استفاد‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌ه از الگوریتم ژنتیک و تپه‌نوردی برای بهبود عملکرد پنهان‌نگاری اطلاعات در تصویر

نوع مقاله : مقاله پژوهشی

نویسندگان

دانشگاه تبریز - دانشکده مهندسی برق و کامپیوتر

چکیده

در این مقاله، روش جدیدی برای پنهان‌نگاری داده‌ها در تصویر مبتنی بر الگوریتم‌های ژنتیک و تپه‌نوردی ارائه شده است. روش پنهان‌سازی مورد استفاده در این مقاله، روش جاسازی LSB است. برای افزایش کیفیت تصویر پنهان‌نگاری‌‌شده و همچنین ظرفیت ذخیره‌سازی در روش ارائه شده از الگوریتم ژنتیک استفاده شده است که عمل پنهان‌سازی را به‌صورت یک عمل جستجو و بهینه‌سازی، مدل‌سازی کرده است. همچنین چون جستجو با الگوریتم ژنتیک عمل زمان‌گیری است، برای حل این مشکل از الگوریتم‌های جستجوی محلی و تپه‌نوردی بهره گرفته شده است. نتایج ارزیابی‌ها نشان می‌دهد که در روش ارائه شده کیفیت تصویر پنهان‌نگاری‌شده با افزایش ظرفیت پنهان‌سازی باز هم قابل قبول است. همچنین اعمال الگوریتم تپه‌نوردی باعث افزایش سرعت مخفی سازی می‌شود.

کلیدواژه‌ها


عنوان مقاله [English]

Using Genetic and Hill Climbing Algorithms to Improve Performance of Image Steganography

نویسندگان [English]

  • Vahideh Rashidzadeh
  • Mohammad Ali Balafar
  • Seyed Naser Razavi
Faculty of Electrical and Computer Engineering, University of Tabriz
چکیده [English]

In this paper, a new method based on genetic and hill Climbing algorithms for steganography in image is proposed. Data is embedded in LSB. In order to enhance image quality and storage capacity, genetic algorithm is utilized which model hiding as a search and optimization process. Also, to speed up the search function with genetic algorithm, local search and hill Climbing algorithms have been used. The findings show that the hiding image quality is acceptable while capacity is increased. Also, hill Climbing Algorithm speed up the hiding process.

کلیدواژه‌ها [English]

  • Steganography
  • LSB
  • genetic algorithm
  • local searching
  • hill climbing
[1] Rana, M. S., Sangwan, B. S., & Jangir, J. S. (2012). Art of Hiding: An Introduction to Steganography. International Journal of Engineering and Computer Science, 1(1), 11-23.
[2] Shukla, A. K., Kumar, R., Bajpai, R. P., & Bharadwaj, L. M. (2004). Data Hiding in Digital Images: A Review. In Procedings of the Pacific Rim Workshop on Digital Steganography, 2004 (pp. 186-190). ACROS Fukuoka, Fukuoka, Japan.
[3] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, no. 3, pp. 727–752, Mar. 2010.
[4] K. Bailey and K. Curran, “An evaluation of image based steganography methods,” Multimed. Tools Appl., vol. 30, no. 1, pp. 55–88, Jun. 2006.
[5] S. Katzenbeisser and F. A. Petitcolas, Eds., Information Hiding Techniques for Steganography and Digital Watermarking, 1st ed. Norwood, MA, USA: Artech House, Inc., 2000.
[6] Singh, K. U. (2014). A Survey on Image Steganography Techniques. International Journal of Computer Applications, 97(18).
[7] Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.
[8] Johnson, N. F., & Jajodia, S. (1998). Exploring steganography: Seeing the unseen. Computer, 31(2), 26-34.
[9] C.-K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, Mar. 2004.
[10] E. Ghasemi, J. Shanbehzadeh, and N. Fassihi, “High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform,” in Intelligent Control and Innovative Computing, S. I. Ao, O. Castillo, and X. Huang, Eds. Springer US, 2012, pp. 395–404.
[11] A. Nissar and A. H. Mir, “Classification of Steganalysis Techniques: A Study,” Digit Signal Process, vol. 20, no. 6, pp. 1758–1770, Dec. 2010.
[12] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimed., vol. 8, no. 4, pp. 22–28, Oct. 2001.
[13] J. Fridrich and M. Goljan, “Practical Steganalysis of Digital Images - State of the Art,” in In Proceedings of SPIE, 2002, pp. 1–13.
[14] Wang, S., Yang, B., & Niu, X. (2010). A secure steganography method based on genetic algorithm. Journal of Information Hiding and Multimedia Signal Processing, 1(1), 28-35.
[15] Sharma, V. K., & Shrivastava, V. (2011). Improving the performance of least significant bit substitution steganography against rs steganalysis by minimizing detection probability. International Journal of Information and Communication Technology Research, 1(4).
[16] Mandal, J. K., & Khamrui, A. (2011). A Data Embedding Technique for Gray scale Image Using Genetic Algorithm (DEGGA). International Confrence on Electronic Systems (ICES-2011).
[17] G. Prema and S. Natarajan, “Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application,” in 2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013, pp. 727–730.
[18] R.-Z. Wang, C.-F. Lin, and J.-C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognit., vol. 34, no. 3, pp. 671–683, Mar. 2001.
[19] L. Yu, Y. Zhao, R. Ni, and T. Li, “Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm,” EURASIP J. Adv. Signal Process., vol. 2010, no. 1, p. 876946, Jun. 2010.
[20] H. R. Kanan and B. Nazeri, “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm,” Expert Syst. Appl., vol. 41, no. 14, pp. 6123–6130, Oct. 2014.
[21] D. E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, 1st ed. Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 1989.
[22] P. Sethi and V. Kapoor, “A Proposed Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography,” Procedia Comput. Sci., vol. 87, pp. 61–66, 2016.
[23] J. H. Holland, Adaptation in Natural and Artificial Systems. Cambridge, MA, USA: MIT Press, 1992.
[24] Nosrati, M., & Karimi, R. (2011). A Survey on Usage of Genetic Algorithms in Recent Steganography Researches. World Applied Programming, 206-210.
[25] D. A. Coley, An Introduction to Genetic Algorithms for Scientists and Engineers. River Edge, NJ, USA: World Scientific Publishing Co., Inc., 1998.
[26] S. J. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, 2nd ed. Pearson Education, 2003.
[27] V. Arya, N. Garg, R. Khandekar, A. Meyerson, K. Munagala, and V. Pandit, “Local Search Heuristic for K-median and Facility Location Problems,” in Proceedings of the Thirty-third Annual ACM Symposium on Theory of Computing, New York, NY, USA, 2001, pp. 21–29.
[28] Anuradha Kasande and A.A. Agarkar, “An Enhancement in Quality of image & Anti- Steganalysis by Using Optimizing Image Steganography", IJEAT , 3(3) Feb. 2014.
[30] Skiena, S. S. (1998). The algorithm design manual: Text (Vol. 1). Springer Science & Business Media.
[31] A. Jaszkiewicz, “Genetic local search for multi-objective combinatorial optimization,” Eur. J. Oper. Res., vol. 137, no. 1, pp. 50–71, Feb. 2002.