Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map

被引:14
|
作者
Walia, Gurjit Singh [1 ]
Makhija, Shikhar [2 ]
Singh, Kunwar [2 ]
Sharma, Kapil [3 ]
机构
[1] Def Res & Dev Org, Minist Def, Sci Anal Grp, New Delhi, India
[2] Univ Delhi, Netaji Subhas Inst Technol, Dept Elect & Commun, New Delhi, India
[3] Delhi Technol Univ, Dept Informat Technol, Delhi, India
来源
OPTIK | 2018年 / 170卷
关键词
High capacity; Steganography; Image data hiding; Image scanning; SIGNIFICANT-BIT SUBSTITUTION; STEGANOGRAPHIC METHOD; GENETIC ALGORITHM; IMAGE QUALITY; CAPACITY; STRATEGY; BLOCK;
D O I
10.1016/j.ijleo.2018.04.135
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
High capacity image steganography using Least Significant Bit (LSB) substitution greatly impaires visual quality of the stego image. In addition, most of steganographic schemes consider direct embedding of secret message without considering its security concern over public channel transmission. To address this problem, we have introduced a novel stego-key directed LSB substitution scheme which not only offers high embedding capacity but also resilient against stego image distortion. The aim of this work is to consider this problem as search and optimization. High embedding capacity is achieved through optimal utilization of search domain using proposed LUDO scan scheme. Optimal Stego-key is determined through cuckoo search optimization where Le'vy flight is used for obtaining new Stego-key. In addition, secret message is encrypted before embedding using chaotic map generated through random key. Large key space of Stego-key offer high resistance against various crypt analytic attacks. Proposed steganography scheme is evaluated over nine standard test images and competitive results are obtained. On an average, we achieved a Peak Signal-to-Noise Ratio (PSNR) of 44.09 and Structural Similarity Matrix (SSIM) of 0.97. Results demonstrate that the proposed steganography scheme not only outperforms state-of-the-art high embedding steganography schemes but also offers high payload capabilities with immunity against visual degradation.
引用
收藏
页码:106 / 124
页数:19
相关论文
共 32 条
  • [31] Novel chaotic map-based privacy-preserving authenticated key agreement scheme without the electricity service provider involvement
    Abbasinezhad-Mood, Dariush
    Ostad-Sharif, Arezou
    Nikooghadam, Morteza
    SECURITY AND PRIVACY, 2019, 2 (05)
  • [32] Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme
    Zhang, Liping
    Zhu, Shaohui
    Tang, Shanyu
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2017, 21 (02) : 465 - 475