Optimized support vector neural network and contourlet transform for image steganography | Evolutionary Intelligence Skip to main content
Log in

Optimized support vector neural network and contourlet transform for image steganography

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Image steganography is one of the promising and popular techniques used to secure the sensitive information. Even though there are numerous steganography techniques for hiding the sensitive information, there are still a lot of challenges to the researchers regarding the effective hiding of the sensitive data. Thus, an effective pixel prediction-based image steganography method is proposed, which uses the error dependent SVNN classifier for effective pixel identification. The suitable pixels are effectively identified from the medical image using the SVNN classifier using the pixel features, such as edge information, pixel coverage, texture, wavelet energy, Gabor, and scattering features. Here, the SVNN is trained optimally using the GA or MS Algorithm based on the minimal error. Then, the CT is applied to the predicted pixel for embedding. Finally, the inverse CT is employed to extract the secret message from the embedded image. The experimentation of the proposed image steganography is performed using the BRATS database depending on the performance metrics, PSNR, SSIM, and correlation coefficient, which acquired 89.3253 dB, 1, and 1, for the image without noise and 48.5778 dB, 0.6123, and 0.9933, for the image affected by noise, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Abbreviations

SVNN:

Support vector neural network

GA:

Genetic algorithm

MS:

Moth search

CT:

Contourlet transform

PSNR:

Peek signal to noise ratio

SSIM:

Structural similarity index

LSB:

Least significant bit

DFT:

Discrete fourier transform

DCT:

Discrete cosine transform

DWT:

Discrete wavelet transform

MRSLS:

Multi random start local search

CI:

Cohort intelligence

MSB:

Most significant bit

SWE:

Steganography without embedding

LBP:

Local binary pattern

CWSM:

Cost function for image steganography using wavelet

References

  1. Emad E, Safey A, Refaat A, Osama Z, Sayed E, Mohamed E (2018) A secure image steganography algorithm based on least significant bit and integer wavelet transform. J Syst Eng Electron 29(3):639–649

    Article  Google Scholar 

  2. Hu D, Xu H, Ma Z, Zheng S, Li B (2018) A spatial image steganography method based on nonnegative matrix factorization. IEEE Signal Process Lett 25(9):1364–1368

    Article  Google Scholar 

  3. Mukhedkar M, Powar V, Gaikwad P (2015) Secure non real time image encryption algorithm development using cryptography and Steganography. In: Proceedings of the annual IEEE india conference (INDICON), pp 1–6

  4. Vinolin V, Vinusha S (2018) Edge-based image steganography using edge least significant bit (ELSB) technique. Multimed Res 1(1):9–16

    Google Scholar 

  5. Kim CR, Lee SH, Lee JH, Park JI (2018) Blind decoding of image steganography using entropy model. Electron Lett 54(10):626–628

    Article  Google Scholar 

  6. Nag A, Biswas S, Sarkar D, Sarkar PP (2010) A novel technique for image steganography based on Block-DCT and Huffman Encoding. arXiv preprint arXiv:1006.1186

  7. Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Proc 12(6):1065–1071

    Article  Google Scholar 

  8. Zhou Y, Agaian S (2011) Image encryption using the image steganography concept and PLIP model. In: IEEE international conference in system science and engineering (ICSSE), Macao, pp 699–703

  9. Sarmah DK, Kulkarni AJ (2018) Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods. Arab J Sci Eng 43:3927–3950

    Article  Google Scholar 

  10. Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6:38303–38314

    Article  Google Scholar 

  11. Patel N, Meena S (2016) LSB based image steganography using dynamic key cryptography. In: IEEE international conference on emerging trends in communication technologies (ETCT), Dehradun, pp 1–5

  12. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083

    Article  Google Scholar 

  13. Tan S, Li B (2012) Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting. IEEE Signal Process Lett 19(6):336–339

    Article  Google Scholar 

  14. Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133–13144

    Article  Google Scholar 

  15. Vinod Kumar RS, Arivazhagan S (2011) Adaptive patch based texture synthesis using wavelets. In: Proceedings of the IEEE sponsored international conference on signal processing computing, communication and networking technologies (ICSCCN 2011), Thuckafay

  16. Nipanikar SI, Deepthi VH (2018) A multiple criteria-based cost function using wavelet and edge transformation for medical image steganography. J Intell Syst 27(3):331–347

    Article  Google Scholar 

  17. Satish C, Vijaya P, Dhyani P (2016) Fractional lion algorithm—an optimization algorithm for data clustering. J Comput Sci 12(7):323–340

    Article  Google Scholar 

  18. Ingle RB, More NS (2018) Energy-aware VM migration using Dragonfly-Crow optimization and support vector regression model in Cloud Data. Int J Mod Simul Sci Comput 9:1–4

    Google Scholar 

  19. Denemark T, Fridrich J (2017) Steganography with multiple JPEG images of the same scene. IEEE Trans Inf Forensics Secur 12(10):2308–2319

    Article  Google Scholar 

  20. Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimed 12(5):345–357

    Article  Google Scholar 

  21. Niimi M, Noda H, Kawaguchi E, Eason RO (2002) High capacity and secure digital steganography to palette-based images. In: IEEE international conference in image processing, Rochester

  22. Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensics Secur 10(2):243–255

    Article  Google Scholar 

  23. Eslami R, Radha H (2003) The contourlet transform for image denoising using cycle spinning. In: IEEE conference record of the, thirty-seventh asilomar conference, on signals, systems and computers, vol 2, pp 1982–1986

  24. Vinod Kumar RS, Arivazhagan S (2015) Adaptive patch based texture synthesis using contourlet transform. J Int Fuzzy Syst 28(3):1061–1070

    Google Scholar 

  25. Yu C (2017) Steganography of digital watermark by Arnold scrambling transform with blind source separation morphological component analysis. Multimed Tools Appl 76(5):6821–6842

    Article  Google Scholar 

  26. Pandey P, Singh R, Vatsa M (2016) Face recognition using scattering wavelet under Illicit Drug Abuse variations. In: Proceedings of international conference on biometrics (ICB), Halmstad, pp 1–6

  27. Kong WK, Zhang D, Li W (2003) Palmprint feature extraction using 2-D Gabor filters. Pattern Recogn 36(10):2339–2347

    Article  Google Scholar 

  28. Guo Z, Zhang L, Zhang D (2010) A completed modeling of local binary pattern operator for texture classification. IEEE Trans Image Process 19(6):1657–1663

    Article  MathSciNet  Google Scholar 

  29. Ludwig O, Nunes U, Araujo R (2014) Eigenvalue decay: a new method for neural network regularization. Neurocomputing 124:33–42

    Article  Google Scholar 

  30. Wang G-G (2018) Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problems. Memet Comput 10(2):151–164

    Article  Google Scholar 

  31. BRATS brain tumor database. https://www.smir.ch/BRATS/Start2015, Accessed on December 2017

  32. Ramalingam M, Isa NAM (2014) A steganography approach for sequential data encoding and decoding in video images. In: Proceedings of international conference on computer, control, informatics and its applications (IC3INA), Bandung, pp 120–125

  33. Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur 1:8

    Article  Google Scholar 

  34. Nipanikar S, Hima Deepthi V (2016) A multiple criteria-based cost function using wavelet and edge transformation for medical image steganography. J Intell Syst 27(3):331–347

    Article  Google Scholar 

  35. Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905–1917

    Article  Google Scholar 

  36. Nikolov S, Hill P, Bull D, Canagarajah N (2001) Wavelets for image fusion. In: Petrosian AA, Meyer FG (eds) Wavelets in signal and image analysis. Computational imaging and vision, vol 19. Springer, Dordrecht, pp 213–241

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. K. Reshma.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Reshma, V.K., Vinod Kumar, R.S., Shahi, D. et al. Optimized support vector neural network and contourlet transform for image steganography. Evol. Intel. 15, 1295–1311 (2022). https://doi.org/10.1007/s12065-020-00387-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-020-00387-8

Keywords

Navigation