141
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

A genetic algorithm based image steganography scheme with high embedding capacity and low distortion

Pages 143-152 | Received 29 Jun 2022, Accepted 10 Nov 2022, Published online: 06 Jan 2023

References

  • Kahn D. The codebreakers: the comprehensive history of secret communication from ancient times to the internet. Simon and Schuster; 1996 Dec 5.
  • Bernstein DJ. Introduction to post-quantum cryptography. In: Post-quantum cryptography. Berlin: Springer; 2009. p. 1–14.
  • Wang RZ, Lin CF, Lin JC. Hiding data in images by optimal moderately-significant-bit replacement. Electron Lett. 2000 Dec 7;36(25):2069–2070.
  • Chan CK, Cheng LM. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004 Mar 31;37(3):469–474.
  • Zhang X, Wang S. Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett. 2006 Nov;10(11):781–783.
  • Lee IS, Tsai WH. Data hiding in grayscale images by dynamic programming based on a human visual model. Pattern Recognit. 2009 Jul 31;42(7):1604–1611.
  • Chang CC, Kieu TD, Wu WC. A lossless data embedding technique by joint neighboring coding. Pattern Recognit. 2009 Jul 31;42(7):1597–1603.
  • Kanan HR, Nazeri B. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl. 2014 Oct 15;41(14):6123–6130.
  • Hassaballah M, editor. Digital media steganography: principles, algorithms, and advances. Academic Press; 2020 Jun 27.
  • Mandal JK, Khamrui A. A genetic algorithm based steganography in frequency domain (GASFD). In: 2011 International Conference on Communication and Industrial Application. IEEE; 2011 Dec 26. p. 1–4.
  • Ghasemi E, Shanbehzadeh J, Fassihi N. High capacity image steganography using wavelet transform and genetic algorithm. In: World Congress on Engineering 2012; Vol. 2188; 2012 Jul 4–6; London: International Association of Engineers; 2010 Mar. p. 495–498.
  • AbdelWahab OF, Hussein AI, Hamed HF, et al. Hiding data in images using steganography techniques with compression algorithms. Telkomnika. 2019 Jun 1;17(3):1168–1175.
  • Wang C, Ma B, Xia Z, et al. Geometric resistant polar quaternion discrete Fourier transform and its application in color image zero-hiding. ISA Trans. 125, 2021 Jun 18.
  • Bhardwaj R. An improved reversible and secure patient data hiding algorithm for telemedicine applications. J Ambient Intell Humaniz Comput. 2021 Feb;12(2):2915–2929.
  • Lin C-C, Tsai W-H. Secret image sharing with steganography and authentication. J Syst Softw. 2004;73(3):405–414.
  • Yang C-N, Chen T-S, Yu KH, et al. Improvements of image sharing with steganography and authentication. J Syst Softw. 2007;80(7):1070–1076.
  • Chang C-C, Hsieh Y-P, Lin C-H. Sharing secrets in stego images with authentication. Pattern Recognit. 2008;41(10):3130–3137.
  • Wu C-C, Kao S-J, Hwang M-S. A high quality image sharing with steganography and adaptive authentication scheme. J Syst Softw. 2011;84(12):2196–2207.
  • Hassaballah M, Hameed MA, Aly S, et al. A color image steganography method based on ADPVD and HOG techniques. In: Digital media steganography. Academic Press; 2020 Jan 1. p. 17–40.
  • Hassaballah M, Hameed MA, Awad AI, et al. A novel image steganography method for industrial internet of things security. IEEE Trans Industr Inform. 2021 Jan 22;17(11):7743–7751.
  • Tan J, Liao X, Liu J, et al. Channel attention image steganography with generative adversarial networks. IEEE Trans Netw Sci Eng. 2021 Dec 31;9(2):888–903.
  • Liao X, Yin J, Chen M, et al. Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput. 2020 Jun 24.
  • Liao X, Yu Y, Li B, et al. A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol. 2019 Jan 31;30(3):685–696.
  • Shah PD, Bichkar RS. A secure spatial domain image steganography using genetic algorithm and linear congruential generator. In: International Conference on Intelligent Computing and Applications. Singapore: Springer; 2018. p. 119–129.
  • Yadav GS, Ojha A. Improved security in the genetic algorithm-based image steganography scheme using Hilbert space-filling curve. Imaging Sci J. 2019 Apr 3;67(3):148–158.
  • Hussein AK. Genetic algorithm based steganography using adaptive rectangular embedding area. Int J Mech Eng Technol. 2019;10(1):2066–2074.
  • Georges J, Magdi DA. Using artificial intelligence approaches for image steganography: a review. In: Internet of things-applications and future. Springer; 2020 Apr 3. p. 239–247.
  • Shah PD, Bichkar R. Genetic algorithm-based imperceptible image steganography technique with histogram distortion minimization. In: Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing; IEM-ICDC 2020; Vol. 62. Springer Nature; 2021. p. 267.
  • Yang C-N, Hsu S-C, Kim C. Improving stego image quality in image interpolation based data hiding. Comput Stand Interfaces. 2017;50:209–215.
  • Yadav GS, Ojha A. Hamiltonian path based image steganography scheme with improved imperceptibility and undetectability. Appl Soft Comput. 2018 Dec 1;73:497–507.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.