A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

Mohamed Abdel Hameed, Omar A. Abdel-Aleem, M. Hassaballah

Research output: Contribution to journalArticlepeer-review

50 Scopus citations

Abstract

With remarkable information technology development, information security has become a major concern in the communication environment, where security must be performed for the multimedia messages exchanged between the sender and the intended recipient. Digital multimedia steganography techniques have been developed to attain a security for covert communication and secure data. This paper proposes an approach for image steganography using the Least Significant Bit Substitution (LSB) and Nature-Inspired Harris Hawks Optimization (HHO) algorithm for efficient concealing of the secret data inside a cover image; thus providing high confidentiality. The HHO based data encoding operation uses the PSNR visual quality metric as an objective function. The objective function is used to determine the ideal encoding vector to convert the secret message to its encoded form. The proposed approach performs better than other state-of-the-art methods in terms of standard measures of visual quality with maintaining high embedding capacity. Comparisons with existing LSB or multi-directional PVD embedding methods demonstrate that the proposed method has more optimized and higher embedding capacity with maintaining visual quality. Besides, the proposed approach achieves high security against statistical StegoExpose analysis, ALASKA2 deep learning steganalysis, and image processing attacks.

Original languageEnglish
Pages (from-to)4639-4657
Number of pages19
JournalJournal of Ambient Intelligence and Humanized Computing
Volume14
Issue number5
DOIs
StatePublished - May 2023

Keywords

  • Data hiding
  • Data security
  • Image steganography
  • Metaheuristic
  • Optimization algorithms

Fingerprint

Dive into the research topics of 'A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques'. Together they form a unique fingerprint.

Cite this