Abstract
Image steganography is one of the promising and popular techniques used to secure the sensitive information. Even though there are numerous steganography techniques for hiding the sensitive information, there are still a lot of challenges to the researchers regarding the effective hiding of the sensitive data. Thus, an effective pixel prediction-based image steganography method is proposed, which uses the error dependent SVNN classifier for effective pixel identification. The suitable pixels are effectively identified from the medical image using the SVNN classifier using the pixel features, such as edge information, pixel coverage, texture, wavelet energy, Gabor, and scattering features. Here, the SVNN is trained optimally using the GA or MS Algorithm based on the minimal error. Then, the CT is applied to the predicted pixel for embedding. Finally, the inverse CT is employed to extract the secret message from the embedded image. The experimentation of the proposed image steganography is performed using the BRATS database depending on the performance metrics, PSNR, SSIM, and correlation coefficient, which acquired 89.3253 dB, 1, and 1, for the image without noise and 48.5778 dB, 0.6123, and 0.9933, for the image affected by noise, respectively.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Abbreviations
- SVNN:
-
Support vector neural network
- GA:
-
Genetic algorithm
- MS:
-
Moth search
- CT:
-
Contourlet transform
- PSNR:
-
Peek signal to noise ratio
- SSIM:
-
Structural similarity index
- LSB:
-
Least significant bit
- DFT:
-
Discrete fourier transform
- DCT:
-
Discrete cosine transform
- DWT:
-
Discrete wavelet transform
- MRSLS:
-
Multi random start local search
- CI:
-
Cohort intelligence
- MSB:
-
Most significant bit
- SWE:
-
Steganography without embedding
- LBP:
-
Local binary pattern
- CWSM:
-
Cost function for image steganography using wavelet
References
Emad E, Safey A, Refaat A, Osama Z, Sayed E, Mohamed E (2018) A secure image steganography algorithm based on least significant bit and integer wavelet transform. J Syst Eng Electron 29(3):639–649
Hu D, Xu H, Ma Z, Zheng S, Li B (2018) A spatial image steganography method based on nonnegative matrix factorization. IEEE Signal Process Lett 25(9):1364–1368
Mukhedkar M, Powar V, Gaikwad P (2015) Secure non real time image encryption algorithm development using cryptography and Steganography. In: Proceedings of the annual IEEE india conference (INDICON), pp 1–6
Vinolin V, Vinusha S (2018) Edge-based image steganography using edge least significant bit (ELSB) technique. Multimed Res 1(1):9–16
Kim CR, Lee SH, Lee JH, Park JI (2018) Blind decoding of image steganography using entropy model. Electron Lett 54(10):626–628
Nag A, Biswas S, Sarkar D, Sarkar PP (2010) A novel technique for image steganography based on Block-DCT and Huffman Encoding. arXiv preprint arXiv:1006.1186
Sharma VK, Srivastava DK, Mathur P (2018) Efficient image steganography using graph signal processing. IET Image Proc 12(6):1065–1071
Zhou Y, Agaian S (2011) Image encryption using the image steganography concept and PLIP model. In: IEEE international conference in system science and engineering (ICSSE), Macao, pp 699–703
Sarmah DK, Kulkarni AJ (2018) Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods. Arab J Sci Eng 43:3927–3950
Hu D, Wang L, Jiang W, Zheng S, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access 6:38303–38314
Patel N, Meena S (2016) LSB based image steganography using dynamic key cryptography. In: IEEE international conference on emerging trends in communication technologies (ETCT), Dehradun, pp 1–5
Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083
Tan S, Li B (2012) Targeted steganalysis of edge adaptive image steganography based on LSB matching revisited using B-spline fitting. IEEE Signal Process Lett 19(6):336–339
Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133–13144
Vinod Kumar RS, Arivazhagan S (2011) Adaptive patch based texture synthesis using wavelets. In: Proceedings of the IEEE sponsored international conference on signal processing computing, communication and networking technologies (ICSCCN 2011), Thuckafay
Nipanikar SI, Deepthi VH (2018) A multiple criteria-based cost function using wavelet and edge transformation for medical image steganography. J Intell Syst 27(3):331–347
Satish C, Vijaya P, Dhyani P (2016) Fractional lion algorithm—an optimization algorithm for data clustering. J Comput Sci 12(7):323–340
Ingle RB, More NS (2018) Energy-aware VM migration using Dragonfly-Crow optimization and support vector regression model in Cloud Data. Int J Mod Simul Sci Comput 9:1–4
Denemark T, Fridrich J (2017) Steganography with multiple JPEG images of the same scene. IEEE Trans Inf Forensics Secur 12(10):2308–2319
Lin GS, Chang YT, Lie WN (2010) A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. IEEE Trans Multimed 12(5):345–357
Niimi M, Noda H, Kawaguchi E, Eason RO (2002) High capacity and secure digital steganography to palette-based images. In: IEEE international conference in image processing, Rochester
Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensics Secur 10(2):243–255
Eslami R, Radha H (2003) The contourlet transform for image denoising using cycle spinning. In: IEEE conference record of the, thirty-seventh asilomar conference, on signals, systems and computers, vol 2, pp 1982–1986
Vinod Kumar RS, Arivazhagan S (2015) Adaptive patch based texture synthesis using contourlet transform. J Int Fuzzy Syst 28(3):1061–1070
Yu C (2017) Steganography of digital watermark by Arnold scrambling transform with blind source separation morphological component analysis. Multimed Tools Appl 76(5):6821–6842
Pandey P, Singh R, Vatsa M (2016) Face recognition using scattering wavelet under Illicit Drug Abuse variations. In: Proceedings of international conference on biometrics (ICB), Halmstad, pp 1–6
Kong WK, Zhang D, Li W (2003) Palmprint feature extraction using 2-D Gabor filters. Pattern Recogn 36(10):2339–2347
Guo Z, Zhang L, Zhang D (2010) A completed modeling of local binary pattern operator for texture classification. IEEE Trans Image Process 19(6):1657–1663
Ludwig O, Nunes U, Araujo R (2014) Eigenvalue decay: a new method for neural network regularization. Neurocomputing 124:33–42
Wang G-G (2018) Moth search algorithm: a bio-inspired metaheuristic algorithm for global optimization problems. Memet Comput 10(2):151–164
BRATS brain tumor database. https://www.smir.ch/BRATS/Start2015, Accessed on December 2017
Ramalingam M, Isa NAM (2014) A steganography approach for sequential data encoding and decoding in video images. In: Proceedings of international conference on computer, control, informatics and its applications (IC3INA), Bandung, pp 120–125
Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Secur 1:8
Nipanikar S, Hima Deepthi V (2016) A multiple criteria-based cost function using wavelet and edge transformation for medical image steganography. J Intell Syst 27(3):331–347
Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905–1917
Nikolov S, Hill P, Bull D, Canagarajah N (2001) Wavelets for image fusion. In: Petrosian AA, Meyer FG (eds) Wavelets in signal and image analysis. Computational imaging and vision, vol 19. Springer, Dordrecht, pp 213–241
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Reshma, V.K., Vinod Kumar, R.S., Shahi, D. et al. Optimized support vector neural network and contourlet transform for image steganography. Evol. Intel. 15, 1295–1311 (2022). https://doi.org/10.1007/s12065-020-00387-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-020-00387-8