A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique

Abstract = 396 times | PDF = 224 times

Main Article Content

Omar Y. Abdulhammed Pshtiwan J. Karim Dashne R. Arif Twana S. Ali Avin O. Abdalrahman Arkan A. Saffer


The stegangraphic system supply premium secrecy and ability of conserving the mystery information from gaining stalked or cracked. The suggested method consists of three phases which are edge detection, embedding and extraction. This paper concentrated on three basic and significant parts which are payload, quality, and security also introduces a new steganography method by using edge detection method and shark smell optimization to effectively hide data with in images. Firstly, to promote the hiding ability and to realize altitude standard of secrecy the mystery message is separated into four parts and the cover image is masked and also divided into four sections, then the edge detection algorithm and shark smell optimization is performed on each section respectively. Edge prospectors were utilized to produce edge pixels in every section to hide mystery message and attain the best payload. To increase security, the shark smell optimization is used to select the best pixels among edge pixels based on its nature in motion, then reflect these pixels above original carrier media. Finally the mystery message bits are hidden in the selected edge pixels by using lest significant bit technique. The experimental outcomes appreciated utilizing several image fitness appreciation fashion, it displays best hiding ability, achieve higher image quality with least standard of deformation and provide altitude standard of secrecy, also the results shows that the suggested method exceeds previous approaches in idioms of the PSNSR, MSE also demonstrate that the mystery information cannot be retrieved of the stego image without realizing the algorithms and the values of parameters that are used in hidden process


steganography, security, payload, shark smell optimization, edge detection


Download data is not yet available.

Article Details


] B. T. Ahmed and O. Y. Abdulhameed, "Fingerprint recognition based on shark smell optimization and genetic algorithm," International Journal of Advances in Intelligent Informatics, Vol. 6, No. 2, , pp. 123-134, https://doi.org/10.26555/ijain.v6i2.502, July 2020

[2] A. Rezaei , L. Farzinvash and A. Farzamnia, " A Novel Steganography Algorithm using Edge Detection and MPC Algorithm," 16th International ISC Conference on Information Security and Cryptology, https://doi.org//10.1109/ISCISC48546.2019.8985150. (2019)

[3] M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K.-H. Jung, "Image steganography in spatial domain: A survey," Signal Process. Image Commun., vol. 65, pp. 46–66, Jul. (2018)

[4] S. Sun, (2016),"A novel edge based image steganography with 2k correction and Huffman encoding", Inform. Process. Lett., vol. 116, no. 2, pp.93-99.

[5] A. A. Abdulla, H. Sellahewa and S. A. Jassim, "Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-019-7166-7.(2019)

[6] O. Y. Abdulhammed, "A novel approach of steganography by using strong edge detection and chaos theory," Multimedia Tools and Applications. https://doi.org/10.1007/s11042-022-12643-3. (2022)

[7] O. Y. Abdulhammed, "strengthening steganography by using crow search algorithm of fingerprint image," Eastern-European Journal of Enterprise Technologies. DOI: 10.15587/1729-4061.2020.200282. (2020).

[8] S. K. Ghosal, J. K. Mandal and R. Sarkar, " High payload image steganography based on Laplacian of Gaussian (LoG) edge detector," Multimed Tools Appl, https://doi.org/10.1007/s11042-018-6126-y.(2018).

[9] D. K. Sarmah , A. J. Kulkarni, "Image Steganography Capacity Improvement Using Cohort Intelligence and Modified Multi-Random Start Local Search Methods," Arab J Sci Eng, DOI 10.1007/s13369-017-2751-4.(2017)

[10] Y. Alsalhi , " An accurate and high-efficient Qu Bits steganography scheme based on hybrid neural networks," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-018-7061-7. (2019)

[11] M. Suresh , S. Sam, "Optimal wavelet transform using Oppositional Grey Wolf Optimization for video steganography," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-020-09330-6.(2020)

[12] C. Pac , J. Kim , K. An ,C. Kim , K. Kim , C. Pac, "A novel color image LSB steganography using improved 1D chaotic map," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-019-08103-0.(2019)

[13] I. J. Kadhim , P. Premaratne , P. J. Vial and B. Halloran, "Comprehensive survey of image steganography: techniques, evaluations, and trends in future research," Neurocomputing 335:299–326. (2019).

[14] M. Hussain , Q. Riaz , S. Saleem , A. Ghafoor and K. Jung, " Enhanced adaptive data hiding method using LSB and pixel value differencing," Multimedia Tools and Applications https://doi.org/10.1007/s11042-021-10652-2. (2021).

[15] S. Mukhopadhyay , S. Hossain, S. K. Ghosal and R. Sarkar, "Secured image steganography based on Catalan transform," Multimedia Tools and Applications, 80:14495–14520, https://doi.org/10.1007/s11042-020-10424-4. (2021)

[16] A. Nilizadeh ,W. Mazurczyk, C. Zou and G. T. Leavens, "Information hiding in RGB images using an improved matrix pattern approach,". In: 2017 IEEE Conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 1407–1415.(2017)

[17] R. Shanthakumari and S. Malliga, "Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm," Multimed Tools Appl, 1–17. (2019).

[18] P. Marwaha and P. Marwaha, "Visual cryptographic steganography in images," In: 2010 Second international conference on computing, communication and networking technologies. IEEE, pp 1–6. (2010).

[19] W. Mazurczyk and L. Caviglione "Steganography in modern smartphones and mitigation techniques," IEEE Commun Surv Tutor 17(1):334–357. (2014).

[20] J. Lu , G. Zhou , C. Yang ,Z. Li and M. Lan, "Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection,". IEEE Access 7:21702–21711. (2019).

[21] M. A. Salama, M. F. M. Mursi and M. Aly, "Safeguarding images over insecure channel using master key visual cryptopgraphy,". Ain Shams Eng J 9(4):3001–3013. (2018).

[22] A. Cheddad , J. Condell , K. Curran and P. Mc Kevitt, "Digital image steganography: survey and analysis of current methods,". Signal Process 90(3):727–752. (2010).

[23] M. Hussain and M. Hussain, "A survey of image steganography techniques," Int J Adv Sci Techno 54:113–124. (2013).

[24] A. AbdelRaouf "A new data hiding approach for image steganography based on visual color sensitivity," Multimedia Tools and Applications https://doi.org/10.1007/s11042-020-10224-w. (2021).

[25] C. Vanmath and S. Prabu, "Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility," Int. J. Fuzzy Syst. https://doi.org/10.1007/s40815-017-0420-0. (2017)

[26] A. Cheddad , J. Condell , K. Curran and P. M. Kevitt , "Digital image steganography: survey and analysis of current methods,". Signal Process 90:727–752. (2010).

[27] A. Banharnsakun, "Artificial bee colony approach for enhancing LSB based image steganography," Multimed Tools Appl https://doi.org/10.1007/s11042-018-5933-5. (2018).

[28] A. K. Sahu and G. Swain G, "An optimal information hiding approach based on pixel value differencing and Modulus function,". Wirel Pers Commun 108:159–174. https://doi.org/10.1007/s11277-019-06393-z. (2019).

[29] C. Qin, C-C. Chang and T-J. Hsu, "Reversible data hiding scheme based on exploiting modification direction with two steganographic images," Multimedia Tools Appl 74:5861–5872. https://doi.org/10.1007/ s11042-014-1894-5. (2015).

[30] Z. Hui and Q. Zhou Q, "A novel high payload steganography scheme based on absolute moment block truncation coding," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-020-09015-0. (2020)

[31] S. I. Nipanikar, V. H. Deepthi and N. Kulkarni N, "A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform," Alexandria Engineering Journal, https://doi.org/10.1016/j.aej.2017.09.005. (2017).

[32] H. W. Tseng and H. S. Leng, "High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion," IET Image Process 8:647–654. (2014).

[33] B. T. Ahmed and O. Y. Abdulhameed, "Fingerprint Authentication using Shark Smell Optimization Algorithm," UHD Journal of Science and Technology, https://doi.org/10.21928/uhdjst. v4n2y2020.pp28-39. (2020).

[34] N. A. Kamarzaman, S. I. Sulaiman and I. R. Ibrahim, "Adaptive Mechanism For Enhanced Performance Of Shark Smell Optimization," JOURNAL OF ELECTRICAL AND ELECTRONIC SYSTEMS RESEARCH, https://doi.org/10.24191/jeesr.v18i1.002. (2020).

[35] A. Arham , H. A. Nugroho and T. B. Adji TB, "Multiple layer data hiding scheme based on difference expansion of quad," Signal Process 137:52–62. https://doi.org/10.1016/j.sigpro.2017.02.001. (2017).

[36] W. Wang, J. Ye, T. Wang and W. Wang, "A high capacity reversible data hiding scheme based on right-left shift," Signal Process 150:102–115. https://doi.org/10.1016/j.sigpro.2018.04.008. (2018).

[37] S. A. Parah, F. Ahad, J. A. Sheikh, N. A. Loan and G. M. Bhat, "A new reversible and high capacity data hiding technique for E-healthcare applications," Multimedia Tools Appl 76(3):3943–3975. https://doi.org/ 10.1007/s11042-016-4196-2. (2016).

[38] S. A. Parah, F. Ahad, J. A. Sheikh and G. Bhat, "Hiding clinical information in medical images: a new high capacity and reversible data hiding technique," J Biomed Inform 66:214–230. https://doi.org/10.1016/j.jbi.2017.01.006. (2017).

[39] P. V. Govind, B. M. Varghese, M. V. Judy, "A high imperceptible data hiding technique using quorum function," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-021-10780-9. (2021).