Skip to main content

Advertisement

Log in

Genetic algorithms for optimality of data hiding in digital images

Soft Computing Aims and scope Submit manuscript

Abstract

This paper investigates the scope of usage of Genetic Algorithms (GA) for data hiding in digital images. The tool has been explored in this topic of research to achieve an optimal solution in multidimensional nonlinear problem of conflicting nature that exists among imperceptibility, robustness, security and payload capacity. Two spatial domain data hiding methods are proposed where GA is used separately for (i) improvement in detection and (ii) optimal imperceptibility of hidden data in digital images respectively. In the first method, GA is used to achieve a set of parameter values (used as Key) to represent optimally the derived watermark in the form of approximate difference signal used for embedding. In the second method, GA is used for finding out values of parameters, namely reference amplitude (A) and modulation index (μ) both with linear and non linear transformation functions, for achieving the optimal data imperceptibility. Results on robustness for both the methods against linear, non linear filtering, noise addition, and lossy compression as well as statistical invisibility of the hidden data are reported here for some benchmark images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  • Cachin C (1998) An information theoretic model for steganography. In: Proceedings of 2nd workshop on information hiding. Aucsmith D (eds) Lecture Notes in Computer Sciences, Springer, Heidelberg, p 1525

  • Chan CK, Cheng LM (2001) Improved hiding data in images by optimal moderately significant-bit replacement. IEE Electron Lett 37: 1017–1018

    Article  Google Scholar 

  • Chang CC, Lin IC (2004) Robust image watermarking system using neural network, intelligent watermarking techniques. World Scientific, Singapore, pp 395–427

  • Chang CC, Lin IC (2004) A perceptually tuned watermarking scheme for digital images using supprot vector machines, intelligent watermarking techniques. World Scientific, Singapore, pp 429–457

  • Farid H (2001) Detecting Steganographic Message in Digital Images, Dartmouth College, Computer Science, (TR2001, 2001)

  • Goldberg D (1989) Genetic algorithms: Search, optimization and machine learning. Addison-Wesley, Reading

    MATH  Google Scholar 

  • Hamming RH (1980) Coding and information theory. Prentice-Hall, Inc., Englewood Cliffs

    MATH  Google Scholar 

  • Huang H-C, Pan JS, Huang YH, Huang K-C (2007) Progressive watermarking techniques using genetic algorithms. Circ Syst Signal Process 8: 58–68

    Google Scholar 

  • Hwang MS, Chang CC, Hwang KF (2000) Digital watermarking of images using neural networks. J Electron Imgag 9: 548–555

    Article  Google Scholar 

  • Kundur D (1999) Multiresolution digital watermarking: algorithms and implications for multimedia signals. PhD Thesis, Department of Electrical and Computer Engineering, University of Toronto, Canada

  • Maity SP, Kundu MK, Nandi PK (2004) Genetic algorithm for optimal imperceptibility in image communication through noisy channel. 11th international conference on neural information processing ICONIP 2004, (LNCS, Springer, 2004) 700–705

  • Maity SP, Nandi PK, Kundu MK (2007) Genetic Algorithm for improvement in detection of hidden data in digital images. In: 6th international conference on advances in pattern recognition. World Scientific, Singapore, pp 164–169

  • Pal SK, Bhandari D, Kundu MK (1994) Genetic algorithms for image enhancement. Pattern Recogn Lett 15: 261–271

    Article  MATH  Google Scholar 

  • Pal SK, Ghosh A, Kundu MK (eds) (2000) Soft computing for image processing. Physica, Heidelberg

  • Pan JS, Huang HC, Jain LC (eds) (2004) Intelligent watermarking techniques. World Scientific, Singapore

  • Pan JS, Sung MT, Huang H-C, Liao BY (2004) Robust VQ-based digital watermarking for the memoryless binary symmetric channel. IEICE Trans Fundam Electron Commun Comput Sci E-87: 1839–1841

    Google Scholar 

  • Pan JS, Huang H-C, Jain LC, Fang WC (eds) (2007) Intelligent multimedia data hiding: new directions. Springer, Berlin

  • Shieh CS, Huang H-C, Wang FH, Pan JS (2004) Genetic watermarking based on transform domain techniques. Pattern Recogn 37: 555–565

    Article  Google Scholar 

  • Special issue on copyright and privacy protection (1998) IEEE J Select Areas Commun (JSCA) 16

  • Special issue on enabling security technologies for digital right management (2004) Proc IEEE 92

  • Vleeschouwer CD, Delaigle JF, Macq B (2002) Invisibility and application functionalities in perceptual watermarking—an overview. Proc IEEE 90: 64–77

    Article  Google Scholar 

  • Wang RZ, Lin CF, Lin JC (2000) Hiding data in images by optimal moderately significant-bit replacement. IEE Electron Lett 36: 2069–2070

    Article  Google Scholar 

  • Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn Lett 34: 671–683

    MATH  MathSciNet  Google Scholar 

  • Wang FH, Jain LC, Pan JS (2004) Genetic watermarking on spatial domain, intelligent watermarking techniques. World Scientific, Singapore, pp 377–393

    Google Scholar 

  • Wu M, Liu B (2002) Multimedia data hiding. Springer, NewYork

    Google Scholar 

  • Yu PT, Tsai HH, Lin JS (2001) Digital watermarking based on neural networks for color images. Signal process 81: 663–671

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Malay K. Kundu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Maity, S.P., Kundu, M.K. Genetic algorithms for optimality of data hiding in digital images. Soft Comput 13, 361–373 (2009). https://doi.org/10.1007/s00500-008-0329-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-008-0329-5

Keywords

Navigation