High Security and Robustness Image Steganography Based On Ant Colony Optimization Algorithms and Discrete Cosine Transform
DOI:
https://doi.org/10.32792/jeps.v13i4.370Abstract
Abstract
Steganography, which is the science of delivering a message between parties in a way that an
eavesdropper will not be aware that the message exists, is one of the key disciplines that have a considerable interest in fields. The suggested method seeks to conceal a smaller color image within a larger color image. It utilizes the transform domain throughout the steganography process to increase its resistance to changes and treatments made to the cover image. In order to achieve both complexity security and robustness, the project seeks to implement and utilize two techniques: ant colony optimization and transformation domain approach. The technologies under consideration suggest a Steganography method for digital photographs. It employs Discrete Cosine Transform (DCT) to achieve the same aims in terms of security, transparency and robustness. Additionally, it makes use of Once an Ant Colony Optimization (ACO) to increase robustness against signal processing attacks and imperceptibility in accordance with the human visual system. This work implements ACO for the cover to find the embedding locations on the graph path, and then finds locations to hide information based on threshold method, when looking for places to hide information blocks, DCT uses an intelligent block matching technique between the embedded image and the cover image, and both systems were tested against each other to compare their performance. Six stages make up the proposed secret key steganography system: test, transform, key creation and substitution, ant colony optimization, matching, inverse transform, and key encryption and concealing.
References
. Reddy, G. D., Kiran, Y. V. U., Singh, P., Singh, S. V., Shaw, S., & Singh, J. (2022, October). A Proficient and secure way of Transmission using Cryptography and Steganography. In 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS) (pp. 582-586). IEEE.
. Al-Nofaie, S., Gutub, A., & Al-Ghamdi, M. (2021). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. Journal of King Saud University-Computer and Information Sciences, 33(8), 963-974.
. Fateh, M., Rezvani, M., & Irani, Y. (2021). A new method of coding for steganography based on LSB matching revisited. Security and Communication Networks, 2021, 1-15.
. Zhang, Y., Lu, H., & Abbas, H. (2018). Mobile Intelligence Assisted by Data Analytics and Cognitive Computing. Wireless Communications and Mobile Computing, 2018, 1-2.
. Hamano, G., Imaizumi, S., & Kiya, H. (2023). Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images. Sensors, 23(7), 3400.
. Zhang, Y., Luo, X., Wang, J., Guo, Y., & Liu, F. (2021). Image robust adaptive steganography adapted to lossy channels in open social networks. Information Sciences, 564, 306-326.
. Tao, H., Chongmin, L., Zain, J. M., & Abdalla, A. N. (2014). Robust image watermarking theories and techniques: A review. Journal of applied research and technology, 12(1), 122-138.
. Zhang, Y., Wang, C., Wang, X., & Wang, M. (2017). Feature-based image watermarking algorithm using SVD and APBT for copyright protection. future internet, 9(2), 13.
. Makhdoom, I., Abolhasan, M., & Lipman, J. (2022). A comprehensive survey of covert communication techniques, limitations and future challenges. Computers & Security, 120, 102784.
. Kaur, H., & Rani, J. (2016). A Survey on different techniques of steganography. In MATEC web of conferences (Vol. 57, p. 02003). EDP Sciences.
. Boryczka, M., & Kazana, G. (2023). Hiding Information in Digital Images Using Ant Algorithms. Entropy, 25(7), 963.
. Gnanalakshmi, V., & Indumathi, G. (2023). A review on image steganographic techniques based on optimization algorithms for secret communication. MULTIMEDIA TOOLS AND APPLICATIONS.
. Saini, K. (2017). A review on video steganography techniques in spatial domain. 2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE), 366-371.
. Priya, A. (2018). High capacity and optimized image steganography technique based on ant colony optimization algorithm. International Journal of Emerging Technology and Innovative Engineering, 4(6).
. Bajracharya, R., Shrestha, R., Hassan, S. A., Jung, H., & Shin, H. (2023). 5G and Beyond Private Military Communication: Trend, Requirements, Challenges and Enablers. IEEE Access.
. Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE access, 9, 23409-23423.
. Li, H., & Guo, X. (2018). Embedding and extracting digital watermark based on DCT algorithm. Journal of Computer and Communications, 6(11), 287-298.
. Sharma, V., & Mir, R. N. (2022). An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. Journal of King Saud University-Computer and Information Sciences, 34(3), 615-626.
. Ali, M., Wook Ahn, C., Pant, M., Kumar, S., Singh, M. K., & Saini, D. (2020). An optimized digital watermarking scheme based on invariant DC coefficients in spatial domain. Electronics, 9(9), 1428.
. Liu, C., & Ding, Q. (2020). A color image encryption scheme based on a novel 3d chaotic mapping. Complexity, 2020, 1-20.
. Lu, W., Zhang, J., Zhao, X., Zhang, W., & Huang, J. (2020). Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding. IEEE Transactions on Circuits and Systems for Video Technology, 31(7), 2909-2922.
. Pan, P., Wu, Z., Yang, C., & Zhao, B. (2022). Double-matrix decomposition image steganography scheme based on wavelet transform with multi-region coverage. Entropy, 24(2), 246.
. Zhang, Y. Q., Zhong, K., & Wang, X. Y. (2022). High-Capacity Image Steganography Based on Discrete Hadamard Transform. IEEE Access, 10, 65141-65155.
. Gaertner, D., & Clark, K. L. (2005, June). On Optimal Parameters for Ant Colony Optimization Algorithms. In IC-AI (pp. 83-89).
. Zebari, D. A., Zeebaree, D. Q., Saeed, J. N., Zebari, N. A., & Adel, A. Z. (2020). Image steganography based on swarm intelligence algorithms: A survey. people, 7(8), 9.
. Thakkar, F., & Srivastava, V. K. (2017). A particle swarm optimization and block-SVD-based watermarking for digital images. Turkish Journal of Electrical Engineering and Computer Sciences, 25(4), 3273-3288.
. Singhal, V., Shukla, Y. K., & Praksash, N. (2020). Image steganography embedded with advance encryption standard (AES) securing with SHA-256. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 9(8).
. Riabko, A. V., Zaika, O. V., Kukharchuk, R. P., Vakaliuk, T. A., & Hordiienko, I. V. (2022, June). Algorithm of ant colony optimization (ACO) for 3D variation traveling salesman problem. In Journal of Physics: Conference Series (Vol. 2288, No. 1, p. 012001). IOP Publishing.
. Nayyar, A., & Singh, R. (2016, March). Ant colony optimization—computational swarm intelligence technique. In 2016 3rd International conference on computing for sustainable global development (INDIACom) (pp. 1493-1499). IEEE.
. Khan, S., & Bianchi, T. (2018). Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region. International Journal of Electrical & Computer Engineering (2088-8708), 8(1).
. Ning, J., Zhang, Q., Zhang, C., & Zhang, B. (2018). A best-path-updating information-guided ant colony optimization algorithm. Information Sciences, 433, 142-162.
. Ignatious, N., & Ali, S. (2019, November). Identifying A Regression Test Prioritization Technique and Proposing A Tool for Automation for Trade me Website. In CS & IT Conference Proceedings (Vol. 9, No. 14). CS & IT Conference Proceedings.
. Alomoush, W., Khashan, O. A., Alrosan, A., Attar, H. H., Almomani, A., Alhosban, F., & Makhadmeh, S. N. (2023). Digital image watermarking using discrete cosine transformation based linear modulation. Journal of Cloud Computing, 12(1), 1-17.
. Shawahna, A., Haque, M. E., & Amin, A. (2019). JPEG image compression using the discrete cosine transform: an overview, applications, and hardware implementation. arXiv preprint arXiv:1912.10789.
. Raid, A. M., Khedr, W. M., El-Dosuky, M. A., & Ahmed, W. (2014). Jpeg image compression using discrete cosine transform-A survey. arXiv preprint arXiv:1405.6147.
. Abdulrazzaq, S. T., Rasheed, M. H., & Siddeq, M. M. (2023). The multi-quantization process with matrix size reduction is applied to compress images with strip structure light that is commonly used in 3D reconstructions.
. Nikoukhah, T., Colom, M., Morel, J. M., & von Gioi, R. G. (2022). A Reliable JPEG Quantization Table Estimator. Image Processing On Line, 12, 173-197.
. Senthooran, V., & Ranathunga, L. (2014, August). DCT coefficient dependent quantization table modification steganographic algorithm. In 2014 First International Conference on Networks & Soft Computing (ICNSC2014) (pp. 432-436). IEEE.
. Ghosh, D., Chattopadhyay, A. K., Chanda, K., & Nag, A. (2020). A Secure Steganography Scheme Using LFSR. In Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018 (pp. 713-720). Springer Singapore.
. Siahaan, A. P. U., Ikhwan, A., & Aryza, S. (2018). A novelty of data mining for promoting education based on FP-growth algorithm.
. Kollin, F., & Bavey, A. (2017). Ant colony optimization algorithms: pheromone techniques for TSP
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Journal of Education for Pure Science- University of Thi-Qar

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright Policy
Authors retain copyright of their articles published in the Journal of Education for Pure Science (JEPS).
By submitting their work, authors grant the journal a non-exclusive license to publish, distribute, and archive the article in all formats and media.
License
All articles published in JEPS are licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license permits unrestricted use, distribution, and reproduction in any medium, provided that the original author(s) and the source are properly credited.
Author Rights
Authors have the right to:
-
Share their articles on personal websites, institutional repositories, and academic platforms
-
Reuse their work in future research and publications
-
Distribute the published version without restriction
Journal Rights
The journal retains the right to:
-
Publish and archive the articles
-
Include them in indexing and archiving systems such as LOCKSS and CLOCKSS
-
Promote and disseminate the published work
Responsibility
The contents of all articles are the sole responsibility of the authors. The journal, editors, and editorial board are not responsible for any errors, opinions, or statements expressed in the published articles.
Open Access Statement
JEPS provides immediate open access to its content, supporting the principle that making research freely available to the public enhances global knowledge exchange.
This work is licensed under a Creative Commons Attribution 4.0 International License.
https://creativecommons.org/licenses/by/4.0/