Developing an adaptive DCT-based steganography method using a genetic algorithm
Steganography is an appropriate approach to establish a secure connection between the sender and the receiver. Data embedding in Discrete Cosine Transform (DCT) coefficients for JPEG images is one of the most practical approaches nowadays. In this paper, a new method called GA-Shield is proposed, in...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2023-05, Vol.82 (13), p.19323-19346 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 19346 |
---|---|
container_issue | 13 |
container_start_page | 19323 |
container_title | Multimedia tools and applications |
container_volume | 82 |
creator | Sabeti, Vajiheh Aghabagheri, Adeleh |
description | Steganography is an appropriate approach to establish a secure connection between the sender and the receiver. Data embedding in Discrete Cosine Transform (DCT) coefficients for JPEG images is one of the most practical approaches nowadays. In this paper, a new method called GA-Shield is proposed, in which, instead of using fixed embedding capacity, embedding a different number of bits in the quantized DCT coefficients according to the magnitude of the coefficient is used to spread bits of secret message in the most suitable coefficients. In addition, this method uses a genetic algorithm to minimize the distortion due to embedding. This minimization is performed by deciding on the best formula to calculate coefficient value after embedding. In this phase, PSNR is used as the metric to measure the amount of distortion in the cover image to produce the stego image. As these changes decrease, the value of PSNR would be optimized, and the stego image would have better quality. The proposed method can embed 300 to 20,000 bits of data (on average) in the cover image and produce the stego image with a PSNR value in the range of 65 to 40 and a SSIM value of more than 0.985. The consequences of comparisons with the state-of-the-art show that despite the fact that the proposed technique has less embedding capacity than some of the current ones, the superiority of stego image quality and security of the proposed technique, mainly at low embedding levels, is significant. |
doi_str_mv | 10.1007/s11042-022-14166-3 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2804512988</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2804512988</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-57a349cbe497c5ceae7ecd6cf06dc1d2c1d697a96f7481061147bfc4273f73063</originalsourceid><addsrcrecordid>eNp9kD1rwzAQhkVpoWnaP9BJ0FmtTpIleyxJvyCQJZ2FIp8dh8R2JSWQf183LnTrcNwN7_MePITcA38Ezs1TBOBKMC4EAwVaM3lBJpAZyYwRcDncMufMZByuyU2MW85BZ0JNyHKOR9x1fdPW1LXUla5PzRHpfLZiaxexpDFh7dquDq7fnOge06Yr6SGeAVpji6nx1O3qLjRps78lV5XbRbz73VPy-fqymr2zxfLtY_a8YF5CkVhmnFSFX6MqjM88OjToS-0rrksPpRhGF8YVujIqB64BlFlXXgkjKyO5llPyMPb2ofs6YEx22x1CO7y0IucqA1Hk-ZASY8qHLsaAle1Ds3fhZIHbH3F2FGcHcfYszsoBkiMUh3BbY_ir_of6Bn_vcII</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2804512988</pqid></control><display><type>article</type><title>Developing an adaptive DCT-based steganography method using a genetic algorithm</title><source>SpringerLink Journals</source><creator>Sabeti, Vajiheh ; Aghabagheri, Adeleh</creator><creatorcontrib>Sabeti, Vajiheh ; Aghabagheri, Adeleh</creatorcontrib><description>Steganography is an appropriate approach to establish a secure connection between the sender and the receiver. Data embedding in Discrete Cosine Transform (DCT) coefficients for JPEG images is one of the most practical approaches nowadays. In this paper, a new method called GA-Shield is proposed, in which, instead of using fixed embedding capacity, embedding a different number of bits in the quantized DCT coefficients according to the magnitude of the coefficient is used to spread bits of secret message in the most suitable coefficients. In addition, this method uses a genetic algorithm to minimize the distortion due to embedding. This minimization is performed by deciding on the best formula to calculate coefficient value after embedding. In this phase, PSNR is used as the metric to measure the amount of distortion in the cover image to produce the stego image. As these changes decrease, the value of PSNR would be optimized, and the stego image would have better quality. The proposed method can embed 300 to 20,000 bits of data (on average) in the cover image and produce the stego image with a PSNR value in the range of 65 to 40 and a SSIM value of more than 0.985. The consequences of comparisons with the state-of-the-art show that despite the fact that the proposed technique has less embedding capacity than some of the current ones, the superiority of stego image quality and security of the proposed technique, mainly at low embedding levels, is significant.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-022-14166-3</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Coefficients ; Computer Communication Networks ; Computer Science ; Data Structures and Information Theory ; Discrete cosine transform ; Distortion ; Embedding ; Genetic algorithms ; Image compression ; Image quality ; Multimedia Information Systems ; Special Purpose and Application-Based Systems ; Steganography</subject><ispartof>Multimedia tools and applications, 2023-05, Vol.82 (13), p.19323-19346</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-57a349cbe497c5ceae7ecd6cf06dc1d2c1d697a96f7481061147bfc4273f73063</citedby><cites>FETCH-LOGICAL-c319t-57a349cbe497c5ceae7ecd6cf06dc1d2c1d697a96f7481061147bfc4273f73063</cites><orcidid>0000-0002-9985-9143</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-022-14166-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-022-14166-3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Sabeti, Vajiheh</creatorcontrib><creatorcontrib>Aghabagheri, Adeleh</creatorcontrib><title>Developing an adaptive DCT-based steganography method using a genetic algorithm</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Steganography is an appropriate approach to establish a secure connection between the sender and the receiver. Data embedding in Discrete Cosine Transform (DCT) coefficients for JPEG images is one of the most practical approaches nowadays. In this paper, a new method called GA-Shield is proposed, in which, instead of using fixed embedding capacity, embedding a different number of bits in the quantized DCT coefficients according to the magnitude of the coefficient is used to spread bits of secret message in the most suitable coefficients. In addition, this method uses a genetic algorithm to minimize the distortion due to embedding. This minimization is performed by deciding on the best formula to calculate coefficient value after embedding. In this phase, PSNR is used as the metric to measure the amount of distortion in the cover image to produce the stego image. As these changes decrease, the value of PSNR would be optimized, and the stego image would have better quality. The proposed method can embed 300 to 20,000 bits of data (on average) in the cover image and produce the stego image with a PSNR value in the range of 65 to 40 and a SSIM value of more than 0.985. The consequences of comparisons with the state-of-the-art show that despite the fact that the proposed technique has less embedding capacity than some of the current ones, the superiority of stego image quality and security of the proposed technique, mainly at low embedding levels, is significant.</description><subject>Coefficients</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Data Structures and Information Theory</subject><subject>Discrete cosine transform</subject><subject>Distortion</subject><subject>Embedding</subject><subject>Genetic algorithms</subject><subject>Image compression</subject><subject>Image quality</subject><subject>Multimedia Information Systems</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Steganography</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kD1rwzAQhkVpoWnaP9BJ0FmtTpIleyxJvyCQJZ2FIp8dh8R2JSWQf183LnTrcNwN7_MePITcA38Ezs1TBOBKMC4EAwVaM3lBJpAZyYwRcDncMufMZByuyU2MW85BZ0JNyHKOR9x1fdPW1LXUla5PzRHpfLZiaxexpDFh7dquDq7fnOge06Yr6SGeAVpji6nx1O3qLjRps78lV5XbRbz73VPy-fqymr2zxfLtY_a8YF5CkVhmnFSFX6MqjM88OjToS-0rrksPpRhGF8YVujIqB64BlFlXXgkjKyO5llPyMPb2ofs6YEx22x1CO7y0IucqA1Hk-ZASY8qHLsaAle1Ds3fhZIHbH3F2FGcHcfYszsoBkiMUh3BbY_ir_of6Bn_vcII</recordid><startdate>20230501</startdate><enddate>20230501</enddate><creator>Sabeti, Vajiheh</creator><creator>Aghabagheri, Adeleh</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-9985-9143</orcidid></search><sort><creationdate>20230501</creationdate><title>Developing an adaptive DCT-based steganography method using a genetic algorithm</title><author>Sabeti, Vajiheh ; Aghabagheri, Adeleh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-57a349cbe497c5ceae7ecd6cf06dc1d2c1d697a96f7481061147bfc4273f73063</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Coefficients</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Data Structures and Information Theory</topic><topic>Discrete cosine transform</topic><topic>Distortion</topic><topic>Embedding</topic><topic>Genetic algorithms</topic><topic>Image compression</topic><topic>Image quality</topic><topic>Multimedia Information Systems</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Steganography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sabeti, Vajiheh</creatorcontrib><creatorcontrib>Aghabagheri, Adeleh</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sabeti, Vajiheh</au><au>Aghabagheri, Adeleh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Developing an adaptive DCT-based steganography method using a genetic algorithm</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2023-05-01</date><risdate>2023</risdate><volume>82</volume><issue>13</issue><spage>19323</spage><epage>19346</epage><pages>19323-19346</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Steganography is an appropriate approach to establish a secure connection between the sender and the receiver. Data embedding in Discrete Cosine Transform (DCT) coefficients for JPEG images is one of the most practical approaches nowadays. In this paper, a new method called GA-Shield is proposed, in which, instead of using fixed embedding capacity, embedding a different number of bits in the quantized DCT coefficients according to the magnitude of the coefficient is used to spread bits of secret message in the most suitable coefficients. In addition, this method uses a genetic algorithm to minimize the distortion due to embedding. This minimization is performed by deciding on the best formula to calculate coefficient value after embedding. In this phase, PSNR is used as the metric to measure the amount of distortion in the cover image to produce the stego image. As these changes decrease, the value of PSNR would be optimized, and the stego image would have better quality. The proposed method can embed 300 to 20,000 bits of data (on average) in the cover image and produce the stego image with a PSNR value in the range of 65 to 40 and a SSIM value of more than 0.985. The consequences of comparisons with the state-of-the-art show that despite the fact that the proposed technique has less embedding capacity than some of the current ones, the superiority of stego image quality and security of the proposed technique, mainly at low embedding levels, is significant.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-022-14166-3</doi><tpages>24</tpages><orcidid>https://orcid.org/0000-0002-9985-9143</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2023-05, Vol.82 (13), p.19323-19346 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2804512988 |
source | SpringerLink Journals |
subjects | Coefficients Computer Communication Networks Computer Science Data Structures and Information Theory Discrete cosine transform Distortion Embedding Genetic algorithms Image compression Image quality Multimedia Information Systems Special Purpose and Application-Based Systems Steganography |
title | Developing an adaptive DCT-based steganography method using a genetic algorithm |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T14%3A02%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Developing%20an%20adaptive%20DCT-based%20steganography%20method%20using%20a%20genetic%20algorithm&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Sabeti,%20Vajiheh&rft.date=2023-05-01&rft.volume=82&rft.issue=13&rft.spage=19323&rft.epage=19346&rft.pages=19323-19346&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-022-14166-3&rft_dat=%3Cproquest_cross%3E2804512988%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2804512988&rft_id=info:pmid/&rfr_iscdi=true |