Chapter

Using Artificial Intelligence Approaches for Image Steganography: A Review

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Security of confidential information has been always an important issue. It has always been an interesting topic for researchers to develop secure techniques to send and receive data without revealing it to anyone rather than the receiver. Researchers are working every day to achieve a high level of security and consistency for their data during its transmission over the network. Cryptography is a way used to encrypt the data during its transmission so that when there is any attack, the message seen is not the real message, as it is encrypted. On the other hand, Steganography is a method of hiding secret messages in a cover object (image, audio, video, text) while communication takes place between sender and receiver. Steganography is often used with cryptography so that the information is doubly protected; First, it is encrypted and then hidden so that the attacker has to first detect the presence of information that is already hidden (a difficult task) and then decrypt it. In this paper, we will discuss different artificial intelligence techniques used to achieve maximum information hidden and high quality of image as the low quality is a sign of distortion which means that there is something hidden.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... Në kohërat moderne, kur të dhënat në internet janë të rrezikuara për shkelje të privatësisë dhe përgjime, steganografia ofron një mjet të fuqishëm për mbrojtje të informacionit nga sytë e paautor-Revistë shkencore e "Albanian University'' izuar. Përveç shërbimit për qëllime të fshehta, ajo gjithashtu ka përdorime të ndryshme në fusha si computer science [8], kriptografia [9], si dhe inteligjenca artificiale [7]. ...
Article
Të dhënat e ndjeshme nga studimet gjeologjike, si përshembull informacione mbi vendndodhjen e burimeve të pasura minerale mund të fshihen brenda hartës për t'u mbrojtur nga persona të paautorizuar. Ky artikull paraqet aplikimin e teknikës së steganografisë në hartë nëpërmjet një programi të quajtur MapSpace. Qëllimi është të ofrojë një mënyrë sa me të sigurt për të mbrojtur, menaxhuar dhe për të deshifruar të dhënat e përdoruesve të aplikacionit nëpërmjet imazheve. Përdorimi i steganografisë në hartë siguron që informacioni të jenë i padukshëm për të tjerët, ndërsa aftësia për ta menaxhuar dhe për ta lexuar atë brenda programit siguron një përvojë të sigurt për aplikuesit. Rezultati është harta e gjeneruar nga programi pa asnjë ndryshim të dukshëm në rezolucion nga origjinali.
... Georges and Magdi [22] explored numerous artificial intelligence methods used to hit the greatest possible level of concealed knowledge, and picture quality since the low-quality distortion signs indicate hidden element inclusion. They discussed the implementation scope of the ABC algorithm as a part of their detailed study. ...
Article
Full-text available
In multimedia correspondence, steganography schemes are commonly applied. To reduce storage capacity, multimedia files, including images, are always compressed. Most steganographic video schemes are, therefore, not compression tolerant. In the frame sequences, the video includes extra hidden space. Artificial intelligence (AI) creates a digital world of real-time information for athletes, sponsors, and broadcasters. AI is reshaping business, and although it has already produced a significant impact on other sectors, the sports industry is the newest and most receptive one. Human-centered AI for web applications has substantially influenced audience participation, strategic plan execution, and other aspects of the sports industry that have traditionally relied heavily on statistics. Thus, this study presents the motion vector steganography of sports training video integrating with the artificial bee colony algorithm (MVS-ABC). The motion vector stenography detects the hidden information from the motion vectors in the sports training video bitstreams. Artificial bee colony (ABC) algorithm optimizes the block assignment to inject a hidden message into a host video, in which the block assignment is considered a combinatorial optimization problem. The experimental analysis evaluates the data embedding performance using steganographic technology compared with existing embedding technologies, using the ABC algorithm compared with other genetic algorithms. The findings show that the proposed model can give the highest performance in terms of embedding capacity and the least error rate of video steganography compared with the existing models.
... (Kadhim et al., 2019) (Hussain et al., 2018) [6,5]. The sections that follow provide a brief explanation of these domain-based embedding procedures' main features. ...
Article
The steganography is a new and challenging method for transmitting confidential information over the internet utilizing a hidden cover object. Developing an efficient picture steganography system is currently fraught with difficulties because of the limited capacity, weak resilience, and imperceptibility of current steganography systems under development. This problem can only be solved by increasing the picture steganography's capability and security levels. Methods: Based on these variables, this work aims to present the state-of-the-art approach known as the Pixels Disparity Value (PDV) that hides patient information reports in the distinct medical photos for the second party. It's recommended that the procedure be broken down into three primary phases, each with its own set of instructions. Results: The statistical and economic evaluations of the suggested approach.
... Steganography is the art of concealing secret data within non-secured media such as an image. Because of the large spread of images used in numerous applications, the images have become better selection media from other currently available media such as text, audio, video, and protocol to hold the transferred data [1]. Therefore, data hiding in image steganography got the attention of many studies and contributions in this field [2], [3]. ...
Article
Since the inception of mankind, information has been an important asset; therefore, many researchers have been trying to devise different techniques which can keep messages secret from unauthorized users. Imperceptibility has been another dimension that needs to be taken into consideration and visible distortion may lead to data breach. Therefore, the data-hiding domain has witnessed many improvements but most of them have considered a static key/pattern to embed the data. Nonetheless these schemes pose security but using static keys may not guarantee the best imperceptibility and security. Therefore, a genetic algorithm-based data-hiding scheme is proposed in this paper, which uses chromosomes of genetic algorithms as key. The results have been compared against imperceptibility measures, i.e. PSNR, NC and SSIM. The result shows that the proposed scheme provides a great improvement in PSNR till 46.25 (more than 2%) in the imperceptibility.
Article
Full-text available
Objective: This work is a review of image encryption algorithm using a key image, namely a secure image encryption algorithm based on bitplane principle. Method/Analysis: The analysis of the algorithm is done in terms of the parameters like histogram analysis, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean value analysis and Correlation coefficient. Findings: The results show that the algorithm reviewed offers commendable security against common types of attacks. Conclusion/Application: Most of the image encryption techniques have some security and performance issues. So there is a need to evaluate and analyze the efficiency of the algorithms used for encryption. These parameters are useful in judging the quality of encryption algorithms and can also be used for checking the level of security, the method actually provides to the actual image.
Article
Full-text available
The rapidly proliferated information and evolution of digital technologies by Information hiding in multimedia data has improved the ease of access to digital information enabling reliable, faster and efficient storage, transfer and processing of digital data and leads to the consequence of making the illegal production and redistribution of digital media easy and undetectable. Hence, it poses a novel challenges for researchers. In this paper we present a novel integration of an incorporating text and image steganography to find a solution for enhancing security and protecting data. We proposed an enhancement of steganography algorithm which involves the scheme of discrete wavelet transformation combining text and image by secretly embed encrypted secrete message text data (cipher text) ortext image in the content of a digital image. The system based on levels of encryption and decryption methods performed to enhance the security of the system. Here first generate secrete message text (cipher text) or text image, and then processing deals with embedding and extracting Steganography algorithms. Finally the process deals with extraction of the hiddensecrete message. The experimental result shows a high level of efficiency and robustness of the proposed system.
Article
Full-text available
With the extensive application of steganography, it is challenged by ste-ganalysis. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis, we presents a new steganography based on genetic algorithm in this paper. After embedding the secret message in LSB (least significant bit) of the cover image, the pixel values of the steg-image are modified by the genetic algorithm to keep their statistic characters. Thus, the existence of the secret message is hard to be detected by the RS analysis. Meanwhile, better visual quality can be achieved by the proposed algorithm. The experimental results demonstrate the proposed algorithm's effectiveness in resistance to steganalysis with better visual quality.
Article
Storing and communicating secret and/or private information has become part of our daily life whether it is for our employment or personal well-being. Therefore, secure storage and transmission of the secret information have received the undivided attention of many researchers. The techniques for hiding confidential data in inconspicuous digital media such as video, audio, and image are collectively termed as Steganography. Among various media types used, the popularity and availability of digital images are high and in this research work and hence, our focus is on implementing digital image steganography. The main challenge in designing a steganographic system is to maintain a fair trade-off between robustness, security, imperceptibility and higher bit embedding rate. This research article provides a thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities. The article also provides a complete overview of image steganography including general operation, requirements, different aspects, different types and their performance evaluations. Different performance analysis measures for evaluating steganographic system are also discussed here. Moreover, we also discuss the strategy to select different cover media for different applications and a few state-of-the-art steganalysis systems.
Article
As information technology is growing tremendously, one of the major concern is information security. A technique called image steganography is used to provide better security and for safeguarding the information. In image steganography, a secret image is put into recipient image so that only the receiver and sender will be aware of the secret message. Here in this paper, a secure, optimized scheme called particle swarm optimization is used to select the pixel efficiently for embedding the secret image in to cover image. PSO(Particle Swarm Optimization) decides pixel using fitness function which is based on the cost function. Cost function calculates entropy, edge and pixels intensity to evaluate fitness. Also, a technique called discrete wavelet transform has been employed to achieve robustness and statistical undetectability. The main aim of the proposed paper is to make better security and to obtain efficient PSNR and MSE values.
A Comparative Study of Recent Steganography Techniques for Multiple Image Formats
  • Arshiya Ansari
  • Sajid
Department of computer applications
  • Ratnakirti Roy
  • Suvamoy Changder
  • Anirban Sarkar
  • C Narayan
  • Debnat
Image steganography using enhanced LSB technique
  • Kurukshetra University
  • Haryana Kurukshetra
University of Applied Sciences, Comparison of Firefly, Cultural and the Artificial Bee Colony Algorithms for Optimization
  • Vaishali Kulkarni
  • M Bengaluru
  • India
  • Raghavendra V Veena V Desai Gogte Institute Of Technology
  • M S Kulkarni
  • Ramaiah
Assistant professor, Department of computer science, Challenges in steganography
  • M R Ram
  • Seshan
Firefly Algorithm, Levy Flights and Global Optimization, Research and Development in Intelligent Systems XXVI: Incorporating Applications and Innovations in Intelligent Systems XVII
  • X S Yang
Ramaiah University of Applied Sciences, Bengaluru, India, Veena V Desai Gogte Institute of Technology
  • Vaishali Kulkarni