Huffman Encoding with White Tailed Eagle Algorithm-based Image Steganography Technique
Received: 18 November 2022 | Revised: 3 December 2022 | Accepted: 15 February 2023 | Online: 2 April 2023
Corresponding author: Sultan Alkhliwi
Abstract
Since the Internet is a medium for transporting sensitive data, the privacy of the message transported has become a major concern. Image steganography has become a prominent tool for hiding data to ensure privacy during transfer. An efficient steganography system is essential to accomplish the best embedding capacity and maintain the other parameters at a satisfying level. Image encryption systems provide a secure and flexible system to maintain the privacy of image conversion and storage in the transmission system. Many existing image steganography methods can be attacked by various techniques, or do not support many image formats for embedding. To resolve these shortcomings, this study presents the Huffman Encoding with White Tailed Eagle Algorithm-based Image Steganography (HEWTEA-IS) technique, aiming to achieve secrecy with no compromise in image quality. The HEWTEA-IS method uses Discrete Wavelet Transform (DWT) for the decomposition of images into different subbands, and Huffman encoding to determine the embedding bits on the decomposed blocks and offer an additional layer of security. Moreover, the WTEA resolves the problem of imperceptibility by identifying the optimal probable position in the cover image for embedding secret bits. The proposed algorithm was simulated and examined in terms of different measures, and an extensive experimental analysis ensured that it is superior to other methods in several aspects.
Keywords:
image steganography, embedding process, Huffman encoding, image decomposition, securityDownloads
References
B. Lakshmi Sirisha and B. Chandra Mohan, "Review on spatial domain image steganography techniques," Journal of Discrete Mathematical Sciences and Cryptography, vol. 24, no. 6, pp. 1873–1883, Aug. 2021. DOI: https://doi.org/10.1080/09720529.2021.1962025
H. G. Zaini, "Image Segmentation to Secure LSB2 Data Steganography," Engineering, Technology & Applied Science Research, vol. 11, no. 1, pp. 6632–6636, Feb. 2021. DOI: https://doi.org/10.48084/etasr.3859
V. K. Sharma, P. C. Sharma, H. Goud, and A. Singh, "Hilbert quantum image scrambling and graph signal processing-based image steganography," Multimedia Tools and Applications, vol. 81, no. 13, pp. 17817–17830, May 2022. DOI: https://doi.org/10.1007/s11042-022-12426-w
M. Tarhda, R. E. Gouri, and L. Hlou, "Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment," Engineering, Technology & Applied Science Research, vol. 8, no. 6, pp. 3515–3520, Dec. 2018. DOI: https://doi.org/10.48084/etasr.2334
N. Ayub and A. Selwal, "An improved image steganography technique using edge based data hiding in DCT domain," Journal of Interdisciplinary Mathematics, vol. 23, no. 2, pp. 357–366, Feb. 2020. DOI: https://doi.org/10.1080/09720502.2020.1731949
S. Rustad, D. R. I. M. Setiadi, A. Syukur, and P. N. Andono, "Inverted LSB image steganography using adaptive pattern to improve imperceptibility," Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 6, Part B, pp. 3559–3568, Jun. 2022 DOI: https://doi.org/10.1016/j.jksuci.2020.12.017
W. Alexan, M. E. Beheiry, and O. Gamal-Eldin, "A Comparative Study Among Different Mathematical Sequences in 3D Image Steganography.," International Journal of Computing and Digital Systems, vol. 9, no. 4, pp. 545–553, Jul. 2020. DOI: https://doi.org/10.12785/ijcds/090403
R. J. Rasras, Z. A. AlQadi, and M. R. A. Sara, "A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages," Engineering, Technology & Applied Science Research, vol. 9, no. 1, pp. 3681–3684, Feb. 2019. DOI: https://doi.org/10.48084/etasr.2380
N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, "Image Steganography: A Review of the Recent Advances," IEEE Access, vol. 9, pp. 23409–23423, 2021. DOI: https://doi.org/10.1109/ACCESS.2021.3053998
J. Khandelwal, V. K. Sharma, J. K. Raguru, and H. Goyal, "Recent Trend of Transform Domain Image Steganography Technique for Secret Sharing," in Cyber Warfare, Security and Space Research, Jaipur, India, 2022, pp. 171–185. DOI: https://doi.org/10.1007/978-3-031-15784-4_14
S. Dhawan and R. Gupta, "Analysis of various data security techniques of steganography: A survey," Information Security Journal: A Global Perspective, vol. 30, no. 2, pp. 63–87, Mar. 2021. DOI: https://doi.org/10.1080/19393555.2020.1801911
S. Pramanik and S. Suresh Raja, "A Secured Image Steganography Using Genetic Algorithm," Advances in Mathematics: Scientific Journal, vol. 9, no. 7, pp. 4533–4541, Jul. 2020. DOI: https://doi.org/10.37418/amsj.9.7.22
A. Gaffar, A. B. Joshi, S. Singh, and K. Srivastava, "A high capacity multi-image steganography technique based on golden ratio and non-subsampled contourlet transform," Multimedia Tools and Applications, vol. 81, no. 17, pp. 24449–24476, Jul. 2022. DOI: https://doi.org/10.1007/s11042-022-12246-y
R. Mansour and M. Girgis, "Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications," Computers, Materials & Continua, vol. 68, no. 3, pp. 4069–4085, 2021. DOI: https://doi.org/10.32604/cmc.2021.017064
S. Alsubai, M. Hamdi, S. Abdel-Khalek, A. Alqahtani, A. Binbusayyis, and R. F. Mansour, "Bald eagle search optimization with deep transfer learning enabled age-invariant face recognition model," Image and Vision Computing, vol. 126, Oct. 2022, Art. no. 104545. DOI: https://doi.org/10.1016/j.imavis.2022.104545
P. D. Shah and R. S. Bichkar, "Secret data modification based image steganography technique using genetic algorithm having a flexible chromosome structure," Engineering Science and Technology, an International Journal, vol. 24, no. 3, pp. 782–794, Jun. 2021. DOI: https://doi.org/10.1016/j.jestch.2020.11.008
A. Miri and K. Faez, "An image steganography method based on integer wavelet transform," Multimedia Tools and Applications, vol. 77, no. 11, pp. 13133–13144, Jun. 2018. DOI: https://doi.org/10.1007/s11042-017-4935-z
Maisa’a Abid Ali K. Al-Dabbas; Ashwaq Alabaichi; Adnan Salih, "Image steganography using least significant bit and secret map techniques," International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 935–946, Feb. 2020. DOI: https://doi.org/10.11591/ijece.v10i1.pp935-946
A. Hamza, D. Shehzad, M. S. Sarfraz, U. Habib, and N. Shafi, "Novel Secure Hybrid Image Steganography Technique Based on Pattern Matching," KSII Transactions on Internet and Information Systems (TIIS), vol. 15, no. 3, pp. 1051–1077, 2021. DOI: https://doi.org/10.3837/tiis.2021.03.013
A. Jaradat, E. Taqieddin, and M. Mowafi, "A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization," Security and Communication Networks, vol. 2021, Jun. 2021, Art. no. e6679284. DOI: https://doi.org/10.1155/2021/6679284
B. Ray, S. Mukhopadhyay, S. Hossain, S. K. Ghosal, and R. Sarkar, "Image steganography using deep learning based edge detection," Multimedia Tools and Applications, vol. 80, no. 24, pp. 33475–33503, Oct. 2021. DOI: https://doi.org/10.1007/s11042-021-11177-4
A. Gutub and M. Al-Ghamdi, "Hiding shares by multimedia image steganography for optimized counting-based secret sharing," Multimedia Tools and Applications, vol. 79, no. 11, pp. 7951–7985, Mar. 2020. DOI: https://doi.org/10.1007/s11042-019-08427-x
P. K. Muhuri, Z. Ashraf, and S. Goel, "A Novel Image Steganographic Method based on Integer Wavelet Transformation and Particle Swarm Optimization," Applied Soft Computing, vol. 92, Jul. 2020, Art. no. 106257. DOI: https://doi.org/10.1016/j.asoc.2020.106257
B. Arandian, A. Iraji, H. Alaei, S. Keawsawasvong, and M. L. Nehdi, "White-Tailed Eagle Algorithm for Global Optimization and Low-Cost and Low-CO2 Emission Design of Retaining Structures," Sustainability, vol. 14, no. 17, Jan. 2022, Art. no. 10673. DOI: https://doi.org/10.3390/su141710673
N. Sharma and U. Batra, "An enhanced Huffman-PSO based image optimization algorithm for image steganography," Genetic Programming and Evolvable Machines, vol. 22, no. 2, pp. 189–205, Jun. 2021. DOI: https://doi.org/10.1007/s10710-020-09396-z
G. P. Pandey, "Implementation of DNA Cryptography in Cloud Computing and Using Huffman Algorithm, Socket Programming and New Approach to Secure Cloud Data." Rochester, NY, Aug. 07, 2019. DOI: https://doi.org/10.2139/ssrn.3501494
"SIPI Image Database." https://sipi.usc.edu/database/database.php.
Downloads
How to Cite
License
Copyright (c) 2023 Sultan Alkhliwi
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.