Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 12

Efficient Image Steganography Using Whale

Optimization
Abstract- The development of image-based apps and the format. The format is converted into a different, comparable
ease with which information might now be accessed thanks to picture for system files, such as images.
the Internet have made security-related issues more significant
and difficult to solve. Certain media, including pictures, carry The science and art of covert communication known as
information while protecting it from illegal access; this is a steganography focuses on transmitting covert messages by
topic of significant and ongoing research. Steganography is a modifying the original digital media, including images used to
method of clandestine communication that may be used to create stego objects. For a given payload, the statistical
conceal sensitive information. It may be utilized to embed or distributions of the digital media source need to be likely in
hide many types of sensitive data, such as text and picture files, order to guarantee the security of the covert transmission.
using a private key. For example, data hiding in picture is a Steganography is one method of picture security that
method that protects photographs by enclosing sensitive data. concentrates on concealing sensitive information. The process
The primary goal of any picture steganographic model is to of hiding a picture or text—referred to as sensitive image data
minimize image distortion while protecting embedded data. —within another picture or text—referred to as the cover—in
The cover document is the file—also known as the secrete file— order to carry out cryptography and boost security. In recent
that holds the confidential data. The embedded file that was research works, A variety of image steganography techniques
acquired is called the stego file. Therefore, the primary have been used in recent studies. While the others are based
objective of our proposal is to use picture data to develop a on the spatial domain, which has a popular and
unique Steganography model. Image steganography is the
straightforward extraction and embedding method, the
technique of gathering photos and selecting color channels with
DCNN. The WOA approach then uses ALWT to carry out the
majority of approaches are accomplished based on the
embedding procedure by choosing the best pixels from the transform domain with high robustness. The image-based
pictures. Ultimately, the stego pictures are recovered using steganography conceals the keys to improve security.
inverse ALWT. Here, the same DCNN is used to choose the
window from the obtained pictures. The experimental study's
findings demonstrate the effectiveness of embedding over
image data.

Keywords-Image Steganography Model; Image Steganography;


Adaptive Lifting Wavelet Transform; Deep Convolutional Neural
Networks; Whale Optimization Algorithm(WOA).

I. INTRODUCTION
Information secrecy is one of the most crucial aspects of
communication. There are two primary approaches of
obtaining information confidentiality. Steganography and
cryptography. The use of codes to protect the confidentiality
of information during communication is known as The most effective cover method is image-based
cryptography. The history of cryptography is lengthy. There steganography, which is widely used in human memory
are several approaches and its progression available in. Since applications and is effective. Their encrypted data frequency
several cryptanalysis techniques have been created to detect creates a secret bit change that is undetectable to outside
the secret information, it is no longer sufficient for parties. Previous studies have demonstrated that there are
information to be kept hidden due to technological certain difficulties in concealing the data within image files.
advancements. Therefore, it's imperative to keep the Lower visual quality of the image while performing any
information's existence a secret. The process makes use of modifications, lack of visibility of embedded information on
the distributed images, intra frame distortion drift in image
steganography. The process of secretly adding data to a data sequences, security, resilience, and greater payload of
source without affecting its perceived quality is known as concealed data are some of the issues with data hiding
steganography. The Greek words steganos, which literally systems. When executing the picture The aforementioned
means "covered," and graphia, which means "writing," are the issues with steganography are brought up, which lowers the
source of the term steganography, which refers to covered security level and stego file image quality. The majority of the
writing. Steganography's most well-known application is literature now in publication uses text or image files for digital
hiding a record inside another document. In information steganography. In general, there is a need to promote
hiding, actual data is typically not maintained in its original
II. EXISTING RESEARCH WORKS
steganography approaches on different types of image data.
A. Related works
There are several reasons why data is hidden in images,
including the need to successfully handle image disorientation, In 2023, “Residual Steganography: Embedding Secret
additional room for concealment, and the inability of the Data in Images using Residual Networks” Traditional image
human visual system to discern the concealed data. The steganography techniques typically involve embedding
emergence of deep learning in image vision tasks has led to information directly into the image data, which can often lead
the suggestion of the steganography approach as a means of to noticeable artifacts or degradation of the image quality[1].
optimizing performance rates with respect to accuracy and In 2020, “High-Capacity Information Hiding Based on
efficiency. It uses deep learning-based techniques to improve Residual Network” Image steganography can be divided into
capacity, security, and autonomous generation. Steganalysis is two species: transform domain and spatial domain information
divided into two phases in these respects, such as feature hiding. One is transform domain information hiding, such as
extraction by hand and classification. Support vector machines Discrete Fourier Transform (DFT), Discrete Cosine Transform
(SVM), ensemble classifiers, convolutional neural networks (DCT) The other is spatial domain information hiding
(CNN), recurrent neural networks (RNN), etc. are a few methods, such as Least Significant Bit(LSB)and neural
examples of deep learning approaches. Deep learning network is applied to information hiding, Residual block is
techniques have been applied to image steganography in used to the hidden network to make the network easier to
recent years to raise the communication security level. When optimize and avoid the degradation problem caused by
deep learning is applied to steganalysis, classification and expanding the depth of the network[2].
feature extraction are integrated into a single framework, and
parameter optimization is done to lower complexity and In 2020, “An improved image steganography technique
dimensionality. While many studies concentrate on applying a using edge based data hiding in DCT domain” classified into
novel steganography model for individual data, relatively few two domains i.e., spatial domain and frequency domain, in
studies address the construction of a steganography model. which data is embedded in the edge pixels of the carrier image
Thus, this research proposes a new steganography model using and in the existing image steganography using edge based data
wavelet transform model aided by deep learning and hiding in DCT domain algorithm [3].
optimization method on image data. In 2020, “Steganography Techniques Using Convolutional
The following contributions are made to the Neural Networks” The encoder neural network determines
implementation of a new steganography model. where and how to place the message, dispersing it throughout
the bits of cover image. The decoder network on the receiving
 To suggest a new deep learning-assisted ALWT side, which is simultaneously trained with the encoder, reveals
and picture steganography model in order to the secret image [4].
enhance the caliber of stego items.
In 2020, “Image Steganography Analysis Based on Deep
 To obtain a picture using the DCNN technique, Learning” The steganalysis approach utilizes the deep features
select the color channel from the photos, and extracted from the stego image and also based on low
improve the stegos' quality. embedding rate images and multi-class steganography [5].
 To suggest an ALWT that incorporates the WOA In 2019, Junhong Zhang et al [6] proposed a distortion
algorithm for the purpose of optimizing the assessment method that takes into account more than only
wavelet type in LWT that aids in the embedding inequity effects caused by flipping pixels. However, it relied
of stego files and covers. In the end, inverse on the visual consequences of flipping identical pixels, often
ALWT facilitates the acquisition of the final stego known as joint distortion measurement. Use the syndrome-
pictures. The higher Peak Signal to Noise Ratio trellis code to reduce embedding distortion and embed
(PSNR) rate guarantees the fitness of the messages instead of selecting specific sites for secret
steganography model that was created. messages. The suggested distortion measurement outperforms
the steganography method in terms of performance, statistical
 To assess the effectiveness of the developed
security, and image quality.
picture steganography model by comparing it
with multiple methods and using a variety of In 2019, Inas Jawad Kadhim et al [7] investigated the
performance indicators. deployment of digital image steganography. Here, the pivotal
encounter in modeling a steganographic scheme requires
This research work is arranged as follows. The existing
balancing security, resilience, imperceptibility, and bit
research works are evaluated in section II. The deep learning
embedding rate. This paper evaluates traditional image
and wavelet-based image steganography model is illustrated in
steganography methods and introduces fresh contributions
section III. The development of WOA algorithm for image
across several modalities. This paper provides a
embedding selection is shown in section IV. The enhanced
comprehensive overview of image steganography, including
image steganography using ALWT is depicted section V. The
requirements, operations, features, and performance estimates.
results and discussions are explained in section VI. The
Performance evaluation metrics for examining the
conclusion is given in section VII.
steganographic model were also presented. Additionally, we
covered how to select appropriate cover media for specific invisibility, and a high degree of security have all been made
applications and modern steganalysis systems. possible by LWT . However, the noise in the images has an
impact on the performance. With the Optimized Counting-
In 2019, Ahmed A. Abd EL-Latif et al [8] developed a
Based Secret Sharing Scheme, robustness was guaranteed in
method to create substitution boxes (S-boxes) based on
terms of SSIM, MSE, and PSNR, and it requires less
quantum walks. The suggested QWs S-box model's
computing power. However, it has more time complexity
performance was assessed using the S-box evaluation
when figuring out the embedded probability. These difficulties
criterion.
helps researchers to concentrate on putting their new
Furthermore, the results demonstrate that the S-box is steganography model into practice.
suitable for security-related applications. Furthermore, a
unique model for image steganography was developed. To III. DEEP LEARNING AND WAVELET-BASED IMAGE
enhance the security of embedded data, the developed STEGANOGRAPHY MODEL
paradigm combines quantum walks and classical data
concealment. QWs S-box was used to control extraction and A. Proposed image Steganography Model
embedding procedures. The cryptographic QWs S-box ensures
security throughout extraction and embedding stages. The invisible communication science known as
steganography is employed to provide secure communication.
In 2019, Xiaotian Wu and Ching-Nung Yang [9] Another name for it is covered writing, which conceals the
developed SIS approaches using steganography and existence of messages. Digital steganography is used for
authentication for uncompressed photos. They are not suitable secure and confidential communication in the majority of
for domain compression. The model did not relapse a applications worldwide. Various image carriers, such as
deformed stego image into its original model, but the cover pictures, make up this digital media. In order to obtain stego
image was significant. To address these challenges, we objects, this research study investigates different image data.
devised a (k, n) threshold partial reversible Absolute Moment Information about text files or images is concealed within the
Block Truncation Coding (AMBTC) based on the SIS model,
images during the process of image steganography. The game
which includes authentication and steganography. GF (28)
theory model-based image steganography techniques now in
used a polynomial on the basis of the SIS to partition a secret
image into n noise-similar shares. The AMBTC cover picture use have issues with employing more realistic images and
was embedded with parity bits utilizing developed embedding incur significant computational overhead. It allows for the safe
algorithms. Then, n significant stego images were modeled. transmission of sensitive data or the concealment of its
competently handle the shares. Authentication ensured the existence. With the aid of deep learning and wavelet
legitimacy of the Stego picture. Adequate stego photos can techniques, these distinct steganography methods are
drastically alter the secret. integrated to create a new image steganography method.as
shown in Fig. 3.1.
In 2018, Kumar Gaurav and Umesh Ghanekar [10]
developed a steganography algorithm based on the local
reference edge detection model and exclusive disjunction
(XOR) characteristic. Human eyes are less sensitive to
intensity fluctuations in sharp edges than in uniform areas of
an image. The bit plane dependent XOR coding scheme
improves security and capacity in the LSB bits of edge pixels,
resulting in minimal modifications. While the standard edge-
based steganography paradigm is more imperceptible, it has
limited embedding capabilities. Furthermore, the suggested
approach improves embedding capabilities while maintaining
resilience and imperceptibility.

B. Problem statement
The steganography model for images attains the best
results in terms of embedding speed and provides a notable
enhancement in payload and steganography security.
However, it cannot be used to assess joint compression
embedding techniques. Steganography security is provided by
DCNN, and coding efficiency has increased. It has effectively
quantified the altered distortions brought about by intra- and
inter-channels forecasts. However, the costs of inter-block
distortion are higher. Higher processing efficiency, increased

Fig 3.1 : Architecture of image Steganography Model


This work implements a research on image steganography Three blocks' worth of output are pooled and sent via a
model. This steganography method takes into account three comparable architecture that has just one convolution layer
main processes: ALWT-based embedding, optimal selection, and is not shallower. Lastly, to obtain the desired result size,
and DCNN-based picture data selection. Gathering the photos the combined results are sent to an additional convolutional
from standard datasets and using the DCNN to choose the layer. The network configuration for the base model is ready.
color channels in the images is how image steganography is It can be used to obtain the properties of the input data. Next,
done. The best pixels are then chosen using the WOA method, the base model's architecture is used to prepare the hidden
and the data is then sent to the ALWT embedding process. network. For the purpose of creating the container images, the
The goal of using ALWT for image steganography is to network weights are learned. In order to decode the data and
produce results with a better PSNR rate. Finally, the stego obtain the original data, the reveal network is finally proposed.
pictures are obtained by performing an inverse ALWT. The rectified linear unit (ReLU) is used as the linear activation
Ultimately, the embedding over picture data is accomplished function in the last layer of the model. The decoding process is
and demonstrated to perform better. matched for getting the output of the network.

B. Description of Dataset Finally, DCNN gets the results as channels of images


.The designed DCNN-based image data selection is given in
In this proposed steganography model, the image data is
Fig. 3.2.
gathered for processing.
Image dataset: The dataset was collected from
“https://www.petitcolas.net/watermarking/image_database/:
Access date: 2022-05-15”. This dataset consists of various set
of images, in which the Classics images are gathered for
image steganography. The Baboon is used in this model,
where the “Courtesy of the Signal and Image Processing
Institute at the University of Southern California”. The
gathered images are termed as , where
and the total number of collected images
is indicated as RT
C. DCNN-based image Data Selection
In this proposed steganography model, DCNN is used for
performing the image data selection. Here, from the gathered
images , the channels of images are attained and fed to the
next phase. So, the inputs of DCNN are gathered images .
At last, the DCNN achieves the results as channels of images,
window.
DCNN addresses the problem of encrypting digital data Fig 3.2: DCNN-based image data selection for image
with hidden visuals. Without human oversight, DCNN is steganography
capable of autonomously identifying the salient and notable
aspects. Additionally computationally efficient is DCNN. It
also aids in finding patterns in data, particularly picture data. IV. DEVELOPMENT OF WHALE OPTIMIZER FOR IMAGE
EMBEDDING SELECTION
The DCNN consists of two sub-models: the first one is
called the encoding and decoding sub-model and it focuses on A. Proposed WOA
the preparation and hiding network, while the second one is 2.1. Inspiration
called the reveal network. The network is accurately prepared
Whales are elegant animals. They are said to be the largest
in the encoding sub-model by extracting the properties of data,
mammals on the planet. A mature whale can reach lengths of
including images. After that, the network is made visible by
decoding the input data to extract its properties. Nevertheless, 30 m and weights of 180 t. This enormous mammal is divided
in order to shorten the training period, every component of the into seven primary species, including the killer, minke, sei,
intended DCNN is modified to make it more suitable for humpback, and right, finback, and blue. Most people classify
image data. In this case, the convolution stacked blocks are whales as predators. Because they must breathe from the
built to learn different network feature levels. 5 convolutions ocean's surface, they never sleep. The brain only sleeps in
are stacked to create a block with a kernel size that is actuality in half of it. Whales are thought to be extremely
comparable. There are three parallel blocks in it. with kernel intelligent, feeling animals, which makes them fascinating.
size of 3×3, 4×4, and 5×5, which helps in learning more Hof and Van Der Gucht claim that whales share spindle cells,
different features. which are identical to human brain cells in some brain regions.
Human judgment, emotions, and social behaviors are
controlled by these cells. Put another way, our spindle cells set
us apart from other animals. Whales are twice as intelligent as
an adult human because they have twice as many of these
cells. Whales are demonstrably just as intelligent as humans 2.2.1. Encircling prey
when it comes to thinking, learning, judging, communicating, The bubble-net feeding technique used by humpbacks
and even feeling emotions, albeit obviously much less so. It serves as the direct inspiration for the mathematical model that
has also been noted that whales, primarily killer whales, can Andrew Lewis and Seyedali Mirjalili proposed in. Finding the
acquire a vernacular of their own. Whale social behavior is an prey's position through a herd is the first step in the hunting
additional fascinating subject of interest. They either dwell in strategy outlined in the previous section and the basis of the
groups or alone. They are, nevertheless, primarily seen in mathematical model. Once the most qualified search agent is
groups. Certain species—killer whales, for example—can live selected (based on a calculation of each search agent's fitness),
their whole lives as a family. Megaptera novaeangliae, or other search agents update their positions in order to challenge
humpback whales, are among the largest species of baleen him for the top spot.
whales. A mature humpback whale resembles a school bus in
size. Small fish herds and krill are their preferred prey. It is As was indicated in the preceding section, humpback
this mammal in Fig. 2. The unique way that humpback whales whales use the bubble-net technique to assault their prey. The
hunt is what I find most fascinating about them. We refer to following is the method's mathematical formulation:
this kind of foraging as the "bubble-net feeding method."
Hunting near the surface for schools of krill or small fish is
what humpback whales prefer to do. It has been noted that this
foraging is carried out by blowing characteristic bubbles along
a line that forms a circle or a "9," as depicted in Fig. 2. Prior to
2011, this behavior was solely examined through surface
observations. That said, this behavior makes use of tag
sensors. 300 tag-derived bubble-net feeding sessions involving
nine distinct humpback whales were recorded. They
discovered two bubble-related moves and gave them the
names "double loops" and "upward-spirals." In the former
tactic, humpback whales descend around 12 meters, begin to
encircle their prey in a bubble, and then swim upward toward where t is the current iteration, 𝑋∗ is the position vector
the surface. The subsequent maneuver consists of three stages: of the best solution, 𝑋→ is the position vector, 𝑎→ is linearly
the capture loop, the lobtail, and the coral loop.It is important decreased vector over the iterations, 𝑟→ is a random vector in
to note that humpback whales are the only animals that exhibit [0, 1]. Achieving different new positions (𝑋→, Y→) in the
the unusual habit of bubble-net feeding. This work performs neighborhood of the best agent (X*.Y*)is possible by updating
optimization by performing a mathematical modeling of the values of 𝐴→ and 𝐶→ vectors according to Equations (3) and (4).
spiral bubble-net feeding maneuver. What is worth mentioning is that this model can be extended
to the n dimensional search space which we benefit from in
our research by extending the space to three-dimensional one.

2.2.2. Bubble-net attacking method (exploitation phase)

The attack itself is the primary component of the bubble-net


hunting technique. It is referred to as the "exploitation phase"
in WOA and is split into two phases: spiral updating location
and shrinking encircling mechanism.

shrinking encircling mechanism : mathematically represented


by a vector 𝑎→ with diminishing value throughout the course of
the rounds, and the second by introducing a unique equation
(Equation (5)) to simulate the whales' spiral movement. In
Fig 4.1. Bubble-net feeding behavior of humpback whales. actuality, during a hunt, the whales exhibit both of these
behaviors at the same time as they spiral toward the surface
2.2. Mathematical model and optimization algorithm and contract. its circumference. Thus, in order to replicate this,
the Whale Optimization Algorithm uses Equation (7) to
The spiral bubble-net feeding maneuver, encircling prey assume a 50% likelihood of updating position using either the
mathematical model, and prey search are presented first in this first or the second behavior.
section. Next, the WOA algorithm is suggested.
2.2.3. Search for prey (exploration phase)
The Whale Optimization Algorithm presents an additional
mechanism known as the exploring phase. Its primary function
is to search beyond the present best answer to see whether
there might be a better one. As a result, WOA can search
globally. This is accomplished mathematically by changing
where b is a constant for defining the shape of the the position (𝑋,𝑌) in accordance with the random vector 𝐴→
logarithmic spiral, l is a random number in [−1,1] (Equation (9)).
[−1,1]. Figure 2 presents bubble-net hunting attack split into
two separate movements in the mathematical model.

Fig. 4. Bubble-net search mechanism implemented in WOA


(X∗ is the best solution obtained so far): (a) shrinking
Fig 5: Exploration mechanism implemented in WOA(X* is a
encircling mechanism and (b) spiral updating position.
randomly choose search agent).

Spiral updating position: As can be seen in Fig. 4(b), this


approach first calculates the distance between the whale Initialize the whales population Xi (i = 1, 2, ..., n)
located at (X,Y) and prey located at (X∗,Y∗). A spiral Calculate the fitness of each search agent
equation is then created between the position of whale and
prey to mimic the helix-shaped movement of humpback X*=the best search agent
whales as follows:
while (t < maximum number of iterations)
X(t + 1) = Dr→. ebl · cos (2πl) + X∗ (t) (5)
for each search agent
where −→ Dr = | →X∗(t) – →X (t)| and indicates the distance
Update a, A, C, l, and p
of the ith whale to the prey (best solution obtained so far), b is
a constant for defining the shape of the logarithmic spiral, l is if1 (p< 1)
a random number in [−1,1]
Update the position of the current search agent by the Eq.
(2.1)
else if2 (|A|>1)
Select a random search agent ( )
Update the position of the current search agent by the Eq.
In addition to the bubble-net method, the humpback (2.8)
whales search for prey randomly. The mathematical model of end if2
the search is as follows.
else if1 (p 0.5)
Update the position of the current search by the Eq. (2.5) problem in the integer domain and using an in-place wavelet
end if1 transform architecture. LWT improves computing
performance and uses less memory. In this paper, LWT is
end for
selected because it reduces computational complexity. The
Check if any search agent goes beyond the search space LWT technique is a revolutionary approach to bi-orthogonal
and amend it wavelet design that makes use of the signal's frequency
domain characteristic following the signal's time domain
Calculate the fitness of each search agent translation. Because LWT makes wavelet design simpler, it is
Update X* if there is a better solution more useful for creating real-world applications. The LWT
strategy does not require the information in the Fourier
t=t+1 transform since wavelet transform is proposed in the time or
end while spatial domain. The ideal reconstructions in LWT are derived
in Eq. (12).
return X*
Fig. 6. Pseudo-code of the WOA algorithm.

(12) Here, LWT utilizes the two synthesis filters


where →Xrand is a random position vector selected from
the current population (a random whale). Fig. 5 shows some of like (high-pass) and (low-pass) in the inverse transform
the potential locations around a specific solution with A > 1. and the forward transform utilizes two analysis filters such as
An initial collection of random solutions is used by the WOA (high-pass) and (low-pass). The LWT has various lifting
algorithm. Search agents adjust their positions in relation to a operations such as split, predict and merge principles, which is
randomly selected search agent or the best solution found thus a simpler correlation among reconstruction filter pairs. In the
far at each iteration. The exploration and exploitation split operation, the original data with length, where
parameters are provided by reducing the a parameter from 2 to is divided into two different groups of odd and even
0. When |A | > 1, a random search agent is picked; when |A | < samples.
1, the optimal solution is chosen to update the search agents'
positions. Depending on the value of p, WOA has the ability Second, it concentrates on substituting Eq. (13)—which is
to move in a circular or spiral pattern. When a termination interpreted as high frequency or detail components—for the
requirement is satisfied, the WOA algorithm comes to an end. odd element during the prediction step. As a result, the
Figure 6 displays the WOA algorithm's pseudo code. Because prediction process is viewed as a high-pass filter in this
WOA has the ability to explore and exploit, it can be viewed instance.
as a global optimizer from a theoretical perspective.
Furthermore, other search agents are able to take advantage of
the current best record within the defined search space that the (13)
suggested hyper-cube method creates around the optimal
answer. The WOA algorithm may seamlessly move between The prediction operator in this case is represented by.
exploration and exploitation thanks to an adaptive change of Thirdly, the update phase attempts to smoothen the data in
the search vector A. This is achieved by reducing A, some comparison to the prior scale by substituting an approximation
iterations are devoted to exploration (|A| ≥ 1) and the the rest for the even element in the data. As a result, this process is
is dedicated to exploitation (|A| < 1). Remarkably, WOA interpreted as low-pass filtering since the smoother data has
includes only two main internal parameters to be adjusted (A less high frequency components. Equation (14) deduces the
and C). updating equation.

To fully replicate the behavior of humpback whales,


mutation and other evolutionary operations may have been (14)
incorporated in the WOA formulation; however, we chose to
apply a very basic version of the WOA algorithm by reducing Equation (14) is employed to analyze and break down the
the number of internal parameters and heuristics. However, forward wavelet transform. Finally, in order to normalize the
hybridization with evolutionary search schemes may be the approximation and details coefficients at the end of the
subject of future studies transformation process, the normalization stage is taken into
consideration. The inverse step is finally carried out. Different
wavelets are employed in LWT to specify the properties of the
resultant transform. Three wavelets—the Daubechies wavelet,
V. ENHANCED IMAGE STEGANOGRAPHY USING ADAPTIVE the Cohen-Daubechies-Feauveau (CDF) 9/7-tap wavelet, and
LIFTING WAVELET SCHEME the Haar wavelet—are examined in this work. Consideration
must be given to the specifics of a given application while
B. ALWT-based Steganograpghy selecting this wavelet. Wavelets are chosen according to their
The second-generation wavelet, known as LWT, solves the forms and capacity for data analysis in the relevant
problem with the first-generation wavelet by analyzing the application. In this case, the Haar and Daubechies wavelets are
the most notable wavelets in the wavelet family. One of the bi- Fig 5.1: Proposed image steganography model with ALWT and WOA
orthogonal wavelets is Cohen-Daubechies-Feauveau, which algorithm
features symmetric wavelets and generators. The primal
generator is a B-Spline, and the dual generator has the D. Inverse ALWT-based Message Restoration
maximum number of smoothness factors for its length. The inverse ALWT is utilized in this image steganography
In order to maximize the performance of the model to recover the messages from the image data pertaining
steganography findings, the WOA algorithm selects the to images. The update step comes first in the inverse step, then
corresponding wavelet in the ALWT-based steganography. the predict step, and finally the combination of the even and
odd components to interleave the even and odd parts back into
C. Objective Model for Proposed Steganograpghy the same data stream. The following equations are used to
perform the inverse ALWT.
The goal of the suggested picture steganography paradigm
is to steganography images. This model proposes a novel
ALWT that uses the WOA algorithm to carry out the
steganography embedding. The primary goal of this picture (18)
steganography model is to maximize PSNR with respect to
steganography outcomes, which includes cover data and stego
data. It is obtained from Eq. (15). (19)
At last, the original messages are restored from the stego
objects including images.
(15)
I. RESULTS AND DISCUSSIONS
Here, the WOA algorithm selects optimal time instants
and proposes ALWT by optimizing the types of A. Experimental setup
wavelets for performing the steganography and types of Python experiments were used to do a performance
wavelets is selected among [1, 3]. A metric of the peak error is analysis on the multi-media steganography model that was
denoted by PSNR and termed as , which is derived in built. In this case, metrics including NCC, MSE, Bit Rate
Eq. (16). (BR), SSIM, PSNR, and Embedding Capacity were used to
evaluate performance (EC). The comparative analysis was
conducted by examining several transform techniques that are
(16) currently in use, such as QDCT, DWT, DCT, and LWT. The
population was assumed to be ten for the sake of the
experimental analysis.
Here, the maximum value in the original data or cover data
including images is represented by , and the MSE is B. Performance measures
termed as and derived in Eq. (17). The performance measures are described here.
(a) BR: It is used for measuring the change of the bit rate,
in which the bit rate increase rate is formulated in Eq. (20).

(17)
(20)
Here, the stego and original data are correspondingly
presented by and , the number of Here, the size of the original multimedia data is known as
columns and rows in image data are correspondingly and the size of the data after embedding the
represented as and . Finally, the proposed multi-media information process is considered as .
steganography model is diagrammatically represented in
Fig.5.1. (b) EC: The greatest amount of secret data that can be
incorporated into cover data is its definition. It is dependent
upon the embedding function and the characteristics of the
cover data. It is obtained from Eq. (21) and calculated as a
percentage.

(21)

Here, term represents maximum size of data


embedded.
(c) NCC: The range of NCC is 0.99 to 1, as stated here, (23).
and it is used to "evaluate the likeness between the original
secret data and the extracted secret data."

(9)

In Eq. (9), the mean of and is represented as


and , respectively, the variance of and
(22) is denoted as and , the constant values are
(d) SSIM: It is “a perceptual metric that quantifies indicated as and , respectively and the covariance of
image quality degradation caused by processing” and is given as .
as equated in Eq.
C. Image results
The sample experimental results are given in Fig. 5.

Cover Image Secret Image Stego Image

Fig.2. Sample experimental results


D. Analysis on Image steganography algorithms in Figures 6 and 7, respectively, as well as a variety
The effectiveness of the recommended multi-media of heuristic algorithms. By assessing the several performance
steganography is assessed on terms of statistical analysis of metrics, this study verifies the performance estimation for
the picture steganography provided for different approaches image steganography.

(a) (b)

(c) (d)

(e) (f)
Fig. 1. Performance investigation on Image steganography over various optimization algorithms over (a) BR, (b) EC, (c) MSE, (d) NCC, (e) PSNR and (f) SSIM

E. Statistical analysis steganography is displayed in Table I. As seen from results it


In this section, the statistical analysis of the created picture is concluded that
steganography model is assessed, and the associated image the maximum performance is ensured for image
steganography techniques.
TABLE I. PERFORMANCE INVESTIGATION ON IMAGE STEGANOGRAPHY OVER VARIOUS ALGORITHMS
TERMS BR EC MSE NCC PSNR SSIM
Best
0.1999999999999993 256000.0 4616.166582000001 0.2563399107287346 7.572455125776161 0.7382982829352915
Worst
1.1799999999999997 256000.0 11371.94755869 0.45880498748344467 100.0 1.0
Mean
0.5959999999999998 256000.0 7239.859704175125 0.3823322900531142 27.56193128020691 0.8249195961151216
Median
0.4599999999999991 256000.0 5263.6143135056245 0.40420530410900735 10.91796301624637 0.7829622873275645
Standard
deviation 0.3531345352694921 0.0 2855.5822640195306 0.07278045302272801 36.247880023844715 0.09773377177379504

II. CONCLUSION [9] A. S. Brandao and D. C. Jorge, "Artificial Neural Networks Applied to
Image Steganography," IEEE Latin America Transactions, vol. 14, no.
Using data from image steganography, a new 3, pp. 1361-1366, March 2016.
steganography model has been implemented in this paper. The [10] S. Tan and B. Li, "Targeted Steganalysis of Edge Adaptive Image
DCNN was used to extract the channels from the images in Steganography Based on LSB Matching Revisited Using B-Spline
order to use them for image steganography. Next, the WOA
algorithm was used to choose the best color channels. Fitting," IEEE Signal Processing Letters, vol. 19, no. 6, pp. 336-339,
Ultimately, the information was embedded using ALWT, and June 2012.
the stego image were obtained using inverse ALWT. To [11] Z. Zhang, G. Fu, R. Ni, J. Liu and X. Yang, "A generative method for
achieve higher steganography performance, additional steganography by cover synthesis with auxiliary semantics," Tsinghua
Science and Technology, vol. 25, no. 4, pp. 516-527, Aug. 2020.
improvements to the heuristic techniques will need to be
[12] J. Zhang and D. Zhang, "Detection of LSB Matching Steganography in
made, as the suggested model only observes similar Decompressed Images," IEEE Signal Processing Letters, vol. 17, no. 2,
performance to current ones. pp. 141-144, Feb. 2010.
[13] Ran-Zan Wang and Yeh-Shun Chen, "High-payload image
steganography using two-way block matching," IEEE Signal Processing
References Letters, vol. 13, no. 3, pp. 161-164, March 2006.
[1] Y. Wang, Y. Cao and X. Zhao, "Minimizing Embedding Impact for [14] N. Subramanian, O. Elharrouss, S. Al-Maadeed and A. Bouridane,
H.264 Steganography by Progressive Trellis Coding," IEEE "Image Steganography: A Review of the Recent Advances," IEEE
Transactions on Information Forensics and Security, vol. 16, pp. 333- Access, vol. 9, pp. 23409-23423, 2021.
345, 2021. [15] A. A. Lopez-Hernandez, R. F. Martinez-Gonzalez, J. A. Hernandez-
[2] Yi Chen, Hongxia Wang, Kim-Kwang Raymond Choo, Peisong He, Reyes, L. Palacios-Luengas and R. Vazquez-Medina, "A Steganography
Zoran Salcic, Mohamed Ali Kaafar, Xuyun Zhang, "DDCA: A Method Using Neural Networks," IEEE Latin America Transactions,
Distortion Drift-Based Cost Assignment Method for Adaptive Video vol. 18, no. 03, pp. 495-506, March 2020.
Steganography in the Transform Domain," IEEE Transactions on [16] M. Sharifzadeh, M. Aloraini and D. Schonfeld, "Adaptive Batch Size
Dependable and Secure Computing, 2021. Image Merging Steganography and Quantized Gaussian Image
Emad Elshazly, Abdelwahab Safey, Abouzaid Refaat, O. Zahran, and Steganography," IEEE Transactions on Information Forensics and
Sayed M. Elaraby, "A secure image steganography algorithm based on Security, vol. 15, pp. 867-879, 2020.
least significant bit and integer wavelet transform," Journal of Systems [17] R. J. Mstafa, Y. M. Younis, H. I. Hussein and M. Atto, "A New Video
Engineering and Electronics, vol. 29, issue. 3, pp. 639-649, June 2018. Steganography Scheme Based on Shi-Tomasi Corner Detector," IEEE
[3] Adnan Gutub & Maimoona Al-Ghamdi "Hiding shares by multimedia Access, vol. 8, pp. 161825-161837, 2020.
image steganography for optimized counting-based secret sharing," [18] L. Zhai, L. Wang and Y. Ren, "Universal Detection of Video
Multimedia Tools and Applications, vol. 79, pp. 7951–7985, 2020. Steganography in Multiple Domains Based on the Consistency of
[4] Meenu Suresh & I. Shatheesh Sam "Optimal wavelet transform using Motion Vectors," IEEE Transactions on Information Forensics and
Oppositional Grey Wolf Optimization for video steganography," Security, vol. 15, pp. 1762-1777, 2020.
Multimedia Tools and Applications, vol. 79, pp. 27023–27037, 2020. [19] R. J. Mstafa, K. M. Elleithy and E. Abdelfattah, "A Robust and Secure
[5] K. Niu, J. Li, X. Yang, S. Zhang and B. Wang, "Hybrid Adaptive Video Video Steganography Method in DWT-DCT Domains Based on
Steganography Scheme Under Game Model," IEEE Access, vol. 7, pp. Multiple Object Tracking and ECC," IEEE Access, vol. 5, pp. 5354-
61523-61533, 2019. 5365, 2017.
[6] W. Su, J. Ni, X. Hu and J. Fridrich, "Image Steganography With [20] T. Rabie and M. Baziyad, "The Pixogram: Addressing High Payload
Symmetric Embedding Using Gaussian Markov Random Field Model," Demands for Video Steganography," IEEE Access, vol. 7, pp. 21948-
IEEE Transactions on Circuits and Systems for Video Technology, vol. 21962, 2019.
31, no. 3, pp. 1001-1015, March 2021. [21] S. Liu, B. Liu, Y. Hu and X. Zhao, "Non-Degraded Adaptive HEVC
[7] Meenu Suresh and I.Shatheesh Sam, "Optimized interesting region Steganography by Advanced Motion Vector Prediction," IEEE Signal
identification for video steganography using Fractional Grey Wolf Processing Letters, vol. 28, pp. 1843-1847, 2021.
Optimization along with multi-objective cost function," Journal of King [22] K. Wang, H. Zhao and H. Wang, "Video Steganalysis Against Motion
Saud University - Computer and Information Sciences, August 2020. Vector-Based Steganography by Adding or Subtracting One Motion
[8] X. Zhang, F. Peng and M. Long, "Robust Coverless Image Vector Value," IEEE Transactions on Information Forensics and
Steganography Based on DCT and LDA Topic Classification," IEEE Security, vol. 9, no. 5, pp. 741-751, May 2014.
Transactions on Multimedia, vol. 20, no. 12, pp. 3223-3238, Dec. 2018. [23] K. Tasdemir, F. Kurugollu and S. Sezer, "Spatio-Temporal Rich Model-
Based Video Steganalysis on Cross Sections of Motion Vector Planes,"
IEEE Transactions on Image Processing, vol. 25, no. 7, pp. 3316-3328, of Artificial Intelligence and Information Technology (ICAIIT), pp. 133-
July 2016. 137, 2019.
[24] X. Yi, K. Yang, X. Zhao, Y. Wang and H. Yu, "AHCM: Adaptive [28] M.E.H.Pedersen and A.J.Chipperfield, " Simplifying Particle Swarm
Huffman Code Mapping for Audio Steganography Based on Optimization", Applied Soft Computing, vol. 10, no. 2, pp. 618-628,
Psychoacoustic Model," IEEE Transactions on Information Forensics 2010.
and Security, vol. 14, no. 8, pp. 2217-2231, Aug. 2019. [29] Seyedali Mirjalili and Andrew Lewis, "The Whale Optimization
[25] Abdollahzadeh, B., Soleimanian Gharehchopogh, F., Mirjalili, S. Algorithm", Advances in Engineering Software, vol. 95, pp.51–67,
"Artificial gorilla troops optimizer: A new nature-inspired metaheuristic 2016.
algorithm for global optimization problems," International Journal of [30] Ravipudi Venkata Rao, "Jaya: A simple and new optimization algorithm
Intelligent Systems, vol. 36, issue. 10, pp. 5887–5958, 2021. for solving constrained and unconstrained optimization problems,"
[26] Q. P. Huu, T. H. Dinh, N. N. Tran, T. P. Van and T. T. Minh, "Deep International Journal of Industrial Engineering Computations, vol. 7,
Neural Networks based Invisible Steganography for Audio-into-Image issue. 1, pp. 19-34, 2016.
Algorithm," IEEE 8th Global Conference on Consumer Electronics [31] Nikhitha Keshava Murthy, Shardul Sharma, M. Jasmine Pemeena
(GCCE), pp. 423-427, 2019. Priyadarsini, Ravi Ranjan, Satyaki Sarkar & N. Sardar Basha "Image
[27] M. Anwar, M. Sarosa and E. Rohadi, "Audio Steganography Using Steganography Using Discrete Cosine Transform Algorithm for Medical
Lifting Wavelet Transform and Dynamic Key," International Conference Images," Advances in Automation, Signal Processing, Instrumentation,
and Control, pp. 2349–2358, 2021.

You might also like