SlideShare a Scribd company logo
1 of 30
Download to read offline
An efficient image steganography
method using multiobjective
differential evolution
Digital media steganography(Fourth Season)
Providers :
Sima Abolhasani &
AydaMohammadi
Outline
Introduction
Literature review
Background
LSB substitution method
Differential evolution
The proposed method
Embedding process
Extraction process
Experimental results
Peak signal-to-noise ratio
Structural similarity index measure
Bit error rate
Conclusion
Refrences
2
Information hiding methods are decomposed into two
categories such as watermarking and steganography.
Introduction
Digital information includes text documents, digital
images, videos, and audio signals. The most popular
among them are cryptography, steganography, and
watermarking.
Cryptography protects themeaningful information
from attackers by converting it into unreadable form.
Cryptographic methods involve encryption, decryption,
and keys to make secure communication.
Watermarking is used to protect the integrity of
private information.
steganography is an another most popular method to
protect or hide the information.
It is also known as cover writing since it conceals the
presence of potential information inside an image,
audio, video, and text file.
3
Introduction
1. General model of cryptography
1 2
3
Encryption algorithms are
used to convert the plain
image into a cipher image
using secret keys.
The decryption algorithms
are used to retrieve the plain
image using the same secret
keys.
4
2.General model of image steganography.
The image that hides thesecret message is known as a ā€œcover imageā€.
The procedure used to hide the secret message inside the cover image is known as an
ā€œembedding methodā€.
The use of stego-key is optional and depends on the embedding method.
The final output of embedding process is a ā€œstegoimageā€, which hides the secret message.
3
4
1
2
5
In this chapter:
The reason to choose
differential evolution is its
good convergence speed and
lesser sticking in local optima
as compared to other
metaheuristic algorithms.
Propose a steganography
method based on the least
significant substitution(LSB)
method and differential
evolution.
Use differential evolution to
optimize the mask
assignment process.
1 3
2 4
In the LSB method the
process of mask assignment
for embedding a secret image
into a cover image is a
tedious task.
6
Literature review
3.Types of image steganography methods.
Image steganography
Secret data Format
Image Coded Format
RAw ( BMP , PNG )
Compressed
( JPEG 2000)
Encrypted
(AES based image)
Plain/RAW
Compressed
Encrypted
Compressed+Encrypted
7
Literature review
Zhang et al
Main Context Year
Auther
Zhou et al
Brandao and
Jorge
Wu et al
Zhang et al
Sarreshtedari
and Akhaee
Proposed a steganography method based on joint distortion capacity for binary images. 2016
Studied the effect of noise on optical steganography. 2016
2016
2016
2016
2016
Proposed an attacking method to extract the secret information and detect the stegoimages.
Presented an image steganography method using artificial neural networks.
Proposed a coverless image steganography to resist the steganalysis.
Proposed a method known as oneā€“third least significant bits embedding steganography
8
Zhang et al
Main Context Year
Auther
Rajput et al
Guo et al
Hu et al
Wu and
Wang
Zhang et al
Proposed a steganography method based on joint distortion capacity for binary images. 2016
Used generative adversarial networks to propose the steganography method without embedding. 2016
2016
2016
2016
2016
Implemented the data-hiding algorithm that uses secret image-sharing and
steganography methods.
Proposed a steganography method using a modification of uniform embedding.


Used reversible texture synthesis to implement the steganography.
Studied nonadditive distortion steganography using joint distortion.
Literature review
9
Background
LSB substitution method
Differential evolution:
1.
2.
Population initialization
Mutation
Recombination
Selection
Stopping criteria:
10
LSB substitution method
Least significant bit (LSB): is a very easy and simple method to hide the
secret information in a cover image.
In LSB steganography the least significant bits of cover imageare used to
hide the secret image.
4.Framework of least significant bit method
1
2
11
Differential evolution process
5.Differential evolution process.
Differential evolution (DE) provides
optimized solutions of the problems.
provides better convergence as compared
to other evolutionary algorithms.
can be implemented parallelly to
manage the computationally intensive
objective functions.
DE consists of the following steps to
obtain the optimal solution.
12
Differential
evolution
02 Mutation
03 Recombination
04 Selection
05 Stopping criteria
The initial population is randomly generated.
A donor solution is developed from three randomly
selected solutions.
Elements of solutions are combined to generate a trial
solution. It combines the elements of donor solution
obtained through mutation and target solution.
The best solution is selected on the basis of the fitness
function.
Population
initialization
01
The process of differential evolution is stopped on the basis of
some criteria such as the maximum number of generations,
acceptance error, number of fitness function evaluation.
13
The proposed method
Embedding process
Extraction process
1.
2.
14
Embedding process
05
04
02
A mask
assignment
number
presented reveals
the outcome.
01 03
This outcome is
represented with
a solution in DE.
Each aspect in a
solution presents
one assignment
of secret image to
be inserted into
the cover image.
For the n-mask of the
secret image, every
solution includes n
proportions
equivalent to n
masks.
Every is seen
just one time in
an assignment
list.
6. 8-Mask secret image with 16-mask cover image.
15
Embedding process
Decompose H and S into various s of size L.
Therefore the various s for H and S are
computed as:
7.Construction of stegoimage from the mask
assignment list.
1
Get full LSBs of the cover image and keep
them in array H.
2 Change the secret image to binary sequence
and keep in array S.
3
4 DE is then utilized to tune the allocation
list for embedding a secret image into the
cover image.
16
Embedding process
8.Optimization of mask assignment list using differential evolution.
17
In greedy selection, based on the comparison of the
sum of different bitsD, a new position is produced by
selecting each dimension from the assignment list of
old and neighboring solutions.
9.Exchanging information using greedy selection method.
The difference is evaluated as:
Embedding
process
18
Extraction process
Extraction of the embedded image is performed.
E
I
T
F
Initially, embedded image and hyperparameters obtained using the
differential evolution process are taken for extraction process.
Thereafter full LSB of the embedded image is obtained. A binary
sequence from the LSB is then obtained.
Finally, this binary sequence is converted to its actual form, that is, a
secret image.
19
Experimental
results
1.Peak signal-to-noise ratio
2.Structural similarity index measure
3.Bit error rate
20
Experimental
results
Various experiments are carried out to test the effectiveness of
the proposed method.
The proposed method is implemented in simulation
environment using MATLABĀ® 2017a.
To test the proposed method, well-known benchmark images
are used with size of 256 Ɨ256.
The proposed method is compared with the competitive
steganography methods:
Stirling transform-based image steganography (STS)
genetic algorithm-based image steganography (GAS)
modified logistic chaotic map-based image steganography (MLCM)
particle swarm optimization-based image steganography (PSOS)
1.
2.
3.
4.
21
10.Visual analysis of the proposed method. Visual analysis of benchmark gray and color images: (A) input
gray image, (B) embedded gray image, (C) stego input, (D) extracted image, (E) cover color image, (F)
embedded color image, (G) stego input, and (H) extracted imag
22
5.1 Peak signal-to-noise ratio
a.To quantitatively evaluate the visual quality of cover images of the proposedmethod,
peak signal-to-noise ratio (PSNR) [38] metric is evaluated.
b.PSNR is evaluated between stegoimage and cover image to assess the image quality as
follows:
23
24
5.2 Structural
similarity
index measure
11.Structural similarity index analysis for gray images.
Structural similarity index measure (SSIM) is used
evaluate the perceptual difference between cover
and stego images.
25
12. Structural similarity index analysis for color images.FIGURE
26
During transmission, the stegoimages may get infected from some type of noises
Thereforeit is necessary to check robustness of the proposed method against
distortion tolerance.
5.3 Bit error rate
13.Distortion analysis. Comparative analysis of extracted
images from noisy stegoimages using methods
(A) STS, (B) GAS, (C) MLCM, (D) PSOS, and (E) Proposed.
27
6.Conclusion
Steganography method using LSB
method and differential evolution.
Differential evolution is used to
optimize the mask assignment of LSB
method.
Using an optimized mask assignment
to hide the secret image into cover
image.
The experimental result analysis
shows that the proposed method has
better PSNR, SSIM, and BER than the
existing steganography methods.
It implies that it has a better
stegoimage quality, robustness against
noise attacks, and payload capacity.
28
[1] Manjit Kaur, Vijay Kumar, Parallel non-dominated sorting genetic algorithm-II-based image encryption technique, The
Imaging Science Journal 66 (8) (2018) 453ā€“462.
[2] Manjit Kaur, Vijay Kumar, A comprehensive review on image encryption techniques, Archives of ComputationalMethods
in Engineering (2018) 1ā€“29.
[3] Manjit Kaur, Vijay Kumar, Fourierā€“Mellin moment-based intertwining map for image encryption, Modern Physics Letters
B 32 (09) (2018) 1850115.
[4] Manjit Kaur, Vijay Kumar, Li Li, Color image encryption approach based on memetic differential evolution, Neural
Computing and Applications (2018) 1ā€“13.
[5] Manjit Kaur, Vijay Kumar, Beta chaotic map based image encryption using genetic algorithm, International Journal of
Bifurcation and Chaos 28 (11) (2018) 1850132.
[6] Mehdi Hussain, AinuddinWahid AbdulWahab, Yamani Idna Bin Idris, Anthony TS Ho, Ki-Hyun Jung, Image
steganography in spatial domain: a survey, Signal Processing. Image Communication 65 (2018)46ā€“66.
[7] Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs, Watermarking cryptographic
capabilities, SIAM Journal on Computing 47 (6) (2018) 2157ā€“2202.
[8] Muhammad Khan, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik, Image steganography using
uncorrelated color space and its application for security of visual contents in online social networks, Future Generation
Computer Systems 86 (2018) 951ā€“960.
[9] Shadi Elshare, Nameer N. El-Emam, Modified multi-level steganography to enhance data security, International Journal
of Communication Networks and Information Security 10 (3) (2018) 509.
[10] Junhong Zhang,Wei Lu, Xiaolin Yin,Wanteng Liu, Yuileong Yeung, Binary image steganography based on joint distortion
measurement, Journal of Visual Communication and Image Representation 58 (2019) 600ā€“605.
[11] Dipti Kapoor Sarmah, Anand J. Kulkarni, Improved cohort intelligenceā€”a high capacity, swift and secure approach on
JPEG image steganography, Journal of Information Security and Applications 45 (2019) 90ā€“106.
[12] B.Wu, M.P. Chang, B.J. Shastri, P.Y.Ma, P.R. Prucnal, Dispersion deployment and compensation for optical steganography
based on noise, IEEE Photonics Technology Letters 28 (4) (2016) 421ā€“424.
Refrences
29
THANK
you

More Related Content

What's hot

A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
Ā 
Av4102350358
Av4102350358Av4102350358
Av4102350358IJERA Editor
Ā 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Ā 
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...CSCJournals
Ā 
DCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image WatermarkingDCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image WatermarkingCSCJournals
Ā 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Ā 
An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...
An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...
An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...IJCSIS Research Publications
Ā 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
Ā 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAnkita Dubey
Ā 
Steganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture SynthesisSteganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture Synthesis1crore projects
Ā 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
Ā 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
Ā 

What's hot (18)

J017426467
J017426467J017426467
J017426467
Ā 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
Ā 
Av4102350358
Av4102350358Av4102350358
Av4102350358
Ā 
Q180304102109
Q180304102109Q180304102109
Q180304102109
Ā 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Ā 
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
An Image Steganography Algorithm Using Huffman and Interpixel Difference Enco...
Ā 
DCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image WatermarkingDCT and Simulink Based Realtime Robust Image Watermarking
DCT and Simulink Based Realtime Robust Image Watermarking
Ā 
M017427985
M017427985M017427985
M017427985
Ā 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
Ā 
An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...
An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...
An Efficient APOA Techniques For Generalized Residual Vector Quantization Bas...
Ā 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
Ā 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
Ā 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
Ā 
Steganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture SynthesisSteganography Using Reversible Texture Synthesis
Steganography Using Reversible Texture Synthesis
Ā 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
Ā 
G017444651
G017444651G017444651
G017444651
Ā 
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region
Ā 
G0210032039
G0210032039G0210032039
G0210032039
Ā 

Similar to An efficient DE-based image steganography method

Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
Ā 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
Ā 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
Ā 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Ā 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
Ā 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
Ā 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security byIJNSA Journal
Ā 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
Ā 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
Ā 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIRJET Journal
Ā 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
Ā 
Adaptive block-based pixel value differencing steganography
Adaptive block-based pixel value  differencing steganographyAdaptive block-based pixel value  differencing steganography
Adaptive block-based pixel value differencing steganographyOsama Hosam
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
Ā 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
Ā 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm basedIJNSA Journal
Ā 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
Ā 

Similar to An efficient DE-based image steganography method (20)

Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
Ā 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Ā 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
Ā 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
Ā 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
Ā 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
Ā 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security by
Ā 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Ā 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Ā 
C010511420
C010511420C010511420
C010511420
Ā 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
Ā 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
Ā 
Adaptive block-based pixel value differencing steganography
Adaptive block-based pixel value  differencing steganographyAdaptive block-based pixel value  differencing steganography
Adaptive block-based pixel value differencing steganography
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
Ā 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
Ā 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
Ā 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
Ā 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
Ā 
J017156874
J017156874J017156874
J017156874
Ā 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
Ā 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
Gurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort service
Gurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort serviceGurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort service
Gurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort servicejennyeacort
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”soniya singh
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
Ā 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
Ā 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
Ā 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Ā 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Ā 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
Ā 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Gurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort service
Gurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort serviceGurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort service
Gurgaon āœ”ļø9711147426āœØCall In girls Gurgaon Sector 51 escort service
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Ā 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Ā 
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Ā 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Ā 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Ā 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
Ā 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
Ā 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Ā 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Ā 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Ā 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Ā 

An efficient DE-based image steganography method

  • 1. An efficient image steganography method using multiobjective differential evolution Digital media steganography(Fourth Season) Providers : Sima Abolhasani & AydaMohammadi
  • 2. Outline Introduction Literature review Background LSB substitution method Differential evolution The proposed method Embedding process Extraction process Experimental results Peak signal-to-noise ratio Structural similarity index measure Bit error rate Conclusion Refrences 2
  • 3. Information hiding methods are decomposed into two categories such as watermarking and steganography. Introduction Digital information includes text documents, digital images, videos, and audio signals. The most popular among them are cryptography, steganography, and watermarking. Cryptography protects themeaningful information from attackers by converting it into unreadable form. Cryptographic methods involve encryption, decryption, and keys to make secure communication. Watermarking is used to protect the integrity of private information. steganography is an another most popular method to protect or hide the information. It is also known as cover writing since it conceals the presence of potential information inside an image, audio, video, and text file. 3
  • 4. Introduction 1. General model of cryptography 1 2 3 Encryption algorithms are used to convert the plain image into a cipher image using secret keys. The decryption algorithms are used to retrieve the plain image using the same secret keys. 4
  • 5. 2.General model of image steganography. The image that hides thesecret message is known as a ā€œcover imageā€. The procedure used to hide the secret message inside the cover image is known as an ā€œembedding methodā€. The use of stego-key is optional and depends on the embedding method. The final output of embedding process is a ā€œstegoimageā€, which hides the secret message. 3 4 1 2 5
  • 6. In this chapter: The reason to choose differential evolution is its good convergence speed and lesser sticking in local optima as compared to other metaheuristic algorithms. Propose a steganography method based on the least significant substitution(LSB) method and differential evolution. Use differential evolution to optimize the mask assignment process. 1 3 2 4 In the LSB method the process of mask assignment for embedding a secret image into a cover image is a tedious task. 6
  • 7. Literature review 3.Types of image steganography methods. Image steganography Secret data Format Image Coded Format RAw ( BMP , PNG ) Compressed ( JPEG 2000) Encrypted (AES based image) Plain/RAW Compressed Encrypted Compressed+Encrypted 7
  • 8. Literature review Zhang et al Main Context Year Auther Zhou et al Brandao and Jorge Wu et al Zhang et al Sarreshtedari and Akhaee Proposed a steganography method based on joint distortion capacity for binary images. 2016 Studied the effect of noise on optical steganography. 2016 2016 2016 2016 2016 Proposed an attacking method to extract the secret information and detect the stegoimages. Presented an image steganography method using artificial neural networks. Proposed a coverless image steganography to resist the steganalysis. Proposed a method known as oneā€“third least significant bits embedding steganography 8
  • 9. Zhang et al Main Context Year Auther Rajput et al Guo et al Hu et al Wu and Wang Zhang et al Proposed a steganography method based on joint distortion capacity for binary images. 2016 Used generative adversarial networks to propose the steganography method without embedding. 2016 2016 2016 2016 2016 Implemented the data-hiding algorithm that uses secret image-sharing and steganography methods. Proposed a steganography method using a modification of uniform embedding. Used reversible texture synthesis to implement the steganography. Studied nonadditive distortion steganography using joint distortion. Literature review 9
  • 10. Background LSB substitution method Differential evolution: 1. 2. Population initialization Mutation Recombination Selection Stopping criteria: 10
  • 11. LSB substitution method Least significant bit (LSB): is a very easy and simple method to hide the secret information in a cover image. In LSB steganography the least significant bits of cover imageare used to hide the secret image. 4.Framework of least significant bit method 1 2 11
  • 12. Differential evolution process 5.Differential evolution process. Differential evolution (DE) provides optimized solutions of the problems. provides better convergence as compared to other evolutionary algorithms. can be implemented parallelly to manage the computationally intensive objective functions. DE consists of the following steps to obtain the optimal solution. 12
  • 13. Differential evolution 02 Mutation 03 Recombination 04 Selection 05 Stopping criteria The initial population is randomly generated. A donor solution is developed from three randomly selected solutions. Elements of solutions are combined to generate a trial solution. It combines the elements of donor solution obtained through mutation and target solution. The best solution is selected on the basis of the fitness function. Population initialization 01 The process of differential evolution is stopped on the basis of some criteria such as the maximum number of generations, acceptance error, number of fitness function evaluation. 13
  • 14. The proposed method Embedding process Extraction process 1. 2. 14
  • 15. Embedding process 05 04 02 A mask assignment number presented reveals the outcome. 01 03 This outcome is represented with a solution in DE. Each aspect in a solution presents one assignment of secret image to be inserted into the cover image. For the n-mask of the secret image, every solution includes n proportions equivalent to n masks. Every is seen just one time in an assignment list. 6. 8-Mask secret image with 16-mask cover image. 15
  • 16. Embedding process Decompose H and S into various s of size L. Therefore the various s for H and S are computed as: 7.Construction of stegoimage from the mask assignment list. 1 Get full LSBs of the cover image and keep them in array H. 2 Change the secret image to binary sequence and keep in array S. 3 4 DE is then utilized to tune the allocation list for embedding a secret image into the cover image. 16
  • 17. Embedding process 8.Optimization of mask assignment list using differential evolution. 17
  • 18. In greedy selection, based on the comparison of the sum of different bitsD, a new position is produced by selecting each dimension from the assignment list of old and neighboring solutions. 9.Exchanging information using greedy selection method. The difference is evaluated as: Embedding process 18
  • 19. Extraction process Extraction of the embedded image is performed. E I T F Initially, embedded image and hyperparameters obtained using the differential evolution process are taken for extraction process. Thereafter full LSB of the embedded image is obtained. A binary sequence from the LSB is then obtained. Finally, this binary sequence is converted to its actual form, that is, a secret image. 19
  • 20. Experimental results 1.Peak signal-to-noise ratio 2.Structural similarity index measure 3.Bit error rate 20
  • 21. Experimental results Various experiments are carried out to test the effectiveness of the proposed method. The proposed method is implemented in simulation environment using MATLABĀ® 2017a. To test the proposed method, well-known benchmark images are used with size of 256 Ɨ256. The proposed method is compared with the competitive steganography methods: Stirling transform-based image steganography (STS) genetic algorithm-based image steganography (GAS) modified logistic chaotic map-based image steganography (MLCM) particle swarm optimization-based image steganography (PSOS) 1. 2. 3. 4. 21
  • 22. 10.Visual analysis of the proposed method. Visual analysis of benchmark gray and color images: (A) input gray image, (B) embedded gray image, (C) stego input, (D) extracted image, (E) cover color image, (F) embedded color image, (G) stego input, and (H) extracted imag 22
  • 23. 5.1 Peak signal-to-noise ratio a.To quantitatively evaluate the visual quality of cover images of the proposedmethod, peak signal-to-noise ratio (PSNR) [38] metric is evaluated. b.PSNR is evaluated between stegoimage and cover image to assess the image quality as follows: 23
  • 24. 24
  • 25. 5.2 Structural similarity index measure 11.Structural similarity index analysis for gray images. Structural similarity index measure (SSIM) is used evaluate the perceptual difference between cover and stego images. 25
  • 26. 12. Structural similarity index analysis for color images.FIGURE 26
  • 27. During transmission, the stegoimages may get infected from some type of noises Thereforeit is necessary to check robustness of the proposed method against distortion tolerance. 5.3 Bit error rate 13.Distortion analysis. Comparative analysis of extracted images from noisy stegoimages using methods (A) STS, (B) GAS, (C) MLCM, (D) PSOS, and (E) Proposed. 27
  • 28. 6.Conclusion Steganography method using LSB method and differential evolution. Differential evolution is used to optimize the mask assignment of LSB method. Using an optimized mask assignment to hide the secret image into cover image. The experimental result analysis shows that the proposed method has better PSNR, SSIM, and BER than the existing steganography methods. It implies that it has a better stegoimage quality, robustness against noise attacks, and payload capacity. 28
  • 29. [1] Manjit Kaur, Vijay Kumar, Parallel non-dominated sorting genetic algorithm-II-based image encryption technique, The Imaging Science Journal 66 (8) (2018) 453ā€“462. [2] Manjit Kaur, Vijay Kumar, A comprehensive review on image encryption techniques, Archives of ComputationalMethods in Engineering (2018) 1ā€“29. [3] Manjit Kaur, Vijay Kumar, Fourierā€“Mellin moment-based intertwining map for image encryption, Modern Physics Letters B 32 (09) (2018) 1850115. [4] Manjit Kaur, Vijay Kumar, Li Li, Color image encryption approach based on memetic differential evolution, Neural Computing and Applications (2018) 1ā€“13. [5] Manjit Kaur, Vijay Kumar, Beta chaotic map based image encryption using genetic algorithm, International Journal of Bifurcation and Chaos 28 (11) (2018) 1850132. [6] Mehdi Hussain, AinuddinWahid AbdulWahab, Yamani Idna Bin Idris, Anthony TS Ho, Ki-Hyun Jung, Image steganography in spatial domain: a survey, Signal Processing. Image Communication 65 (2018)46ā€“66. [7] Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs, Watermarking cryptographic capabilities, SIAM Journal on Computing 47 (6) (2018) 2157ā€“2202. [8] Muhammad Khan, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik, Image steganography using uncorrelated color space and its application for security of visual contents in online social networks, Future Generation Computer Systems 86 (2018) 951ā€“960. [9] Shadi Elshare, Nameer N. El-Emam, Modified multi-level steganography to enhance data security, International Journal of Communication Networks and Information Security 10 (3) (2018) 509. [10] Junhong Zhang,Wei Lu, Xiaolin Yin,Wanteng Liu, Yuileong Yeung, Binary image steganography based on joint distortion measurement, Journal of Visual Communication and Image Representation 58 (2019) 600ā€“605. [11] Dipti Kapoor Sarmah, Anand J. Kulkarni, Improved cohort intelligenceā€”a high capacity, swift and secure approach on JPEG image steganography, Journal of Information Security and Applications 45 (2019) 90ā€“106. [12] B.Wu, M.P. Chang, B.J. Shastri, P.Y.Ma, P.R. Prucnal, Dispersion deployment and compensation for optical steganography based on noise, IEEE Photonics Technology Letters 28 (4) (2016) 421ā€“424. Refrences 29