Abstract
An optimal steganography method is provided to embed the secret data into the low-order bits of host pixels. The main idea of the proposed method is that before the embedding process, the secret data are mapped to the optimal values using Bayesian optimization algorithm (along with introducing a novel mutation operator), in order to reduce the mean square error (MSE) and also maintain the structural similarity between the images before and after embedding (i.e., preserving the visual quality of the embedded-image). Then, the mapped data are embedded into the low-order bits of host pixels using modulus function and a systematic and reversible algorithm. Since the proposed method is able to embed data into more significant bits, it has enhanced the payload, while preserving the visual quality of the image. Extraction of data from the host image is possible without requiring the original image. The simulation results show that the proposed algorithm can lead to a minimum loss in MSE criterion and also a minimal reduction in visual quality of the image in terms of diagnostic criteria of the human eye, whereas there is no limitation on the improvement of payload, in comparison with other methods.
Similar content being viewed by others
References
Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York
Zeng W (1998) Digital watermarking and data hiding: technologies and applications. In: Proceedings of international conference on information systems, analysis and synthesis, pp 223–229
Wu M, Liu B (2003) Data hiding in image and video. I. Fundamental issues and solutions. IEEE Trans Image Process 12(6):685–695
Wu M, Yu H, Liu B (2003) Data hiding in image and video. II. Designs and applications. IEEE Trans Image Process 12(6):696–705
Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recogn Lett 25(3):331–339
Wang C-T, Yu H-F (2012) A Markov-based reversible data hiding method based on histogram shifting. J Vis Commun Image Represent 23(5):798–811
Naji A, Zaidan A, Zaidan B, Hameed SA, Khalifa OO (2009) Novel approach for secure cover file of hidden data in the unused area within exe file using computation between cryptography and steganography. Int J Comput Sci Netw Secur 9(5):294–300
Ahadpour S, Majidpour M, Sadra Y (2012) Public key steganography using discrete cross-coupled chaotic maps. arXiv preprint arXiv:12110086
Alia MA, Yahya A (2010) Public–key steganography based on matching method. Eur J Sci Res 40(2):223–231
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Zou D, Shi YQ, Ni Z, Su W (2006) A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans Circuits Syst Video Technol 16(10):1294–1300
Dosselmann R, Yang XD (2005) Existing and emerging image quality metrics. In: 2005 Canadian conference on electrical and computer engineering. IEEE, pp 1906–1913
Sheikh HR, Bovik AC (2006) Image information and visual quality. IEEE Trans Image Process 15(2):430–444
Wang Z, Bovik AC, Lu L (2002) Why is image quality assessment so difficult? In: 2002 IEEE international conference on acoustics, speech, and signal processing (ICASSP). IEEE, pp IV-3313–IV-3316
Eskicioglu AM, Fisher PS (1995) Image quality measures and their performance. IEEE Trans Commun 43(12):2959–2965
Winkler S, Susstrunk S (2004) Visibility of noise in natural images. In: 2004 international society for optics and photonics electronic imaging, pp 121–129
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600–612
Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Secur (IJCSS) 6(3):168–187
Motamedi H, Jafari A (2012) A new image steganography based on denoising methods in wavelet domain. In: 2012 9th international ISC conference on information security and cryptology (ISCISC). IEEE, pp 18–25
Yang H, Sun X, Sun G (2009) A high-capacity image data hiding scheme using adaptive LSB substitution. Radioengineering 18(4):509–516
Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671–683
Thien C-C, Lin J-C (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36(12):2875–2881
Chang C-C, Chan C-S, Fan Y-H (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167
Ker AD (2005) Steganalysis of LSB matching in grayscale images. IEEE Signal Process Lett 12(6):441–444
Mielikainen J (2006) LSB matching revisited. IEEE Signal Process Lett 13(5):285–287
Wu D-C, Tsai W-H (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9):1613–1626
Chang C-C, Kieu TD, Chou Y-C (2008) A high payload steganographic scheme based on (7, 4) hamming code for digital images. In: 2008 international symposium on electronic commerce and security. IEEE, pp 16–21
Molaei AM, Sedaaghi MH, Ebrahimnezhad H (2014) a blind steganography based on Reed-Solomon codes and optimal substitution table with improving payload and robustness. Tabriz J Electr Eng 43(2):43–59 (In Persian)
Molaei A, Sedaaghi M, Ebrahimnezhad H (2017) Steganography scheme based on Reed-Muller code with improving payload and ability to retrieval of destroyed data for digital images. AUT J Electr Eng 49(1):53–62
Zhang Y, Jiang J, Zha Y, Zhang H, Zhao S (2013) Research on embedding capacity and efficiency of information hiding based on digital images. Int J Intell Sci 3(02):77
Jena B (2014) High payload digital image steganography using mixed edge detection mechanism. MTech thesis, National Institute of Technology Rourkela, India, Retrieved from http://ethesis.nitrkl.ac.in/6468/
Yin Z-X, Chang C-C, Xu Q, Luo B (2015) Second-order steganographic method based on adaptive reference matrix. IET Image Proc 9(4):300–305
Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783
Chang C-C, Chou Y-C, Kieu TD (2008) An information hiding scheme using Sudoku. In: 2008 3rd international conference on innovative computing information and control ICICIC’08. IEEE, p 17
Hong W, Chen T-S, Shiu C-W (2008) A minimal Euclidean distance searching technique for Sudoku steganography. In: 2008 international symposium on information science and engineering. IEEE, pp 515–518
Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 1:1
Yin Z, Luo B (2015) MDE-based image steganography with large embedding capacity. Secur Commun Netw 9(8):721–728
Ulker M, Arslan B (2018) A novel secure model: image steganography with logistic map and secret key. In: 2018 6th international symposium on digital forensic and security (ISDFS). IEEE, pp 1–5
Pelikan M (2005) Hierarchical Bayesian optimization algorithm. In: Hierarchical Bayesian optimization algorithm. Springer, pp 105–129
Kjaerulff UB, Madsen AL (2008) Bayesian networks and influence diagrams, vol 200. Springer, Berlin, p 114
Cooper GF (1990) The computational complexity of probabilistic inference using Bayesian belief networks. Artif Intell 42(2–3):393–405
Heckerman D, Geiger D, Chickering DM (1995) Learning Bayesian networks: the combination of knowledge and statistical data. Mach Learn 20(3):197–243
Cooper GF, Herskovits E (1992) A Bayesian method for the induction of probabilistic networks from data. Mach Learn 9(4):309–347
Castillo E, Gutierrez JM, Hadi AS (2012) Expert systems and probabilistic network models. Springer, Berlin
Pelikan M, Goldberg DE, Cantu-Paz E (2000) Linkage problem, distribution estimation, and Bayesian networks. Evol Comput 8(3):311–340
Ingemar JC, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography. Morgan Kaufmann, Burlington
PourArian MR, Hanani A (2016) Blind steganography in color images by double wavelet transform and improved Arnold transform. Indones J Electr Eng Comput Sci 3(3):586–600
Jin Y, Olhofer M, Sendhoff B (2001) Dynamic weighted aggregation for evolutionary multi-objective optimization: Why does it work and how? In: Proceedings of the 3rd annual conference on genetic and evolutionary computation. Morgan Kaufmann Publishers Inc., pp 1042–1049
Da Ronco CC, Benini E (2014) A simplex-crossover-based multi-objective evolutionary algorithm. In: IAENG transactions on engineering technologies. Springer, pp 583–598
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Molaei, A.M., Ebrahimzadeh, A. Optimal steganography with blind detection based on Bayesian optimization algorithm. Pattern Anal Applic 22, 205–219 (2019). https://doi.org/10.1007/s10044-018-00773-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-018-00773-0