Abstract

Due to the rapid development of confidential digital communication over international networks, security is the most significant factor. Steganography is the science of concealed communication and is used to conceal the presence of secret information among the various methods of hiding data in communications. Steganography techniques are usually implemented either in spatial or frequency domains. Some spatial domain methods fundamentally utilize the absolute difference value between neighbor pixels to encode the secret message, categorized as Pixel-Value Differencing Steganography methods (PVDS). In PVDS, the hiding capacity of the adjacent pixels depends on their difference value. Consequently, the secret data will be embedded with a high visual quality of the stego-image. Indicator-based PVDS (IPVDS) technique is derived from the PVDS method. It depends on an Indicator pixel (IP) to extract the secret data correctly. The Genetic Algorithm (GA) approach to optimization depends on the concept of survival of the fittest. This paper introduces two proposals, GA-based steganography schemes (GA-IPVD) and (GA-IPVDM). These new techniques encoded secret data using the IPVDS method. Before embedding data in the cover image, the order of the pixels corresponding to the secret data is modified and rearranged. GA controls the operation of rearranging and modifying the order of pixels and all parameters. The current paper addresses steganography as an optimization problem and seeks to determine the optimal order of the pixels that enhance the matching between the cover image and stego-image to reduce distortion despite high embedded capacity. In the first proposed technique GA-IPVD, GA concentrates on the imperceptibility of embedded data and maximizes the quality of the stego-image according to the given secret data. In contrast, the GA maximizes the capacity of embedded data while maintaining an acceptable amount of stego-image quality in the second proposed technique GA-IPVDM. The proposed systems have embedding key that increase the security of proposed schemes. The experimental results demonstrate that the proposed methods can embed a large quantity of secret data while maintaining an acceptable visual quality of the stego-images. The proposed technique has also demonstrated excellent resistance to a variety of stego-attacks, including the pixel difference histogram (PDH) as well as regular and singular (RS) analyses. Additionally, the out-of-boundary pixel issue (BI), which endures in the majority of modern data hiding algorithms, has been successfully resolved.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.