Development of Stegano – Visual Cryptography Technique using GWO-CSA-Based Novel Hybrid Heuristic Algorithms

Authors

  • Arshiya S. Ansari Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Al-Majmaah, 11952, Saudi Arabia

Keywords:

Information Security, Discrete wavelet transform (DWT), Steganography, Image Steganography, Genetic Algorithm, Cuckoo Search Algo-rithm, Grey Wolf Optimization, Hybrid GWO-CSA

Abstract

Steganography is used to convey information that is concealed behind another, more evident message, protecting the information in the process. Sensitive data is embedded into cover material as a way of data obfuscation. Nowadays, text, picture, audio, and video steganography can be used to hide information. Multimedia steganography is a very secure steganography because concealed messages are contained in the noisy files' lowest-valued bits. While cryptography frequently encodes signals to ensure they are not readily understood, steganography obscures data in a way that it cannot be easily viewed. Visual cryptography (VC) is a way of encoding that makes it possible for visuals to only be decrypted by the human visual system. Color composition, color palette sorting, understanding the relationships between various color indices, exaggerated noise, and brightness are some steganography techniques. To enhance the message size when using the Joint Quantization Table Modification (JQTM), approach, a novel steganography methodology based on Cuckoo Search (CS) hybridized with Grey Wolf Optimizer (GWO) has been introduced. The approach was primarily inspired by the optimum LSB substitution methodology, which first transforms any secret message through an optimal matrix of replacement and then produces cover images. Since the replacement approach enhances the stego-image value within a spatial domain, it may be utilized in conjunction with the frequency domain method. In the suggested hybrid CS-GWO, the GWO search area has been increased, and the GWO local optima problem is avoided. CS excels at solving global optimization issues because it can balance local and global random walks utilizing switching parameters. The findings show that the recommended CS-GWO has a bigger capacity than CSO.

Downloads

Download data is not yet available.

References

Shankar, K., and P. Eswaran. "ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm." International Journal of Applied En-gineering Research 10, no. 5 (2015): 1841–1845.

Mahajan, Palak, and Ajay Koul. "CEET: A Compressed Encrypted & Embedded Technique for Digital Image Ste-ganography." IOSR Journal of Computer Engineering 16, no. 2 (2014): 44-52.

Sarmah, Dipti Kapoor, and Anand J. Kulkarni. "Improved Cohort Intelligence—A high capacity, swift and secure ap-proach on JPEG image steganography." Journal of Infor-mation Security and Applications 45 (2019): 90-106.

Li, Xiaoxia, and Jianjun Wang. "A steganographic method based upon JPEG and particle swarm optimization algo-rithm." Information Sciences 177, no. 15 (2007): 3099-3109.

Chopra, Deepti, and Praveen Arora. "Swarm Intelligence in Data Science: Challenges, Opportunities and Applications." Procedia Computer Science 215 (2022): 104-111

Abdel-Basset, Mohamed, Laila Abdel-Fatah, and Arun Kumar Sangaiah. "Metaheuristic algorithms: A comprehen-sive review." Computational intelligence for multimedia big data on the cloud with engineering applications (2018): 185-231.

Roy, R., and S. Laha. "Optimization of Stego image retaining secret information using genetic algorithm with 8-connected PSNR." Procedia Computer Science 60, no. 1 (2015): 468-477.

Kadhim, Ola N., and Zahir M. Hussain. "Information hiding using chaotic-address steganography." J. Comput. Sci 14, no. 9 (2018): 1247-1266.

Xie, Guoliang, Jinchang Ren, Stephen Marshall, Huimin Zhao, and Rui Li. "A novel gradient-guided post-processing method for adaptive image steganography." Signal Pro-cessing 203 (2023): 108813.

Kaur, Sharanpreet, Surender Singh, Manjit Kaur, and Heung-No Lee. "A systematic review of computational image steganography approaches." Archives of Computational Methods in Engineering 29, no. 7 (2022): 4775-4797.

Gong, C., Zhang, J., Yang, Y., Yi, X, Zhao, X. and Ma, Y. 2020. Detecting Fingerprints of Audio Steganography Software, Forensic Science International, vol. 2 https: //doi.org/10.1016/j.fsir.2020.100075.

Malathi, M., Praveen, R. K. and Thandapani, T. 2020. An Efficient Steganography for Data Hiding using DWT and IWT, International Journal of Grid and Distributed Compu-ting, vol. 13, no 1, pp. 524-531.

Ramalingam, M., Isa, N. A. M. and Puviarasi, R. 2020. A Secured Data Hiding using Affine Transformation in Video Steganography, Procedia Computer Science, vol. 171, pp. 11447-1156.

Hameed, M. A., Hassaballah, M.I, Awad, A & Aly, S. 2019. An Adaptive Image Steganography Method Based on His-togram of Oriented Gradient and PVD-LSB Techniques in IEEE Access, vol. 7, pp. 185189-185204, doi: 10.1109/ACCESS.2019.2960254.

Tiwari, A., Vashistha, P. and Sharma, A. K. 2020. Infor-mation Hiding using Steganography and LSB Technique, International Journal of Advanced Science and Technology, vol. 29, no. 5, pp. 3900-3906.

Hu, W. and Zhou, R. G., Liu, X., Luo, J. and Luo, G. 2020. Detecting of Steganography in Quantum Grayscale Images, Quantum Image Processing, 19, 149, https://doi.org/10.1007/s11128-020-02649-x

Kadhim, I. J., Premaratne, P. and Vial, P. J. 2020. Improved image steganography based on super-pixel and coefficient-plane-selection, Signal Processing, Volume 171, https://doi.org/10.1016/j.sigpro.2020.107481.

Kalaichelvi, T. and Apuroop. P. 2020. Image Steganography Method to Achieve Confidentiality using CAPTCHA for Authentication, 5th International Conference on Communi-cation and Electronics Systems (ICCES), pp: 495-499. doi: 10.1109/ICCES48766.2020.9138073.

Kalita, M. Majumder, S. and Tuithung T, 2019. A New Steganography Method Using Integer Wavelet Transform and Least Significant Bit Substitution, The Computer Journal, Volume 62, Issue 11, Pages 1639–1655, https://doi.org/10.1093/comjnl/bxz014

Khadam, U., Iqbal, M. M., Alruily, M., Al Ghamdi, M. A., Ramzan, M. and Almotiri, S. H., 2020. Text Data Security and Privacy in the Internet of Things: Threats, Challenges and Future Directions, Wireless Communications and Mobile Communication, https://doi.org/10.1155/2020/7105625

Kumar, S, Kumar. M and Singh. A. 2020. Information Hiding with Adaptive Steganography based on Novel Fuzzy Edge Identification, Defence Technology, vol. 15, issue 2, pp. 162-169, https://doi.org/10.1016/j.dt.2018.08.003

Lakshmi Sirisha, B. 2020. Image steganography based on SVD and DWT techniques. Journal of Discrete Mathematical Sciences and Cryptography, PP:1– 8. doi: 10.1080/09720529.2019.1698801

Liu, H. H. and Lee, CM. 2019. High-capacity reversible image steganography based on pixel value ordering. J Image Video Proc. 2019, 54 (2019). https://doi.org/10.1186/s13640-019-0458-z

Lin, J., Qian, Z., Wang, Z., Zhang, X. and Feng, G, 2020. A New Steganography Method for Dynamic GIF Images Based on Palette Sort, Wireless Communications and Mobile Computing,

Lopez-Hernandez, A. A., Martinez-Gonzalez, R. F., Her-nandez-Reyes, J. A., Palacios-Luengas, L. and Vazquez-Medina, R. A Steganography Method Using Neural Networks, in IEEE Latin America Transactions, vol. 18, no. 03, pp. 495-506, March 2020, doi: 10.1109/TLA.2020.9082720.

S.K.A. Secure Algorithm for File Sharing Using Clustering Technique of K-Means Clustering. IJRITCC 2016, 4, 35-39.

S. K. A. and A. J. “Design and Performance Assessment of Light Weight Data Security System for Secure Data Trans-mission in IoT”, Journal of Network Security, 2021, Vol-9, Issue-1, PP: 29-41.

Alaria, S. K., & Kumar, A. (2018). Implementation of new cryptographic encryption approach for trust as & service (TAAS) in cloud environment. International Journal of Computers and Applications, 4(8), 2250-1797.

Downloads

Published

10.12.2023

How to Cite

Ansari, A. S. . (2023). Development of Stegano – Visual Cryptography Technique using GWO-CSA-Based Novel Hybrid Heuristic Algorithms. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 523 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4177

Issue

Section

Research Article