Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map

被引:14
|
作者
Walia, Gurjit Singh [1 ]
Makhija, Shikhar [2 ]
Singh, Kunwar [2 ]
Sharma, Kapil [3 ]
机构
[1] Def Res & Dev Org, Minist Def, Sci Anal Grp, New Delhi, India
[2] Univ Delhi, Netaji Subhas Inst Technol, Dept Elect & Commun, New Delhi, India
[3] Delhi Technol Univ, Dept Informat Technol, Delhi, India
来源
OPTIK | 2018年 / 170卷
关键词
High capacity; Steganography; Image data hiding; Image scanning; SIGNIFICANT-BIT SUBSTITUTION; STEGANOGRAPHIC METHOD; GENETIC ALGORITHM; IMAGE QUALITY; CAPACITY; STRATEGY; BLOCK;
D O I
10.1016/j.ijleo.2018.04.135
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
High capacity image steganography using Least Significant Bit (LSB) substitution greatly impaires visual quality of the stego image. In addition, most of steganographic schemes consider direct embedding of secret message without considering its security concern over public channel transmission. To address this problem, we have introduced a novel stego-key directed LSB substitution scheme which not only offers high embedding capacity but also resilient against stego image distortion. The aim of this work is to consider this problem as search and optimization. High embedding capacity is achieved through optimal utilization of search domain using proposed LUDO scan scheme. Optimal Stego-key is determined through cuckoo search optimization where Le'vy flight is used for obtaining new Stego-key. In addition, secret message is encrypted before embedding using chaotic map generated through random key. Large key space of Stego-key offer high resistance against various crypt analytic attacks. Proposed steganography scheme is evaluated over nine standard test images and competitive results are obtained. On an average, we achieved a Peak Signal-to-Noise Ratio (PSNR) of 44.09 and Structural Similarity Matrix (SSIM) of 0.97. Results demonstrate that the proposed steganography scheme not only outperforms state-of-the-art high embedding steganography schemes but also offers high payload capabilities with immunity against visual degradation.
引用
收藏
页码:106 / 124
页数:19
相关论文
共 32 条
  • [1] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Khan Muhammad
    Jamil Ahmad
    Naeem Ur Rehman
    Zahoor Jan
    Muhammad Sajjad
    Multimedia Tools and Applications, 2017, 76 : 8597 - 8626
  • [2] CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method
    Muhammad, Khan
    Ahmad, Jamil
    Rehman, Naeem Ur
    Jan, Zahoor
    Sajjad, Muhammad
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 8597 - 8626
  • [3] Substitution Box Design Based on Chaotic Maps and Cuckoo Search Algorithm
    Akhtar, Tanveer
    Din, Nizamud
    Uddin, Jamal
    2019 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGIES AND NETWORKING (COMMNET), 2019, : 1 - 7
  • [4] A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption
    Patidar, Vinod
    Pareek, N. K.
    Purohit, G.
    Sud, K. K.
    OPTICS COMMUNICATIONS, 2011, 284 (19) : 4331 - 4339
  • [5] New image encryption scheme based on Arnold map and cuckoo search optimization algorithm
    Khan, Hamza
    Jamal, Sajjad Shaukat
    Hazzazi, Mohammad Mazyad
    Khan, Majid
    Hussain, Iqtadar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (05) : 7419 - 7441
  • [6] New image encryption scheme based on Arnold map and cuckoo search optimization algorithm
    Hamza Khan
    Sajjad Shaukat Jamal
    Mohammad Mazyad Hazzazi
    Majid Khan
    Iqtadar Hussain
    Multimedia Tools and Applications, 2023, 82 : 7419 - 7441
  • [7] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Jiang, Qi
    Ma, Jianfeng
    Lu, Xiang
    Tian, Youliang
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (02)
  • [8] Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems
    Qi Jiang
    Jianfeng Ma
    Xiang Lu
    Youliang Tian
    Journal of Medical Systems, 2014, 38
  • [9] A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
    Arif, Jameel
    Khan, Muazzam A.
    Ghaleb, Baraq
    Ahmad, Jawad
    Munir, Arslan
    Rashid, Umer
    Al-Dubai, Ahmed Y.
    IEEE ACCESS, 2022, 10 : 12966 - 12982
  • [10] Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme
    Lin, Han-Yu
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 78 (02) : 1487 - 1494