CFP last date
20 May 2024
Reseach Article

Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment

by Parisa Gerami, Subariah Ebrahim, Morteza Bashardoost
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 2
Year of Publication: 2012
Authors: Parisa Gerami, Subariah Ebrahim, Morteza Bashardoost
10.5120/8727-2602

Parisa Gerami, Subariah Ebrahim, Morteza Bashardoost . Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment. International Journal of Computer Applications. 55, 2 ( October 2012), 20-25. DOI=10.5120/8727-2602

@article{ 10.5120/8727-2602,
author = { Parisa Gerami, Subariah Ebrahim, Morteza Bashardoost },
title = { Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 2 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number2/8727-2602/ },
doi = { 10.5120/8727-2602 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:56:13.605220+05:30
%A Parisa Gerami
%A Subariah Ebrahim
%A Morteza Bashardoost
%T Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 2
%P 20-25
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data hiding is a method of concealing secret data into a cover media and preventing a spectator from being aware of the existence of the hidden message. According to the problems of steganography, the main effort is to provide a better imperceptibility of stego-image that can be done by decreasing distortion of image. One of the popular techniques in data hiding is steganography in which the simple method for image hiding is the Least Significant Bit (LSB) substitution method. Wu et al. proposed two image hiding techniques to improve the quality of the stego-image [1]. The first one is to find the best block matching matrix and the other one is to find the optimal substitution matrices. The proposed method utilizes particle Swarm optimization (PSO) for finding the best pixel locations, and then the secret image is transformed to a new secret image. Optimal Pixel Adjustment (OPA) method is applied to further increase the quality of image. Results are then compared with those obtained by Simple LSB, Wang's et al. method, Wu's et al. method. The experimental results confirmed that PSNR of the proposed method is higher than mentioned methods which mean the imperceptibility of the image improves. Also the results illustrate that the proposed approach is robust against chi-square attack.

References
  1. Wu, M. -N. , M. -H. Lin, and C. -C. Chang, A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms Content Computing, 2004, Springer Berlin / Heidelberg. p. 219-229.
  2. Mathkour, H. , B. Al-Sadoon, and A. Touir A New Image Steganography Technique, in IEEE. 2008. p. 1-4.
  3. Chandramouli, R. , M. Kharrazi, and N. Memon, Image Steganography and Steganalysis: Concepts and Practice Digital Watermarking, T. Kalker, I. Cox, and Y. Ro, Editors. 2004, Springer Berlin / Heidelberg. p. 204-211.
  4. Wang, R. -Z. , C. -F. Lin, and J. -C. Lin, Image hiding by optimalLSBsubstitution and genetic algorithm. Pattern Recognition, 2001: p. 671- 683.
  5. Zanganeh, O. and S. Ibrahim, Adaptive Image Steganography Based on Optimal Embedding and Robust Against Chi-square Attack. Information Technology Journal, 2011. 10: p. 1285-1294.
  6. Walia, E. , P. Jain, and N. Navdeep, An Analysis of LSB & DCT based Steganography. Global Journal of Computer Science and Technology, 2010. 10: p. 4-8.
  7. Chan, Y. -K. , Y. -A. Ho, and Y. -P. Chu, Image Hiding with an Improved Genetic Algorithm and an Optimal Pixel Adjustment Process, in IEEE. 2008. p. 320-325.
  8. Bajaj, R. , P. Bedi, and S. Pal, Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization Swarm, Evolutionary, and Memetic Computing,. 2010, Springer Berlin / Heidelberg. p. 230-237.
  9. Westfeld , A. and A. Pfitzmann, Attacks on Steganographic Systems - Breaking the Steganographic Utilities EzStego in Citeseer. 2000. p. 1-4.
  10. Stanley, C. A. , Pairs of Values and the Chi-squared Attack, in CiteSteer. 2005. p. 1-45.
Index Terms

Computer Science
Information Sciences

Keywords

Data hiding image steganography Particle Swarm optimization