Development of Stegano – Visual Cryptography Technique using GWO-CSA-Based Novel Hybrid Heuristic Algorithms
Keywords:
Information Security, Discrete wavelet transform (DWT), Steganography, Image Steganography, Genetic Algorithm, Cuckoo Search Algo-rithm, Grey Wolf Optimization, Hybrid GWO-CSAAbstract
Steganography is used to convey information that is concealed behind another, more evident message, protecting the information in the process. Sensitive data is embedded into cover material as a way of data obfuscation. Nowadays, text, picture, audio, and video steganography can be used to hide information. Multimedia steganography is a very secure steganography because concealed messages are contained in the noisy files' lowest-valued bits. While cryptography frequently encodes signals to ensure they are not readily understood, steganography obscures data in a way that it cannot be easily viewed. Visual cryptography (VC) is a way of encoding that makes it possible for visuals to only be decrypted by the human visual system. Color composition, color palette sorting, understanding the relationships between various color indices, exaggerated noise, and brightness are some steganography techniques. To enhance the message size when using the Joint Quantization Table Modification (JQTM), approach, a novel steganography methodology based on Cuckoo Search (CS) hybridized with Grey Wolf Optimizer (GWO) has been introduced. The approach was primarily inspired by the optimum LSB substitution methodology, which first transforms any secret message through an optimal matrix of replacement and then produces cover images. Since the replacement approach enhances the stego-image value within a spatial domain, it may be utilized in conjunction with the frequency domain method. In the suggested hybrid CS-GWO, the GWO search area has been increased, and the GWO local optima problem is avoided. CS excels at solving global optimization issues because it can balance local and global random walks utilizing switching parameters. The findings show that the recommended CS-GWO has a bigger capacity than CSO.
Downloads
References
Shankar, K., and P. Eswaran. "ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm." International Journal of Applied En-gineering Research 10, no. 5 (2015): 1841–1845.
Mahajan, Palak, and Ajay Koul. "CEET: A Compressed Encrypted & Embedded Technique for Digital Image Ste-ganography." IOSR Journal of Computer Engineering 16, no. 2 (2014): 44-52.
Sarmah, Dipti Kapoor, and Anand J. Kulkarni. "Improved Cohort Intelligence—A high capacity, swift and secure ap-proach on JPEG image steganography." Journal of Infor-mation Security and Applications 45 (2019): 90-106.
Li, Xiaoxia, and Jianjun Wang. "A steganographic method based upon JPEG and particle swarm optimization algo-rithm." Information Sciences 177, no. 15 (2007): 3099-3109.
Chopra, Deepti, and Praveen Arora. "Swarm Intelligence in Data Science: Challenges, Opportunities and Applications." Procedia Computer Science 215 (2022): 104-111
Abdel-Basset, Mohamed, Laila Abdel-Fatah, and Arun Kumar Sangaiah. "Metaheuristic algorithms: A comprehen-sive review." Computational intelligence for multimedia big data on the cloud with engineering applications (2018): 185-231.
Roy, R., and S. Laha. "Optimization of Stego image retaining secret information using genetic algorithm with 8-connected PSNR." Procedia Computer Science 60, no. 1 (2015): 468-477.
Kadhim, Ola N., and Zahir M. Hussain. "Information hiding using chaotic-address steganography." J. Comput. Sci 14, no. 9 (2018): 1247-1266.
Xie, Guoliang, Jinchang Ren, Stephen Marshall, Huimin Zhao, and Rui Li. "A novel gradient-guided post-processing method for adaptive image steganography." Signal Pro-cessing 203 (2023): 108813.
Kaur, Sharanpreet, Surender Singh, Manjit Kaur, and Heung-No Lee. "A systematic review of computational image steganography approaches." Archives of Computational Methods in Engineering 29, no. 7 (2022): 4775-4797.
Gong, C., Zhang, J., Yang, Y., Yi, X, Zhao, X. and Ma, Y. 2020. Detecting Fingerprints of Audio Steganography Software, Forensic Science International, vol. 2 https: //doi.org/10.1016/j.fsir.2020.100075.
Malathi, M., Praveen, R. K. and Thandapani, T. 2020. An Efficient Steganography for Data Hiding using DWT and IWT, International Journal of Grid and Distributed Compu-ting, vol. 13, no 1, pp. 524-531.
Ramalingam, M., Isa, N. A. M. and Puviarasi, R. 2020. A Secured Data Hiding using Affine Transformation in Video Steganography, Procedia Computer Science, vol. 171, pp. 11447-1156.
Hameed, M. A., Hassaballah, M.I, Awad, A & Aly, S. 2019. An Adaptive Image Steganography Method Based on His-togram of Oriented Gradient and PVD-LSB Techniques in IEEE Access, vol. 7, pp. 185189-185204, doi: 10.1109/ACCESS.2019.2960254.
Tiwari, A., Vashistha, P. and Sharma, A. K. 2020. Infor-mation Hiding using Steganography and LSB Technique, International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 3900-3906.
Hu, W. and Zhou, R. G., Liu, X., Luo, J. and Luo, G. 2020. Detecting of Steganography in Quantum Grayscale Images, Quantum Image Processing, 19, 149, https://doi.org/10.1007/s11128-020-02649-x
Kadhim, I. J., Premaratne, P. and Vial, P. J. 2020. Improved image steganography based on super-pixel and coefficient-plane-selection, Signal Processing, Volume 171, https://doi.org/10.1016/j.sigpro.2020.107481.
Kalaichelvi, T. and Apuroop. P. 2020. Image Steganography Method to Achieve Confidentiality using CAPTCHA for Authentication, 5th International Conference on Communi-cation and Electronics Systems (ICCES), pp: 495-499. doi: 10.1109/ICCES48766.2020.9138073.
Kalita, M. Majumder, S. and Tuithung T, 2019. A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution, The Computer Journal, Volume 62, Issue 11, Pages 1639–1655, https://doi.org/10.1093/comjnl/bxz014
Khadam, U., Iqbal, M. M., Alruily, M., Al Ghamdi, M. A., Ramzan, M. and Almotiri, S. H., 2020. Text Data Security and Privacy in the Internet of Things: Threats, Challenges and Future Directions, Wireless Communications and Mobile Communication, https://doi.org/10.1155/2020/7105625
Kumar, S, Kumar. M and Singh. A. 2020. Information Hiding with Adaptive Steganography based on Novel Fuzzy Edge Identification, Defence Technology, vol. 15, issue 2, pp. 162-169, https://doi.org/10.1016/j.dt.2018.08.003
Lakshmi Sirisha, B. 2020. Image steganography based on SVD and DWT techniques. Journal of Discrete Mathematical Sciences and Cryptography, PP:1– 8. doi: 10.1080/09720529.2019.1698801
Liu, H. H. and Lee, CM. 2019. High-capacity reversible image steganography based on pixel value ordering. J Image Video Proc. 2019, 54 (2019). https://doi.org/10.1186/s13640-019-0458-z
Lin, J., Qian, Z., Wang, Z., Zhang, X. and Feng, G, 2020. A New Steganography Method for Dynamic GIF Images Based on Palette Sort, Wireless Communications and Mobile Computing,
Lopez-Hernandez, A. A., Martinez-Gonzalez, R. F., Her-nandez-Reyes, J. A., Palacios-Luengas, L. and Vazquez-Medina, R. A Steganography Method Using Neural Networks, in IEEE Latin America Transactions, vol. 18, no. 03, pp. 495-506, March 2020, doi: 10.1109/TLA.2020.9082720.
S.K.A. Secure Algorithm for File Sharing Using Clustering Technique of K-Means Clustering. IJRITCC 2016, 4, 35-39.
S. K. A. and A. J. “Design and Performance Assessment of Light Weight Data Security System for Secure Data Trans-mission in IoT”, Journal of Network Security, 2021, Vol-9, Issue-1, PP: 29-41.
Alaria, S. K., & Kumar, A. (2018). Implementation of new cryptographic encryption approach for trust as & service (TAAS) in cloud environment. International Journal of Computers and Applications, 4(8), 2250-1797.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.