH
The essential difference between our approach and the baseline approach is the more degree
of freedom that is attained in our approach when embedding the secret bits inside the host
image. In our approach we do not consider that the secret bits should be hidden in sequential
manner, rather, it assumes that any block with any height and width can be applied to embed
the bits of secret. As a result, our approach avoided local minima in the searching and
provided better results than the baseline approach.
5. CONCLUSION
In this article, the article has relied on the original work of [14] that uses genetic algorithm for
modeling the steganography problem. In this article, a generalization of the optimization
http://www.iaeme.com/IJMET/index.asp
2072
editor@iaeme.com
AHMED KAWTHER HUSSEIN
approach developed by [14] that allows embedding the image in any sub-area inside the host
image with adaptive height and width of the embedding area in order to maintain best
embedding measures. Results have shown a superiority of our developed approach over the
baseline approach with respect to all evaluation measures: PSNR, SSI, MSE, and correlation.
Future work is to more develop the approach to increase the freedom degree of the embedding
process.
ACKNOWLEDGMENTS
The author would like to thank the Mustansiriyah university (www.uomustansiriyah.edu.iq)
Baghdad - Iraq for its support in the present work.
REFRENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
Abdelwahab, Ahmed A., and Lobna A. Hassaan. "A discrete wavelet transform based
technique for image data hiding." In Radio Science Conference, 2008. NRSC 2008.
National, pp. 1-9. IEEE, 2008.
Amirkhani, Hossein, and Mohammad Rahmati. "New framework for using image contents
in blind steganalysis systems." Journal of Electronic Imaging 20, no. 1 (2011): 013016.
Banerjee, Indradip, Souvik Bhattacharyya, and Gautam Sanyal. "Hiding & analyzing data
in image using extended PMM." Procedia Technology 10 (2013): 157-166.
Barni, Mauro. "Steganography in Digital Media: Principles, Algorithms, and Applications
(Fridrich, J. 2010)[Book Reviews]." IEEE Signal Processing Magazine 28, no. 5 (2011):
142-144.
Cheddad, Abbas, Joan Condell, Kevin Curran, and Paul Mc Kevitt. "Digital image
steganography: Survey and analysis of current methods." Signal processing 90, no. 3
(2010): 727-752.
Cho, Seongho, Byung-Ho Cha, Martin Gawecki, and C-C. Jay Kuo. "Block-based image
steganalysis: Algorithm and performance evaluation." Journal of Visual Communication
and Image Representation 24, no. 7 (2013): 846-856.
El-Emam, Nameer N., and Rasheed Abdul Shaheed Al-Zubidy. "New steganography
algorithm to conceal a large amount of secret message using hybrid adaptive neural
networks with modified adaptive genetic algorithm." Journal of Systems and Software 86,
no. 6 (2013): 1465-1481.
Filler, Tomáš, Jan Judas, and Jessica Fridrich. "Minimizing additive distortion in
steganography using syndrome-trellis codes." IEEE Transactions on Information
Forensics and Security 6, no. 3 (2011): 920-935.
Filler, Tomás, and Jessica Fridrich. "Design of adaptive steganographic schemes for
digital images." In Media Watermarking, Security, and Forensics III, vol. 7880, p.
78800F. International Society for Optics and Photonics, 2011.
Fridrich, Jessica, Tomáš Pevný, and Jan Kodovský. "Statistically undetectable jpeg
steganography: dead ends challenges, and opportunities." In Proceedings of the 9th
workshop on Multimedia & security, pp. 3-14. ACM, 2007.
Ghaleb Al-Jbara, Hamsah A., Laiha Binti Mat Kiah, and Hamid A. Jalab. "Increased
capacity of image based steganography using artificial neural network." In AIP
Conference Proceedings, vol. 1482, no. 1, pp. 20-25. AIP, 2012.
Husien, Sabah, and Haitham Badi. "Artificial neural network for steganography." Neural
Computing and Applications 26, no. 1 (2015): 111-116.
Hussain, Mehdi, Ainuddin Wahid Abdul Wahab, Yamani Idna Bin Idris, Anthony TS Ho,
and Ki-Hyun Jung. "Image steganography in spatial domain: A survey." Signal
Processing: Image Communication 65 (2018): 46-66
http://www.iaeme.com/IJMET/index.asp
2073
editor@iaeme.com
Genetic Algorithm Based Steganography using Adaptive Rectangular Embedding Area
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
Iranpour, Mehran, and Mohammad Rahmati. "An efficient steganographic framework
based on dynamic blocking and genetic algorithm." Multimedia Tools and Applications
74, no. 24 (2015): 11429-11450.
Kanan, Hamidreza Rashidy, and Bahram Nazeri. "A novel image steganography scheme
with high embedding capacity and tunable visual image quality based on a genetic
algorithm." Expert Systems with Applications 41, no. 14 (2014): 6123-6130.
Ker, Andrew D., and Rainer Böhme. "Revisiting weighted stego-image steganalysis." In
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol.
6819, p. 681905. International Society for Optics and Photonics, 2008.
Luo, Weiqi, Fangjun Huang, and Jiwu Huang. "Edge adaptive image steganography
based on LSB matching revisited." IEEE Transactions on information forensics and
security 5, no. 2 (2010): 201-214.
Muhammad, Khan, Jamil Ahmad, Haleem Farman, Zahoor Jan, Muhammad Sajjad, and
Sung Wook Baik. "A Secure Method for Color Image Steganography using Gray-Level
Modification and Multi-level Encryption." TIIS 9, no. 5 (2015): 1938-1962.
Pevný, Tomáš, Tomáš Filler, and Patrick Bas. "Using high-dimensional image models to
perform highly undetectable steganography." In International Workshop on Information
Hiding, pp. 161-177. Springer, Berlin, Heidelberg, 2010.
Prabakaran, G., and R. Bhavani. "A modified secure digital image steganography based on
Discrete Wavelet Transform." In Computing, Electronics and Electrical Technologies
(ICCEET), 2012 International Conference on, pp. 1096-1100. IEEE, 2012.
Tsai, Du-Shiau, Gwoboa Horng, Tzung-Her Chen, and Yao-Te Huang. "A novel secret
image sharing scheme for true-color images with size constraint." Information Sciences
179, no. 19 (2009): 3247-3254.
Wu, Hsien-Chu, Chih-Chiang Lee, Chwei-Shyong Tsai, Yen-Ping Chu, and Hung-Ruei
Chen. "A high capacity reversible data hiding scheme with edge prediction and difference
expansion." Journal of Systems and Software 82, no. 12 (2009): 1966-1973.
Zaidan, B. B., A. A. Zaidan, Alaa Taqa, Gazi Mahabubul Alam, ML Mat Kiah, and A.
Hamid Jalab. "StegoMos: A secure novel approach of high rate data hidden using mosaic
image and ANN-BMP cryptosystem." International Journal of Physical Sciences 5, no. 11
(2010): 1796-1806.
http://www.iaeme.com/IJMET/index.asp
2074
editor@iaeme.com
Download