Competitive Swarm Optimization with Encryption Based Steganography for Digital Image Security
2022-08-24AlaEshmawiSulimanAlsuhibanySayedAbdelKhalekandRomanyMansour
Ala’A.Eshmawi,Suliman A.Alsuhibany,Sayed Abdel-Khalek and Romany F.Mansour
1Department of Cybersecurity,College of Computer Science and Engineering,University of Jeddah,Jeddah,Saudi Arabia
2Department of Computer Science,College of Computer,Qassim University,Buraydah,51452,Saudi Arabia
3Department of Mathematics,College of Science,Taif University,Taif,21944,Saudi Arabia
4Department of Mathematics,Faculty of Science,New Valley University,El-Kharga,72511,Egypt
Abstract: Digital image security is a fundamental and tedious process on shared communication channels.Several methods have been employed for accomplishing security on digital image transmission,such as encryption,steganography,and watermarking.Image stenography and encryption are commonly used models to achieve improved security.Besides,optimal pixel selection process (OPSP) acts as a vital role in the encryption process.With this motivation,this study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption(DCDIE)technique to encrypt the secret image,and then embedding method was implemented.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and the results reported the betterment of the CSOES-DIS model based on different measures.
Keywords: Image security;optimal pixel selection;encryption;metaheuristics;image steganography
1 Introduction
A Cryptography system is applied to encrypt the private information prior to embed inside the cover files.Image Steganography is exploited to hide information in an image [1].Next,image selected for this act is called a cover-image,and image accomplished afterward steganography is denoted as stego-image.In Cryptography,2 stages are comprised as Encryption and Decryption[2].At first,encryption is determined as a procedure utilized for transforming the secret messages into an opaque format called cipher-text.Steganography is the task of hiding private messages by hiding their existence.In case of digital steganography,secured messages are covered with audio,image,video,etc.In general,image is employed for cover media since the individual transmit digital images via internet communication and email schemes[3].The authors didn’t focus more on the problems such as when cover image dimension is unsuitable for creating image block to embed for performing information hiding and either this technique is prone to different kinds of stego attack [4].Therefore,further methods needed to be applied namely modification to least amount of pixels or convert coefficient,usage of encrypted form of private message to be implanted [5].Though,several works are needed for choosing appropriate trade-offs among the efficiency metrics like payload capacity,security,and imperceptibility.Now,secure information is transferred through text messages,images,videos,and audio files[6-8].To forward this message in a hidden means,there is necessity for steganography.In the method,the embedded messages in the file are transported to the user at another end,whereby the message is unconcealed[9].Though there are several software accessible online for data security,there is another software that can be used by hackers to decipher the secreted information[10].Fig.1 illustrates the process in image steganography.
Figure 1:Process in image steganography
Parvees et al.[11]proposed an effective hybridization of fruit fly optimization(FFO)algorithm and Cat Swarm optimization algorithm(CSO)using ECC for image security,called CSO-FFO-ECC method.The presented approach implements the encryption and decryption method through ECC approach.Also,to minimize the computational time required for the arbitrary choice of the private and public keys,the suggested method employs a hybridization of CSO and FFO algorithm for optimum key choice.Hassaballah et al.[12]designed an approach named Harris hawks optimizationinteger wavelet transform (HHO-IWT) for converting transmission and secured information from the IIoT environments related to digital image steganography.The approach embedded confidential information from the cover image with a metaheuristic optimization approach named HHO for effectively selecting image pixel that is utilized for hiding bits of secreted information with integer wavelet transform.The HHO-based pixel selection process utilizes a main functional assessment based on the subsequent two stages:exploration and exploitation phases.
Manjunath et al.[13]developed the audio steganography method for secured audio communication based on the metaheuristic model.In the embedding stage,the enhanced immediate selection is performed to embed the confidential message as to input audio.Moreover,the secreted messages that embedding was encoded by the enhanced 2D-Logistic Chaotic Map.The researchers in [14]presented an image Steganography with Secreted Share cryptography(SSC)was taken into account for upgrading the security level,now healthcare image is taken into account for stego image formation method.During the wake of inserting of secreted information with cover image Optimal Discrete Wavelet Transform (DWT) utilized for converting the region,now Daubechies (db2) coefficient is employed,additionally,upgrade the PSNR Continual Harmony Search(CHS)applied for enhancing this coefficient.Finally,SS is performed for low band stego images with higher security procedures.Pandey [15]developed a bit mask oriented genetic approach (BMOGA) related secured medicinal data communication approach.The presented approach is employed for minimizing the replication of medicinal test data that is transported over organization.Healthcare information is taken into account as highly sensitive,thus secured medicinal data communication is essential.BOMGA exploits Boolean related mask-fill operator and performs reproduction operation in two distinct stages which assist in avoiding premature convergences.
This study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption (DCDIE) technique to encrypt the secret image,and then embedded procedure was executed.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and results are investigated under several measures.
2 The Proposed Model
This study designs a new competitive swarm optimization with encryption based stenographic technique for digital image security,named CSOES-DIS technique.The proposed CSOES-DIS model aims to encrypt the secret image prior to the embedding process.In addition,the CSOES-DIS model applies a double chaotic digital image encryption (DCDIE) technique to encrypt the secret image,and then embedded method was executed.Also,the OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.
2.1 Encryption Using DCDIE Technique
At the initial stage,the secret image is encrypted by the use of DCDIE technique.To cryptographic structure of digital images,the plaintext space P is equivalent to group of pixels of a novel digital image which requires that encryption,and ciphertext spaces C equivalent to group of image pixels afterward the encrypted.The ciphertext spaces C obtianed with plaintext space P afterward encrypted is transferred from insecure channels.The keyKis important to apply encrypt and decrypt transformed operations[16].A similar key can be utilized to distinct encryption as well as decryption keys based on the selectively encrypted technique,or distinct keys are utilized.During the key space {K},the control execution of encryption technique was recognized that is a space collected of fundamental data grasped by combined of plaintext as well as ciphertext spaces.These 2 chaotic series generators contained from the encrypted and decrypted procedures are the key elements of encrypted method.It can be responsible to realized of image encryption technique of the method.It can be executed by 2 chaotic maps,thus it is named as double chaotic digital image encrypt method,and other elements mostly contain the encryption as well as decryption element and broadcast component.
Encryption and decryption modules
An image encryption procedure of double chaotic digital image encrypts technique comprises of 2 procedures of confusion as well as scrambling procedure [16].The confusion method is for XOR the pixel matrix of images with amount of pseudo-random order X and the scrambling approach is also handled by pseudo-random order information attained by logistic chaotic map.The confusion technique is as follows:
• Submitting the primary valuesaandbfor pseudorandom sequence number(PSN)computation method,and fixed the computation parameterμ1=3 of L1 for calculating the PSNX.
• Compute each element of PSN from(xi×256)mod256,afterward converts the computed outcome as binary,so achieving a binaryM×Nlong series number.
• Develop the pixel gray/color modules order of digital images that encryption and obtain the gray/color elements order vector G of digital images.
• In order to the primary elementgifromG,XOR was executed based onX′⊕gi.To succeeding element fromG,it can be computed based on the subsequent equation:
wherekimplies thekpixel from the image.
• Reversed the pixel sequence gained from the 4th step,change the novelM×Nelement to primary place,and alter the novelM×(N-1)element to secondary place.Next,based on Eq.(1),the secondary obfuscation procedure was implemented.
An image scrambling technique is as follows:
• Utilizing the PSNXof confusion approach as last setXof PSN.
• Utilizing the vectorYattained from preceding stage and the encrypting imageI′afterward the confusion procedure,the pixel was scrambling toI′.Specifically,the gray value ofithpixel as well as gray values ofyith pixel fromI′is replaced.
• TheIwas homogenization and empty vectorsYofM×Nsize is fixed,and X equivalent component is extended for integers domain space of(0,M×N)based on homogenized ofXcomponent,and the outcome was expressed to vectorY.
• The outcome of scrambling was over exposed for round of positive as well as revering sequences confusions based on the 4th and 5th steps from the confusion approach,so attaining the last encrypt imageI′′.
As per scrambling and confusion procedure,the double chaotic digital image encrypts method adapts the technique of primary confusing and afterward scrambled for encrypting images.The procedure of images decrypted was carried out by primary scrambling afterward confusion,and the function was inverse function of the above procedure.During the case of confusion inverse procedure,the succeeding techniques were utilized.
2.2 CSO Based Pixel Selection Approach
In order to embed the secret image into the cover image,the optimal pixels are chosen by the design of CSO algorithm.CSO is the latest SI based technique,fundamentally simulated in PSO approach,but the model is extremely complex in typical PSO.During the CSO neither individual optimum nor global optimum are involved from the place upgrade process of particles.Assume thatnamount of particles,S(t)refers to that primary swarm.All the particles refer the potential solution.In order to all particles dimensionalDis similar.The swarmS(t)hasnparticles,from all iterationsn/2 pairs are arbitrarily assigned,and then competition was developed amongst 2 from all the pairs of particles[17].Thus the outcome of competition,the particle containing optimum fitness value,henceforth named as ‘winner’,is distributed directly to next iteration of swarms,S(t+1),but the particle which loses the competition named as‘loser’,is upgrading their velocity and position by learning in the winner.During all iterations,a particle contains after that competition.Specifically,to a swarm size ofn,n/2 competition takes place and both namely velocity as well as position,ofn/2 particles are only be upgraded.Assume that represent the velocity as well as position of winner and loser frommthround of competitions from the iterationtwithVw,m(t),Vl,m(t),andXw,m(t),Xl,m(t)correspondingly,wherem=1,2,3,...,n/2.Fig.2 demonstrates the search process of CSO technique.
Figure 2:Search process of CSO algorithm
Based on the fundamental model of CSO,afterwardmthround of competitions the velocity as well as position of losers are upgraded utilizing subsequent learning methods:
where,r1(m,t),r2(m,t)andr3(m,t)∈[0,1]and(t)implies the mean position is determined from 2 approaches are global and local means represented as(t)-andXg l (t).Xgm(t)implies the global mean place of every particle,but(t)-signifies the local mean of existing neighborhood of particlesk.φexist the parameter that controls the effect of(t).
In order to optimum knowledge of CSO,it can project any connected comparative with PSO as follows[17]:
• A primary partr1(m,t)×Vl,m(t)is same as inertia term from typical PSO that balances the movement of swarms,the only variance is inertia weightwwhich is exchanged by an arbitrary vectorr1(m,t)from CSO technique.
• The secondary partr2(m,t)×is same as the cognitive element from typical PSO technique,but,it can be conceptually extremely complex in typical PSO technique,the particle loses their competition learned in winner,before their individual optimum initiate to this point.This technique was further possible but inspiring performance of swarm,as it can be hard for remembering their individual optimum experience to this point.
• The tertiary partr3(m,t)×is identical to the social element from typical PSO,but,particle lose competition learned in the mean position insteadgbestfrom typical PSO,no memory has needed that is further possible biologically.
The FF was utilized to validate the quality of particles.The purpose of CSO is for finding the particle position which outcome optimum estimation of provided FF.All the particles are allocated with an arbitrary position as well as velocity from the initialized procedure of CSO technique.In CSO technique is most recent swarm optimized techniques dependent upon PSO.The CSO algorithm has derived a fitness function involving the maximization of PSNR.It can be represented as follows.
2.3 Embedding and Extraction Process
For a provided covered image C,the encoding confidential communication ES was hidden as to cover image as follows.Primary,an IWT procedure was employed for transforming C in their spatial domain as to the frequency domains.The outcome of alteration was subdivision of images as to 4 subblocks(subbands)determined as high low(HL),high high(HH),low low(LL),and low high(LH),whereas ES is only embedding from the LH,HL,and HH subblocks askbits from the k-LSBs of all pixels.Afterward hiding every confidential information from the particular subbands,the subband was fed as to OPAP for minimizing the variance amongst the altered coefficients and novel ones.
Afterward,the inverse transformation procedure of IWT was shown for combining the subbands composed again and creating the stegoimage.For removing the confidential communication,the stegoimage was transformed to frequency domain utilizing IWT.Afterward,thekleast significant bits are removed in all pixels of LH,HL,and HH subbands.The removed bits are encoder procedure ES.It can be decoder removal bits with encoder vector Ev for obtaining novel bits.Eventually,the bits are transformed for obtaining the confidential image S.
3 Experimental Validation
The experimental result analysis of the CSOES-DIS model is performed using benchmark images.The results are investigated interms of distinct measures.Some sample images are shown in Fig.3.
Figure 3:(Continued)
Figure 3:Sample test images
Tab.1 and Fig.4 report the overall outcomes offered by the CSOES-DIS model for distinct cover and secret images.The experimental outcomes indicated that the CSOES-DIS model has accomplished effectual outcomes under all images.For instance,with cover image as ‘Lena’and secret image as‘Lena’,the CSOES-DIS model has attained MSE of 0.1400,RMSE of 0.3742,PSNR of 56.6695 dB,SSIM of 0.9984,and QI of 1.0000.Next,with cover image as‘Jet’and secret image as‘Jet’,the CSOESDIS model has attained MSE of 0.1800,RMSE of 0.4243,PSNR of 55.5781 dB,SSIM of 0.9983,and QI of 1.0000.In line with,with cover image as ‘Boat’and secret image as ‘Boat’,the CSOES-DIS model has attained MSE of 0.2000,RMSE of 0.4472,PSNR of 55.1205 dB,SSIM of 0.9980,and QI of 1.0000.
Table 1:Overall steganography result analysis of CSOES-DIS model
Figure 4:Steganography and encryption results of CSOES-DIS model
A brief computation time(CT)examination of the CSOES-DIS model is inspected under distinct cover images interms of embedding time(EBT),extraction time(EXT),and total time(TT)in Tab.2 and Fig.5.The results indicated that the CSOES-DIS model has gained minimal CT under all cover images.For instance,with cover image as‘Lena’,the CSOES-DIS model has provided EBT,EXT,and TT of 0.4562,0.3883,and 0.8445 min respectively.Moreover,with cover image as‘Jet’,the CSOES-DIS model has achieved EBT,EXT,and TT of 0.4930,0.3483,and 0.8413 min respectively.Furthermore,with cover image as‘Boat’,the CSOES-DIS model has obtained EBT,EXT,and TT of 0.3998,0.4437,and 0.8435 min respectively.
Table 2:CT analysis of CSOES-DIS model under various cover images
Figure 5:Comparative CT analysis of CSOES-DIS model under various cover images
A comparative PSNR study of the CSOES-DIS model is carried out with existing techniques under several cover images in Tab.3 and Fig.6.The results indicated that the CSOES-DIS model has resulted in higher PSNR values under all cover images.For instance,under‘Lena’image,the CSOESDIS model has offered increased PSNR of 56.67 dB whereas the HPSM-WPT,AIS-HOG,IWT-PSO,and NIS-IITS models have obtained decreased PSNR values of 32.27,36.32,35.68,and 37.26 dB respectively.Meanwhile,under‘Boat’image,the CSOES-DIS model has accomplished higher PSNR of 55.12 dB whereas the HPSM-WPT,AIS-HOG,IWT-PSO,and NIS-IITS models have depicted lower PSNR values of 32.47,35.95,36.27,and 37.35 dB respectively.
Table 3:PSNR analysis of CSOES-DIS model under various cover images
Figure 6:Comparative PSNR Analysis of CSOES-DIS model under various cover images
Finally,a comprehensive result analysis of the CSOES-DIS model under distinct kinds of attacks is provided in Tab.4.
Table 4:Overall results of CSOES-DIS model under different kinds of attacks
Fig.7 offers a detailed SC examination of the CSOES-DIS model under various types of attacks.The figure portrayed that the CSOES-DIS model has attained increased values of SC under every attack.For instance,the CSOES-DIS model has achieved enhanced SC of 0.9956 under the existence of erosion attacks.Likewise,the CSOES-DIS model has attained improved SC of 0.9975 under the existence of Gaussian attack.Moreover,the CSOES-DIS model has obtained increased SC of 0.9962 under the existence of dilation attack.Furthermore,the CSOES-DIS model has demonstrated better SC of 0.9952 under the existence of motion blur attack.
Figure 7:NC analysis of CSOES-DIS model under different kinds of attacks
Fig.8 provides a brief NAE investigation of the CSOES-DIS model under numerous kinds of attacks.The figure depicted that the CSOES-DIS model has achieved increased values of NAE under every attack.For instance,the CSOES-DIS model has attained reduced NAE of 0.5060 under the existence of erosion attacks.Likewise,the CSOES-DIS model has accomplished effective NAE of 0.5270 under the existence of Gaussian attack.Besides,the CSOES-DIS model has gained NAE of 0.5360 under the existence of dilation attack.Also,the CSOES-DIS model has demonstrated NAE of 0.5080 under the existence of motion blur attack.
Figure 8:NC analysis of CSOES-DIS model under different kinds of attacks
Fig.9 illustrates a comprehensive RMSE inspection of the CSOES-DIS model under various types of attacks.The figure portrayed that the CSOES-DIS model has reached increased values of RMSE under every attack.For instance,the CSOES-DIS model has achieved RMSE of 9.8180 under the existence of erosion attacks.Also,the CSOES-DIS model has attained RMSE of 8.9320 under the existence of Gaussian attack.Additionally,the CSOES-DIS model has obtained RMSE of 8.5020 under the existence of dilation attack.Also,the CSOES-DIS model has demonstrated better RMSE of 9.8700 under the existence of motion blur attack.After observing the detailed result analysis,it can be ensured that the CSOES-DIS model has accomplished better outcomes than the other methods.
Figure 9:RMSE analysis of CSOES-DIS model under different kinds of attacks
4 Conclusion
In this study,a new CSOES-DIS technique has been developed for accomplishing maximum image security.It mainly intends to encrypt the secret image prior to the embedding process.Moreover,the DCDIE technique is applied for the encryption of secret images and then embedded into the cover image by the use of CSO based OPSP process.The OPSP can be carried out by the design of CSO algorithm and thereby increases the secrecy level.In order to portray the enhanced outcomes of the CSOES-DIS model,a comparative examination with recent methods is performed and results are investigated under several measures.The experimental results reported the betterment of the CSOESDIS model based on different measures.In future,the CSOES-DIS technique can be placed in the real time healthcare environment for secured medical image transmission.
Funding Statement:Taif University Researchers Supporting Project Number(TURSP-2020/154),Taif University,Taif,Saudi Arabia.
Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.
杂志排行
Computers Materials&Continua的其它文章
- EACR-LEACH:Energy-Aware Cluster-based Routing Protocol for WSN Based IoT
- Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm
- Fuzzy MCDM Model for Selection of Infectious Waste Management Contractors
- An Efficient Scheme for Data Pattern Matching in IoT Networks
- Feedline Separation for Independent Control of Simultaneously Different Tx/Rx Radiation Patterns
- Deep-piRNA:Bi-Layered Prediction Model for PIWI-Interacting RNA Using Discriminative Features