CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Steganography using Social Impact Theory based Optimization (SITO)

by Amanjot Kaur, Shruti Mittal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 101 - Number 16
Year of Publication: 2014
Authors: Amanjot Kaur, Shruti Mittal
10.5120/17770-8594

Amanjot Kaur, Shruti Mittal . Steganography using Social Impact Theory based Optimization (SITO). International Journal of Computer Applications. 101, 16 ( September 2014), 9-12. DOI=10.5120/17770-8594

@article{ 10.5120/17770-8594,
author = { Amanjot Kaur, Shruti Mittal },
title = { Steganography using Social Impact Theory based Optimization (SITO) },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 101 },
number = { 16 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume101/number16/17770-8594/ },
doi = { 10.5120/17770-8594 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:31:48.982527+05:30
%A Amanjot Kaur
%A Shruti Mittal
%T Steganography using Social Impact Theory based Optimization (SITO)
%J International Journal of Computer Applications
%@ 0975-8887
%V 101
%N 16
%P 9-12
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With a great advancement in science and technology, efficient techniques are needed for the purpose of security and copyright protection of the digital information being transmitted over the internet and for secret data communication. Thus, Steganography solves this purpose which has been used widely. Even though, a Stego-object may be exposed to noise or compression due to which the secret data cannot be extracted correctly at the receiver's end, when the transmission occours. This paper presents an efficient image hiding scheme, Social Impact theory based Optimization (SITO). Here, a fitness function is computed based on certain texture properties and entropy of a host image. According to this, the block holding the most relevant fitness value is the place where embedding of the secret data (secret image) is done. Thus, a stego-image is retrieved at the other end, which is not only good in quality but is also able to sustain certain noise and compression attacks during the transmission. The objective function is defined in such a manner that both quality and robustness of the stego image are acceptable, for which the performance analysis parameter values of the stego-image are also determined. The results, when compared with some other data hiding technique show better stego image quality along with distortion tolerance.

References
  1. Punam Bedi, Roli Bansal, Priti Sehgal, "Using PSO in a spatial domain based image hiding scheme with distortion tolerance", Elsevier Springer, 2013
  2. Sunil. K. Moon 1, Rajeshree. D. Raut, "Analysis of Secured Video Steganography Using Computer Forensics Technique for Enhance Data Security", IEEE, 2013.
  3. Ali K. Hmood1, Z. M. Kasirun1, Hamid A. Jalab1, Gazi Mahabubul Alam3, A. A. Zaidan2 and B. B. Zaidan2, "On the accuracy of hiding information metrics", International Journal of the Physical Sciences Vol. 5(7), pp. 1054-1062, August, 2010
  4. Cheng-Hsing Yang, Chi-Yao Weng,"Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems "IEEE Transactions on Information Forensics and Security, Vol. 3, No. 3, September 2008
  5. Neil Johnson, Eliminating Steganography in Internet Traffic with active wardens", Springer, 2003
  6. M. Al Htammami, "A proposed Modified Data Encryption Standard algorithm by using Fusing Data Technique", WCSIT, Vol. 1. No. 3, 88-91-2011
  7. Adnan Abdul-Aziz Gutub, Wael Al-Alwani, and Abdulelah Bin Mahfoodh ,"Improved method of arabic text steganography using the extension "Kashida' character", BUJICT, vol3, Issue 1, Dec 2010
  8. Lei Zheng, Ingemar J Cox, "JPEG based conditional entropy coding for correlated steganography", IEEE, 2007
  9. Ali Al-Ataby and Fawzi Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform", International Arab Journal of Information Technology, Vol 7, No. 4, Oct 2010
  10. Rosziati Ibrahim, "Steganography Algorithm to hide Secret Message inside an image", Computer Technology and Application, Feb 2011
  11. Nelly Fazio, Antonio R. Nicolosi and Irippuge Milinda Perera "Broadcast Steganography", Springer, Vol 8366, 2014
  12. Biswapati Jana, Debasis Giri,Shymal Kumar Mondal, Pabitra Pal,"Image Steganography based on Cellular Automata", IJPAM, Vol 83, No. 5, 2013
  13. Parisa Gerami, Subariah Ibrahim, Morteza Bashardoost, "Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment", IJCA, Volume 55– No. 2, October 2012
  14. Xiaoxia Li, Jianjun Wang, "A steganographic method based upon JPEG and particle swarm optimization algorithm", Elsevier, Science Direct, Feb 2007
  15. Faramarz Sadeghi, Marjan Kuchaki Rafsanjani, Fatemeh Zarisfi Kermani, "Hiding Information in Image by Compound Meta-Heuristic Algorithm PSO-SA", IJCSAI, Vol. 3 Iss. 4 Dec. 2013
  16. Amrita Khamruia, J K Mandal, "A Genetic Algorithm based Steganography using Discrete Cosine Transformation (GASDCT)", Elsevier, ScienceDirect, 2013
  17. Parisa Gerami, Subariah Ibrahim, Morteza Bashardoost, "Least Significant Bit Image Steganography using Particle Swarm Optimization and Optical Pixel Adjustment, IJCA, Volume 55– No. 2, October 2012
  18. Ko-Chin Changa, Chien-Ping Changa, Ping S. Huangb, and Te-Ming Tua "A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing, Journal of Multimedia, Vol No. 2, 2008
  19. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsai, Min-Shiang Hwang, " A high quality steganographic method with pixel-value differencing and modulus function", Elsevier, Science Direct, 2007
  20. V. Nagaraj, Dr. V. Vijayalakshmi and Dr. G. Zayaraz, "Color Image Steganography based on Pixel Value Modification Method Using Modulus Function", Elsevier, Science Direct, 2013
  21. A OS. A. Z. Ansaef, "High Security Cover File of hidden data using statistical technique and AES encryption algorithm", Vol3, 2009
  22. Weiqi Luo and Jiwu Huang, "Edge Adaptive Image Steganography Based on LSB Matching Revisited", IEEE, Vol5, No. 2, June 2010
  23. Martin Maca's and Lenka Lhotsk'a, "Simplified Social Impact Theory Based Optimizer in Feature Subset Selection", Springer, 2011
  24. Macas, M. , Lhotska, L. and Kremen, V, "Social Impact based Approach to Feature Subset Selection", International Workshop on Nature Inspired Cooperative Strategies for Optimization, Studies in Computational Intelligence, Springer, 2007
  25. Macas, M. and Lhotska, L. , "Social Impact Theory based Optimizer", Advances in Artificial: 9th European Conference on Artificial Life, Heidelberg: Springer, pp. 635-644, 2007
  26. Macas, M. and Lhotska, L, "Social Impact and Optimization", 2nd European Symposium on Nature-inspired Smart Information Systems, 2006
Index Terms

Computer Science
Information Sciences

Keywords

SITO Image Steganography MSE PSNR