An Intelligent Multi-Objective Optimization Approach for High-Capacity Secure Image Steganography
Corresponding author: A. V. Gahan
Abstract
In this paper, an optimization-based and secure image steganography model, termed Multi-Objective Adaptive Firefly Optimized Secure Steganography (MOAFOSS), is proposed. The model formulates pixel selection as a multi-objective optimization problem to minimize Mean Square Error (MSE), maximize Peak Signal-to-Noise Ratio (PSNR), maximize entropy, and minimize the Standard Deviation (SD) to increase its resistance to steganalysis attacks. The Firefly Algorithm (FA) is used to find the best embedding points using a fitness criterion defined as a brightness function based on joint fitness. In addition, an adaptive Least Significant Bit (LSB) embedding mechanism is employed to conditionally adjust pixel values in order to minimize visual artifacts while maintaining accurate embedding. The additional encryption of secret data before embedding further enhances confidentiality. The experimental outcomes demonstrate that the suggested framework possesses better embedding capacity and Compression Ratio (CR) with a lower level of perceptible distortion. A comparative study with conventional optimization and compression methods demonstrates that MOAFOSS offers a balanced trade-off between image quality, security strength, and the amount of data carried, making it suitable for secure digital communication applications.
Keywords:
multi-objective optimization, image steganography, Firefly Algorithm (FA), adaptive LSB embedding, secure data hiding, entropy-based security, steganalysis resistance, Compression Ratio (CR)Downloads
References
M. Kumar, J. Aggarwal, A. Rani, T. Stephan, A. Shankar, and S. Mirjalili, "Secure video communication using firefly optimization and visual cryptography," Artificial Intelligence Review, vol. 55, no. 4, pp. 2997–3017, Apr. 2022.
P. Chinnasamy, R. Kumar Ayyasamy, K. Anuradha, I. Alam, D. M. Narayanan Nair, and A. Kiran, "Enhancing IoT Data Security: Integrating Elliptic Galois Cryptography with Matrix XOR Steganography and Adaptive Firefly Optimization," in 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), Kirtipur, Nepal, 2024, pp. 29–33.
M. Swathi, A. Punitha, K. P. Kumar, S. N. Bhukya, D. N. Reddy, and U. Hemalatha, "A Unique Method for Using Steganography and Cryptography Techniques to Secure Data in the Internet of Things (IoT)," in Proceedings of the 12th International Conference on Frontiers in Intelligent Computing: Theory and Applications, London, UK, 2024, pp. 493–504.
R. Vishalchandar and P. Madhavan, "Securing IoT Medical Data using Cryptography and Steganography," in 2022 International Conference on Data Science, Agents & Artificial Intelligence, Chennai, India, 2022, pp. 1–6.
V. Elakia, M. Enush, and R. Shoba, "Improvised Secure data transfer through the use of steganography for IoT network node data security," in 2024 International Conference on Advances in Computing, Communication and Applied Informatics, Chennai, India, 2024, pp. 1–7.
M. M. Hashim, J. J. Aleiwi, R. K. Ibrahim, W. R. Mohammed, and A. A. Nahi, "Concealing Secret Data in Medical Images Based on Even/Odd Pixels and PSO Algorithm for Improve Steganography System," in 2024 IEEE International Conference on Artificial Intelligence and Mechatronics Systems, Bandung, Indonesia, 2024, pp. 1–5.
P. Batta, S. Ahuja, and A. Kumar, "A hybrid framework for secure data transfer for enhancing the Blockchain Security," in 2023 Seventh International Conference on Image Information Processing, Solan, India, 2023, pp. 645–650.
K. Sashi Rekha, M. Joe Amali, M. Swathy, M. Raghini, and B. Priya Darshini, "A steganography embedding method based on CDF-DWT technique for data hiding application using Elgamal algorithm," Biomedical Signal Processing and Control, vol. 80, Feb. 2023, Art. no. 104212.
K. Upendra Raju and N. Amutha Prabha, "Data hiding steganography model based on hyper chaos 2D compressive sensing inhabited with manchester encoder/decoder using circular queue exploiting modification direction," Journal of Intelligent & Fuzzy Systems, vol. 44, no. 6, pp. 10357–10367, June 2023.
M. K. Bhatia, C. Komalavalli, and C. Laroiya, "Secure communication in Internet of Things devices using steganography," in Next Generation Communication Networks for Industrial Internet of Things Systems, S. Perumal, M. Tabassum, M. Sharma, and S. Mohanan, Eds. Boca Raton, FL, USA: CRC Press, 2022, ch. 9.
B. B. Reddy, A. Hasan Jumaa, B. Rakesh, V. Ganna, D. Deepika, and Z. Alassedi, "Encrypting Image and Transferring Secure Data Over the Internet Using Cryptography," in 2024 International Conference on Augmented Reality, Intelligent Systems, and Industrial Automation, Manipal, India, 2024, pp. 1–4.
P. Garg and R. Rama Kishore, "A robust and secured adaptive image watermarking using social group optimization," The Visual Computer, vol. 39, no. 10, pp. 4839–4854, Oct. 2023.
J. Rani, A. Anand, and S. Shivani, "SecECG: secure data hiding approach for ECG signals in smart healthcare applications," Multimedia Tools and Applications, vol. 83, no. 14, pp. 42885–42905, Apr. 2024.
B. M. Issac and S. N. Kumar, "Lifting Wavelet Transform Based Data Steganography for Health Care and Military Applications," in First International Conference on Intelligent Computing, Smart Communication and Network Technologies, Chennai, India, 2023, pp. 69–81.
P. Batta, S. Ahuja, and A. Kumar, "Performance Validation of Secret Data in IoT using Blockchain," in 2023 World Conference on Communication & Computing, Raipur, India, 2023, pp. 1–6.
S. Jaya Prakash and K. Mahalakshmi, "Improved reversible data hiding scheme employing dual image-based least significant bit matching for secure image communication using style transfer," The Visual Computer, vol. 38, no. 12, pp. 4129–4150, Dec. 2022.
S. Dhawan, R. Gupta, A. K. Rana, and S. Sharma, "Internet of Medical Things (IoMT) & Secured Using Steganography for Development of Smart Society 5.0," in Decision Analytics for Sustainable Development in Smart Society 5.0: Issues, Challenges and Opportunities, V. Bali, V. Bhatnagar, J. Lu, and K. Banerjee, Eds. Singapore: Springer Nature, 2022, pp. 173–189.
N. Hafsi, H. Hachimi, D. Benterki, and Y. Slimani, "Genetic-Firefly Algorithm Based Approach in Image Steganography," in 2025 11th International Conference on Optimization and Applications, Kenitra, Morocco, 2025, pp. 1–6.
K. Muthulakshmi and K. Valarmathi, "A secure video data streaming model using modified firefly and SVD technique," Multimedia Systems, vol. 30, no. 2, Mar. 2024, Art. no. 86.
H. Y. Naser, A. K. Mattar, M. A. Saare, M. A. Almaiah, and R. Shehab, "A Comparison of Lightweight Cryptographic Protocols for Energy-Efficient and Sustainable IoMT Authentication," Engineering, Technology & Applied Science Research, vol. 15, no. 4, pp. 25746–25756, Aug. 2025.
S. Ali and F. Anwer, "A Novel Lightweight Framework for Secure and Efficient IoT Communication Using Chaotic Cryptography and Adaptive Steganography," IEEE Transactions on Dependable and Secure Computing, 2025.
A. Badhan and S. S. Malhi, "Enhancing Data Security and Efficiency: A Hybrid Cryptography Approach (AES + ECC) Integrated with Steganography and Compression Algortihm," in 2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, Bengaluru, India, 2025, pp. 450–456.
L. Akhila and V. J. Manoj, "PVDMFWO: a novel steganographic method using PVDMF and optimization," International Journal of Computers and Applications, vol. 47, no. 5, pp. 438–458, May 2025.
G. S. Kumar, K. Sethi, P. Subudhi, and P. Joshi, "Securing patient data in IoT-enabled medical imaging: A steganographic approach," in IoT Security, S. H. Islam, D. Samanta, A. K. Pal, and U. Iqbal, Eds. Cambridge, MA, USA: Academic Press, 2026, pp. 53–71.
K. Nagarathna, K. K S, N. Krishnan, Dhananjeyan. S, S. Srikanth, and T. Geetha, "IoT Driven Wireless Sensor Network Routing Optimization using Improved Firefly Algorithm and Block Chain Technology," in 2025 International Conference on Intelligent Computing and Knowledge Extraction, Bengaluru, India, 2025, pp. 1–6.
H. Yi, Q. Jiang, H. Huang, L. Tang, S. Yao, and X. Jin, "MDL-Net: Multi-task Learning Network for Face Forgery Detection and Localization Using Dual-Stream Feature Extraction and Reconstruction," IEEE Transactions on Biometrics, Behavior, and Identity Science, 2026.
S. Rezaei and A. Javadpour, "Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission," Multimedia Tools and Applications, vol. 83, no. 35, pp. 82247–82280, Oct. 2024.
S. Sharma and H. Patil, "Secure data hiding scheme using firefly algorithm with hidden compression," Journal of Discrete Mathematical Sciences and Cryptography, vol. 23, no. 2, pp. 525–534, Feb. 2020.
O. F. A. Wahab, A. A. M. Khalaf, A. I. Hussein, and H. F. A. Hamed, "Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques," IEEE Access, vol. 9, pp. 31805–31815, 2021.
S. Alharthi and A. Gutub, "Adjusting image stego practicality via YCbCr color space formation," Journal of Engineering Research, vol. 14, no. 1, pp. 756–764, Mar. 2026.
N. Alanizy, A. Alanizy, N. Baghoza, M. AlGhamdi, and A. Gutub, "3-Layer PC Text Security via Combining Compression, AES Cryptography 2LSB Image Steganography," Journal of Research in Engineering and Applied Sciences, vol. 3, no. 4, pp. 118–124, Oct. 2018.
E. S. B. Hureib and A. A. Gutub, "Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography," International Journal of Computer Science and Network Security, vol. 20, no. 8, pp. 1–8, Aug. 2020.
A. Gutub and F. Al-Shaarani, "Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons," Arabian Journal for Science and Engineering, vol. 45, no. 4, pp. 2631–2644, Apr. 2020.
Z. Saeidi, A. Yazdi, S. Mashhadi, M. Hadian, and A. Gutub, "High performance image steganography integrating IWT and Hamming code within secret sharing," IET Image Processing, vol. 18, no. 1, pp. 129–139, Jan. 2024.
A. Aljarf, H. Zamzami, and A. Gutub, "Integrating machine learning and features extraction for practical reliable color images steganalysis classification," Soft Computing, vol. 27, no. 19, pp. 13877–13888, Oct. 2023.
N. A. Roslan, M. S. Lydia, and A. Gutub, "Enhancing Secure QR Code Steganography through Artificial Intelligence: A Conceptual Framework," Journal of Advanced Research in Applied Sciences and Engineering Technology, vol. 62, no. 4, pp. 224–231, Sept. 2026.
J. Hemalatha, M. Sekar, C. Kumar, A. Gutub, and A. K. Sahu, "Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier," Journal of Information Security and Applications, vol. 76, Aug. 2023, Art. no. 103541.
"BOSSbase 1.01." Digital Data Embedding Laboratory, Binghamton University, [Online]. Available: https://dde.binghamton.edu/download/.
Downloads
How to Cite
License
Copyright (c) 2026 A. V. Gahan, Geetha D. Devanagavi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
