Improved Cohort Intelligence—A high capacity, swift and secure approach on JPEG image steganography

Journal of Information Security and Applications - Tập 45 - Trang 90-106 - 2019
Dipti Kapoor Sarmah1, Anand J Kulkarni1,2
1Symbiosis Institute of Technology, Symbiosis International (Deemed University), Pune, MH 412 115, India
2Odette School of Business, University of Windsor, 401 Sunset Avenue, Windsor, Ontario, N9B 3P4, Canada

Tài liệu tham khảo

Coron, 2006, What is cryptography?, IEEE Secur Privacy, 4, 70, 10.1109/MSP.2006.29 Mishra, 2015, A review on steganography and cryptography, 119 Petitcolas, 1999, Information hiding-a survey, Proc IEEE, 87, 1062, 10.1109/5.771065 Rabah, 2004, Steganography-the art of hiding data”, Inf Technol J, 3, 245, 10.3923/itj.2004.245.269 Venkatraman, 2004, Significance of steganography on data security Miano, 1999 Sarmah, 2018, JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms, Inf Sci, 430-431, 378, 10.1016/j.ins.2017.11.027 Sarmah, 2017, Image steganography capacity improvement using cohort intelligence and modified multi random start local search methods, Arab J Sci Eng, 1 Tseng, 2004, Steganography using JPEG-compressed images, 12 Pannebaker, 1993 Raid, 2014, JPEG image compression using discrete cosine transform - a survey, Int J Comput Sci Eng Surv (IJCSES), 5, 60 Zhihua, 2010, JPEG image steganalysis using joint discrete cosine transform domain features, J Electron Imaging, 19 Rao, 1990 Böhme, 2010, Principles of Modern Steganography and Steganalysis Chandramouli, 2004, Image steganography and steganalysis: concepts and practice, LNCS, 2939, 35 Wang, 2004, Cyber Warfare: Steganography vs. Steganalysis, Communications of the ACM-Voting Systems, 47, 76, 10.1145/1022594.1022597 Zhu, 2011, Blocking Artifacts Reduction in Compressed Data Chan, 2004, Hiding data in images by simple LSB substitution, Pattern Recognit, 37, 469, 10.1016/j.patcog.2003.08.007 Chang, 2002, A steganographic method based upon JPEG and quantization table modification, Inf Sci, 141, 123, 10.1016/S0020-0255(01)00194-3 Cuiling, 2011, A high capacity steganographic method based on quantization table modification, J Nat Sci, 16, 223 Cheddad, 2010, Digital image steganography: survey and analysis of current methods, Signal Process, 90, 727, 10.1016/j.sigpro.2009.08.010 Li, 2007, A steganographic method based upon JPEG and particle swarm optimization algorithm, Inf Sci, 177, 3099, 10.1016/j.ins.2007.02.008 Jiang, 2011, 16, 223 Kulkarni, 2014, An information hiding system using 16*16 quantization table, 1 Zhang, 2007, Improving embedding efficiency of covering codes for applications in steganography, IEEE Commun Lett, 11, 680, 10.1109/LCOMM.2007.070438 Westfeld, 1999, Attacks on steganographic systems breaking the steganographic utilities EzStego, Jsteg, Steganos, and S-Tools-and some lessons learned, 61 Fridrich, 1999 Dorigo, 2006, Ant colony optimization: artificial ants as a computational intelligence technique, IEEE Comput Intell Mag, 1, 28, 10.1109/MCI.2006.329691 Elbeltagi, 2005, Comparison among five evolutionary-based optimization algorithms, Adv Eng Inf, 19, 43, 10.1016/j.aei.2005.01.004 Kennedy, 1995, Particle swarm optimization, 1942 Yuce, 2013, Honey bees inspired optimization method: the bees algorithm, Insects, 4, 646, 10.3390/insects4040646 Wasan, 2011, Information hiding using ant colony optimization algorithm, Int J Technol Diffus, 2, 16, 10.4018/jtd.2011010102 Ghasemi, 2012, High capacity image steganography based on genetic algorithm and wavelet transform, 110 Wang, 2010, A secure steganography method based on genetic algorithm, J Inf Hiding Multimed Signal Process, 1, 28 Wang, 2001, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognit, 34, 671, 10.1016/S0031-3203(00)00015-7 Hedieh, 2017, Image steganalysis using artificial bee colony algorithm, J Exp Theor Artif Intell, 29, 949, 10.1080/0952813X.2016.1266037 Duraisamy, 2016, Application of genetic algorithm and particle swarm optimization techniques for improved image steganography systems, Open Phys, 14, 452, 10.1515/phys-2016-0052 Kulkarni, 2013, Cohort intelligence: a self supervised learning behaviour, 1396 Kulkarni, 2017, Cohort intelligence: a socio-inspired optimization method, 114, 10.1007/978-3-319-55312-2 Kulkarni, 2016, Solving 0-1 knapsack problem using cohort intelligence algorithm, I J Mach Learn Cybern, 7, 427, 10.1007/s13042-014-0272-y Kulkarni, 2016, Application of the cohort intelligence optimization method to three selected combinatorial optimization problems, Eur J Oper Res, 250, 427, 10.1016/j.ejor.2015.10.008 Krishnasamy, 2014, A hybrid approach for data clustering based on modified cohort intelligence and K-means, Expert Syst Appl, 41, 6009, 10.1016/j.eswa.2014.03.021 Dhavle, 2018, Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm, Neural Comput Appl, 30, 111, 10.1007/s00521-016-2683-z Kulkarni, 2016, Constrained cohort intelligence using static and dynamic penalty function approach for mechanical components design, Int J Parallel Emergent Distrib Syst, 1 Kale, 2017, Cohort intelligence algorithm for discrete and mixed variable engineering problems, Int J Parallel Emergent Distrib Syst Kulkarni, 2016, Probability collectives for solving discrete and mixed variable problems, Int J. Comput Aided Eng Technol, 8, 325, 10.1504/IJCAET.2016.079387 Li, 2009, A heuristic particle swarm optimization method for truss structures with discrete variables, Comput Struct, 87, 435, 10.1016/j.compstruc.2009.01.004 Wu, 2007, Genetic algorithms for nonlinear mixed discrete-integer optimization problems via metagenetic parameter optimizations, Eng Optim, 24, 137, 10.1080/03052159508941187 Wu, 1995, Steady-state genetic algorithms for discrete optimization of trusses, Comput Struct, 56, 979, 10.1016/0045-7949(94)00551-D Shah, 2018, Design of fractional PID controller using cohort intelligence method, Front Inf Technol Electron Eng, 19, 437, 10.1631/FITEE.1601495 Patankar, 2018, Variations of cohort intelligence, Soft Comput, Springer, 22, 1731, 10.1007/s00500-017-2647-y Almohammad, 2009, JPEG steganography: a performance evaluation of quantization tables, 471 Patel N.S., Abowd D.G. (2004): The ContextCam: automated point of capture video annotation, In: International conference on ubiquitous computing, LNCS 3205, pp 301–318. Kawaguchi, 2007, A model of digital contents access control system using steganographic information hiding scheme, 50 Kobayashi, 1999, A method of embedding binary data into JPEG bit streams, IEICE Trans. Inf. Syst., J83-D-II, 1469 Kulkarni, 2013, Probability collectives for solving truss structure problems Xin, 2017, Data embedding in digital images using critical functions, Signal Process Image Commun, 58, 146, 10.1016/j.image.2017.07.006 Liao, 2017, Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform, Multimed Tools Appl, 76, 20739, 10.1007/s11042-016-3971-4 Hussain, 2018, Image steganography in spatial domain: a survey, Signal Process Image Commun, 65, 46, 10.1016/j.image.2018.03.012 Baby, 2015, A novel DWT based image securing method using steganography, Proc Comput Sci, 46, 612, 10.1016/j.procs.2015.02.105 El-Emam, 2015, New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization, Comput Secur, 55, 21, 10.1016/j.cose.2015.06.012 Jarusek, 2018, Robust steganographic method based on unconventional approach of neural networks, Appl Soft Comput, 67, 505, 10.1016/j.asoc.2018.03.023 Atee, 2017, Extreme learning machine based optimal embedding location finder for image steganography, PLoS One, 12, 10.1371/journal.pone.0170329 Baluja, 2017, Hiding images in plain sight: deep steganography, 1 Zhaotong, 2018, Steganography with pixel-value differencing and modulus function based on PSO, J Inf Secur Appl, 43, 47 Kumar, 2018, Image steganography based on canny edge detection, dilation operator and hybrid coding, J Inf Secur Appl, 41, 41 Zheng, 2016, Fusion of block and keypoints based approaches for effective copy-move image forgery detection, Multidimension Syst Signal Process, 27, 989, 10.1007/s11045-016-0416-1