A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique

https://doi.org/10.24017/Science.2022.2.2

Abstract views: 917 / PDF downloads: 449

Authors

  • Omar Y. Abdulhammed Department of Computer Science College of Science University of Garmian Kalar, Iraq
  • Pshtiwan J. Karim Department of Computer Science College of Science University of Garmian Kalar, Iraq
  • Dashne R. Arif Computer Center Sulaimani Technical Institute Sulaimani Polytechnic University Sulaymaniyah, Iraq
  • Twana S. Ali Department of Computer Science College of Science University of Sulaimani Sulaymaniyah, Iraq
  • Avin O. Abdalrahman Department of Civil Engineering College of Engineering University of Garmian Kalar, Iraq
  • Arkan A. Saffer Department of Information Technology Kalar Technical College Sulaimani Polytechnic University Kalar, Iraq

Abstract

The stegangraphic system supply premium secrecy and ability of conserving the mystery information from gaining stalked or cracked. The suggested method consists of three phases which are edge detection, embedding and extraction. This paper concentrated on three basic and significant parts which are payload, quality, and security also introduces a new steganography method by using edge detection method and shark smell optimization to effectively hide data with in images. Firstly, to promote the hiding ability and to realize altitude standard of secrecy the mystery message is separated into four parts and the cover image is masked and also divided into four sections, then the edge detection algorithm and shark smell optimization is performed on each section respectively. Edge prospectors were utilized to produce edge pixels in every section to hide mystery message and attain the best payload. To increase security, the shark smell optimization is used to select the best pixels among edge pixels based on its nature in motion, then reflect these pixels above original carrier media. Finally the mystery message bits are hidden in the selected edge pixels by using lest significant bit technique. The experimental outcomes appreciated utilizing several image fitness appreciation fashion, it displays best hiding ability, achieve higher image quality with least standard of deformation and provide altitude standard of secrecy, also the results shows that the suggested method exceeds previous approaches in idioms of the PSNSR, MSE also demonstrate that the mystery information cannot be retrieved of the stego image without realizing the algorithms and the values of parameters that are used in hidden process

Keywords:

steganography, security, payload, shark smell optimization, edge detection

References

[1] B. T. Ahmed and O. Y. Abdulhameed, "Fingerprint recognition based on shark smell optimization and genetic algorithm," International Journal of Advances in Intelligent Informatics, Vol. 6, No. 2, , pp. 123-134, https://doi.org/10.26555/ijain.v6i2.502, July 2020.
https://doi.org/10.26555/ijain.v6i2.502
[2] A. Rezaei , L. Farzinvash and A. Farzamnia, " A Novel Steganography Algorithm using Edge Detection and MPC Algorithm," 16th International ISC Conference on Information Security and Cryptology, https://doi.org//10.1109/ISCISC48546.2019.8985150. 2019.
https://doi.org/10.1109/ISCISC48546.2019.8985150
[3] M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K.-H.Jung, "Image steganography in spatial domain: A survey," Signal Process. Image Commun., vol. 65, pp. 46-66, Jul. 2018.
https://doi.org/10.1016/j.image.2018.03.012
[4] S. Sun,"A novel edge based image steganography with 2k correction and Huffman encoding", Inform. Process.Lett., vol. 116, no. 2, pp.93-99. 2016.
https://doi.org/10.1016/j.ipl.2015.09.016
[5] A. A. Abdulla, H. Sellahewa and S. A. Jassim, "Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-019-7166-7.2019.
[6] O. Y. Abdulhammed, "A novel approach of steganography by using strong edge detection and chaos theory," Multimedia Tools and Applications. https://doi.org/10.1007/s11042-022-12643-3. 2022.
https://doi.org/10.1007/s11042-022-12643-3
[7] O. Y. Abdulhammed, "strengthening steganography by using crow search algorithm of fingerprint image," Eastern-European Journal of Enterprise Technologies. DOI: 10.15587/1729-4061.2020.200282. 2020.
https://doi.org/10.15587/1729-4061.2020.200282
[8] S. K. Ghosal, J. K. Mandal and R. Sarkar, " High payload image steganography based on Laplacian of Gaussian (LoG) edge detector," Multimed Tools Appl, https://doi.org/10.1007/s11042-018-6126-y.2018.
[9] D. K. Sarmah , A. J. Kulkarni, "Image Steganography Capacity Improvement Using Cohort Intelligence and Modified Multi-Random Start Local Search Methods," Arab J Sci Eng, DOI 10.1007/s13369-017-2751-4.2017.
[10] Y. Alsalhi, " An accurate and high-efficient Qu Bits steganography scheme based on hybrid neural networks," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-018-7061-7. 2019.
https://doi.org/10.1007/s11042-018-7061-7
[11] M. Suresh , S. Sam, "Optimal wavelet transform using Oppositional Grey Wolf Optimization for video steganography," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-020-09330-6.202.0
[12] C. Pac , J. Kim , K. An ,C. Kim , K. Kim , C. Pac, "A novel color image LSB steganography using improved 1D chaotic map," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-019-08103-0.2019.
[13] I. J. Kadhim , P. Premaratne , P. J. Vial and B. Halloran, "Comprehensive survey of image steganography: techniques, evaluations, and trends in future research," Neurocomputing 335:299-326. 2019.
https://doi.org/10.1016/j.neucom.2018.06.075
[14] M. Hussain , Q. Riaz , S. Saleem , A. Ghafoor and K. Jung, " Enhanced adaptive data hiding method using LSB and pixel value differencing," Multimedia Tools and Applications https://doi.org/10.1007/s11042-021-10652-2. 2021.
https://doi.org/10.1007/s11042-021-10652-2
[15] S. Mukhopadhyay ,S. Hossain, S. K. Ghosal and R. Sarkar, "Secured image steganography based on Catalan transform," Multimedia Tools and Applications, 80:14495-14520, https://doi.org/10.1007/s11042-020-10424-4. 2021.
https://doi.org/10.1007/s11042-020-10424-4
[16] A. Nilizadeh,W. Mazurczyk, C. Zou and G. T. Leavens, "Information hiding in RGB images using an improved matrix pattern approach,". In: 2017 IEEE Conference on computer vision and pattern recognition workshops (CVPRW). IEEE, pp 1407-1415.2017.
https://doi.org/10.1109/CVPRW.2017.183
[17] R. Shanthakumari and S. Malliga, "Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm," Multimed Tools Appl, 1-17.2019.
https://doi.org/10.1007/s11042-019-7584-6
[18] P. Marwaha and P. Marwaha,"Visual cryptographic steganography in images," In: 2010 Second international conference on computing, communication and networking technologies. IEEE, pp 1-6. 2010.
https://doi.org/10.1109/ICCCNT.2010.5591730
[19] W. Mazurczyk and L. Caviglione"Steganography in modern smartphones and mitigation techniques," IEEE CommunSurv Tutor 17(1):334-357. 2014.
https://doi.org/10.1109/COMST.2014.2350994
[20] J. Lu ,G. Zhou , C. Yang ,Z. Li and M. Lan, "Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection,". IEEE Access 7:21702-21711. 2019.
https://doi.org/10.1109/ACCESS.2019.2896781
[21] M. A. Salama, M. F. M. Mursi and M. Aly, "Safeguarding images over insecure channel using master key visual cryptopgraphy,". Ain Shams Eng J 9(4):3001-3013. 2018.
https://doi.org/10.1016/j.asej.2018.03.002
[22] A. Cheddad , J. Condell , K. Curran and P. Mc Kevitt,"Digital image steganography: survey and analysis of current methods,". Signal Process 90(3):727-752.2010
https://doi.org/10.1016/j.sigpro.2009.08.010
[23] M. Hussain and M. Hussain, "A survey of image steganography techniques," Int J Adv Sci Techno 54:113-124. 2013.
[24] A. AbdelRaouf "A new data hiding approach for image steganography based on visual color sensitivity," Multimedia Tools and Applications https://doi.org/10.1007/s11042-020-10224-w. 2021.
https://doi.org/10.1007/s11042-020-10224-w
[25] C. Vanmath and S. Prabu, "Image Steganography Using Fuzzy Logic and Chaotic for Large Payload and High Imperceptibility," Int. J. Fuzzy Syst. https://doi.org/10.1007/s40815-017-0420-0. 2017.
https://doi.org/10.1007/s40815-017-0420-0
[26] A. Cheddad,J. Condell , K. Curran and P. M. Kevitt , "Digital image steganography: survey and analysis of current methods,". Signal Process 90:727-752. 2010.
https://doi.org/10.1016/j.sigpro.2009.08.010
[27] A. Banharnsakun, "Artificial bee colony approach for enhancing LSB based image steganography," Multimed Tools Applhttps://doi.org/10.1007/s11042-018-5933-5. 2018.
https://doi.org/10.1007/s11042-018-5933-5
[28] A. K. Sahu and G. Swain G, "An optimal information hiding approach based on pixel value differencing and Modulus function,".WirelPersCommun 108:159-174. https://doi.org/10.1007/s11277-019-06393-z. 2019.
https://doi.org/10.1007/s11277-019-06393-z
[29] C. Qin, C-C.Chang andT-J. Hsu, "Reversible data hiding scheme based on exploiting modification direction with two steganographic images," Multimedia Tools Appl 74:5861-5872. https://doi.org/10.1007/ s11042-014-1894-5. 2015.
https://doi.org/10.1007/s11042-014-1894-5
[30] Z. Hui andQ. Zhou Q, "A novel high payload steganography scheme based on absolute moment block truncation coding," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-020-09015-0. 2020
https://doi.org/10.1007/s11042-020-09015-0
[31] S. I. Nipanikar, V. H. Deepthi and N. Kulkarni N, "A sparse representation based image steganography using Particle Swarm Optimization and wavelet transform," Alexandria Engineering Journal, https://doi.org/10.1016/j.aej.2017.09.005. 2017.
https://doi.org/10.1016/j.aej.2017.09.005
[32] I Kich, ., EAmeeur and Y. Taouil "Image steganography based on edge detection algorithm".International conference on electronics, control, optimization and computer science (ICECOCS). Kenitra,Morocco.2018.
https://doi.org/10.1109/ICECOCS.2018.8610603
[33] R.R. Dube, M.A. Lalkot." Improved edge based steganography scheme for GrayScale images in spatial Domain". International Journal of Science and Research (IJSR) 5(6):1976-1978. 2016.
https://doi.org/10.21275/v5i6.NOV164686
[34] S.Gujjunoori, M. Oruganti, "Difference expansion based reversible data embedding and edgedetection"Multimed Tools Appl 78:25889-25917. 2019.
https://doi.org/10.1007/s11042-019-07767-y
[35] D.S Kumar, R. Kiran," Data hiding using Fibonacci EDGE based steganography for cloud data". Int JAppl Eng Res 12(16):5565-5569. 2017.
[36] D. Wang, D. Chen, B. Ma, L. Xu, J. Zhang,"A highcapacityspatial domain data hiding scheme formedicalimages". J Sign Process Syst, Springer Science +business Media New York. https://doi.org/10.1007/s11265-016-1169-7. 2016.
https://doi.org/10.1007/s11265-016-1169-7
[37] U. Puteaux, W. Puech," An efficient MSB prediction-based method for high-capacity reversible datahiding in encrypted images". IEEE Transactions on Information Forensics and Security. https://doi.org/10. 1109/TIFS.2018.2799381. 2018.
https://doi.org/10.1109/WIFS.2018.8630788
[38] K. Kordov, B. Stoyanov, "Least significant bit steganography using Hitzl-Zele chaoticmap". International of electronics and telecommunications 63(4):417-422. https://doi.org/10.1515/eletel-2017-0061. 2017.
https://doi.org/10.1515/eletel-2017-0061
[39] H. Elkamchouchi, W. M. Salama and Y.Abouelseoud,"Data hiding in a digital cover image using chaotic maps and LSB technique".https://doi.org/10.1109/ICCES.2017.8275302.2017.
[40] H. W. Tseng and H. S. Leng, "High-payload block-based data hiding scheme using hybrid edge detector with minimal distortion," IET Image Process 8:647-654. 2014.
https://doi.org/10.1049/iet-ipr.2013.0584
[41] B. T. Ahmed and O. Y. Abdulhameed, "Fingerprint Authentication using Shark Smell Optimization Algorithm," UHD Journal of Science and Technology, https://doi.org/10.21928/uhdjst. v4n2y2020.pp28-39. 2020
https://doi.org/10.21928/uhdjst.v4n2y2020.pp28-39
[42] N. A. Kamarzaman, S. I. Sulaiman and I. R. Ibrahim, "Adaptive Mechanism For Enhanced Performance Of Shark Smell Optimization," Journal Of Electrical And Electronic Systems Research, https://doi.org/10.24191/jeesr.v18i1.002. 2020.
https://doi.org/10.24191/jeesr.v18i1.002
[43] A. Arham ,H. A. Nugroho and T. B. Adji TB, "Multiple layer data hiding scheme based on difference expansion of quad," Signal Process 137:52-62. https://doi.org/10.1016/j.sigpro.2017.02.001. 2017.
https://doi.org/10.1016/j.sigpro.2017.02.001
[44] W. Wang, J. Ye, T. Wang and W. Wang,"A high capacity reversible data hiding scheme based on right-left shift," Signal Process 150:102-115. https://doi.org/10.1016/j.sigpro.2018.04.008. 2018.
https://doi.org/10.1016/j.sigpro.2018.04.008
[45] S. A. Parah, F. Ahad, J. A. Sheikh, N. A. Loan and G. M. Bhat, "A new reversible and high capacity data hiding technique for E-healthcare applications,"Multimedia Tools Appl 76(3):3943-3975. https://doi.org/ 10.1007/s11042-016-4196-2. 2016.
https://doi.org/10.1007/s11042-016-4196-2
[46] S. A. Parah, F. Ahad, J. A. Sheikh and G. Bhat, "Hiding clinical information in medical images: a new high capacity and reversible data hiding technique," J Biomed Inform 66:214-230. https://doi.org/10.1016/j.jbi.2017.01.006. 2017.
https://doi.org/10.1016/j.jbi.2017.01.006
[47] P. V. Govind, B. M. Varghese, M. V. Judy, "A high imperceptible data hiding technique using quorum function," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-021-10780-9. 2021.
https://doi.org/10.1007/s11042-021-10780-9

Downloads

Article Metrics

Published

02-10-2022

Issue

Section

Pure and Applied Science

How to Cite

[1]
O. Y. Abdulhammed, P. J. Karim, D. R. Arif, T. S. Ali, A. O. Abdalrahman, and A. A. Saffer, “A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique”, KJAR, pp. 11–25, Oct. 2022, doi: 10.24017/Science.2022.2.2.