In the interactive environment, information security is considered as the main issue with the development of information technology. Here, there is no protection for the messages transmitted to and from the receiver. A method called image steganography is used, which assures security to the concealed communication and protection of the information. In some of the receiver images, image steganography conceals the secret message and transmits the secret message so that the message is noticeable only to the transmitter and the receiver. Hence, this paper presents an algorithm for image steganography by exploiting sparse representation, and a method called Enhanced Whale Optimization Algorithm (WOA) in order to effectual selection of the pixels in order to embed the secret audio signal in the image. Enhanced WOA based pixel chosen process exploits a fitness function that is on the basis of the cost function. In order to evaluate the fitness, cost function computes the entropy, edge, and pixel intensity. Experimentation has been performed and a comparison of the proposed algorithm with the conventional algorithms regarding the PSNR and MSE. Moreover, it decides the proposed Enhanced WOA, as an effectual algorithm.
Zhang, Junhong & Wei, Zhuo & Yin, Xiaolin & Liu, Wanteng & Yeung, Yuileong. (2018). Binary Image Steganography Based on Joint Distortion Measurement. Journal of Visual Communication and Image Representation.
Inas Jawad Kadhim, Prashan Premaratne, Peter James Vial, Brendan Halloran,"Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research", Neurocomputing, Volume 335, 28 March 2019, Pages 299-326.
Ahmed A. Abd EL-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca,"A novel image steganography technique based on quantum substitution boxes", Optics & Laser Technology, Volume 116, August 2019, Pages 92-102.
Xiaotian Wu, Ching-Nung Yang,"Partial reversible AMBTC-based secret image sharing with steganography", Digital Signal Processing, Volume 93, October 2019, Pages 22-33.
Kumar Gaurav, Umesh Ghanekar,"Image steganography based on Canny edge detection, dilation operator and hybrid coding", Journal of Information Security and Applications, Volume 41, August 2018, Pages 41-51.
X. Zhang, F. Peng and M. Long, "Robust Coverless Image Steganography Based on DCT and LDA Topic Classification," IEEE Transactions on Multimedia, vol. 20, no. 12, pp. 3223-3238, Dec. 2018.
C. R. Kim, S. H. Lee, J. H. Lee and J. -. Park, "Blind decoding of image steganography using entropy model," Electronics Letters, vol. 54, no. 10, pp. 626-628, 17 5 2018.
Y. Zhang, X. Luo, Y. Guo, C. Qin and F. Liu, "Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection," IEEE Access, vol. 7, pp. 24282-24289, 2019.
P.-Y. Chen, H.-J. Lin, et al., A dwt based approach for image steganography, Int. J. Appl. Sci. Eng. 4 (3) (2006) 275–290.
X. Zhang, F. Peng, M. Long, Robust coverless image steganography based on dct and lda topic classification, IEEE Trans. Multimedia 20 (12) (2018) 3223–3238.
Y. Su, C. Zhang, C. Zhang, A video steganalytic algorithm against motion-vectorbased steganography, Signal Process. 91 (8) (2011) 1901–1909.
X. Li, B. Li, X. Luo, B. Yang, R. Zhu, Steganalysis of a PVD-based content adaptive image steganography, Signal Process. 93 (9) (2013) 2529–2538.
Upham, D.: ‘Steganographic algorithm jsteg’. Available at http://zooid. org/~paul/crypto/jsteg(1993)
Andreas, W.: ‘F5-a steganographic algorithm’. Int. Workshop on Information Hiding, Pittsburgh, PA, USA, 2001
Swain, G.: ‘A steganographic method combining LSB substitution and PVD in a block’. Proc. Int. Conf. on Computational Modelling and Security, Bengaluru, India, February 2016, pp. 39–44.
Mansi S. Subhedar, Vijay H. Mankar, Image steganography using redundant discrete wavelet transform and QR factorization, Comput. Electr. Eng. 54 (2016) 406–422.
X. Wu, S. Zhang, W. Xiao and Y. Yin, "The Exploration/Exploitation Tradeoff in Whale Optimization Algorithm," in IEEE Access, vol. 7, pp. 125919-125928, 2019.
Y. Li, T. Han, H. Zhao and H. Gao, "An Adaptive Whale Optimization Algorithm Using Gaussian Distribution Strategies and Its Application in Heterogeneous UCAVs Task Allocation," in IEEE Access, vol. 7, pp. 110138- 110158, 2019.
Y. Ling, Y. Zhou and Q. Luo, "Lévy Flight Trajectory-Based Whale Optimization Algorithm for Global Optimization," in IEEE Access, vol. 5, pp. 6168-6186, 2017
Vinolin V and Vinusha S,"Edge-based Image Steganography using Edge Least Significant Bit (ELSB) Technique",Multimedia Research, Volume 1, Issue 1, October 2018.
Vinusha S,"Secret Image Sharing and Steganography Using Haar Wavelet Transform",Multimedia Research, Volume 2, Issue 2, April 2019.