Work Hard
Work Hard
Abstract i
List of Symbols xi
1. INTRODUCTION 1
1.1.1. Cryptography 1
1.1.2. Watermark 2
1.1.3. Steganography 3
1.4. Motivation 5
2. LITERATURE REVIEW 10
3. METHODOLOGY 34
3.1. Adaptive Artificial Bee Colony Algorithm (AABC) and Optimum Pixel
35
Adjustment Algorithm (OPA) Based Image Steganography Method
3.1.2. Adaptive Artificial Bee Colony Algorithm for Optimal Pixel Points 38
iv
3.1.3. Embedding Phase 42
3.4.5. Embedding 91
v
3.5.2. Key Generation Module 100
References 111
vi
List of Tables
Table Name of the Table Page
No Number
2.1 Tabular representation of literature Survey 24
3.1 Pseudocode for artificial bee colony algorithm 41
3.2 Optimal Pixel Adjustment Algorithm 44
3.3 Performance Analysis using Existing ABC based OPA 47
3.4 Performance Analysis using developed AABC based OPA 48
3.5 Pseudocode for hybrid EH-MBO algorithm 57
3.6 PSNR values obtained for developed (EH-MB) and Existing (EH and 63
MB) methods
3.7 MSE values obtained for developed (EH-MB) and Existing (EH and 63
MB) methods
3.8 NCC values obtained for developed (EH-MB) and Existing (EH and 64
MB) methods
3.9 AD values obtained for developed (EH-MB) and Existing (EH and 64
MB) methods
3.10 MD values obtained for developed (EH-MB) and Existing (EH and 64
MB) methods
3.11 AE values obtained for developed (EH-MB) and Existing (EH and 65
MB) methods
3.12 SC values obtained for developed (EH-MB) and Existing (EH and 65
MB) methods
3.13 Analysis of performance for images from medical database 65
3.17 PSNR, MSE and NCC values obtained for developed and existing 80
method
3.18 MD, NAE, SC, AD values obtained for developed GWO and existing 81
EH-MBO method
3.19 PSNR and MD values attained for the input database images on the 93
basis of developed WOA and existing GWO algorithm
3.20 MSE, NCC, AD, NAE and SC values attained for the input database 94
images on the basis of developed WOA and existing GWO algorithm
3.21 Performance evaluation of colour image 105
3.22 Performance evaluation of gray image 107
3.23 Performance Evaluation of developed method for different cover and 107
secret image size
3.24 Comparative analysis of existing and developed method 108
vii
List of Figures
viii
3.24 GUI obtained for Steganographic images 79
3.25 Evaluation metrics (GUI) for developed GWO and EH-MB algorithms 79
3.26 (a). Plot of PSNR 81
3.26 (b). Plot of MSE 82
ix
(a) Gray image of cover (b) gray secret image (c) L-shaped tromino
3.41 image (d) Tromino encrypted image (e) IWT-cover image 106
(f) embedded image
Histogram diagram for gray images (a). Image of cover (b). Secret
3.42 image (c). Fractally encrypted image (d). Image of stego 106
(e). Fractally decrypted (f). Secret image decryption
x
List of Symbols
d -- Time
Ap ,q -- Approximation Coefficient
V p ,q -- Vertical Coefficient
H p ,q -- Horizontal Coefficient
D p ,q -- Diagonal Coefficient
M -- Image
n -- Pixel Points
𝑃𝑥 -- Pixel location
Pxy -- y th Pixel location
xi
x max -- Upper bound
algorithm
r1 and r2 -- random vectors generated in gray wolf optimization
algorithm
𝑂𝑖 -- Original Image
𝑋 -- Height of the pixel
𝑌 -- Width of the pixel
𝑅𝐾 -- Encryption key used for Red color
𝐺𝐾 -- Encryption key used for Green color
𝐵𝐾 -- Encryption key used for Blue color
𝐻(𝑚) -- Entropy of message m
xii
List of Abbreviations
xiii
CC -- Cognitive Computing
MRSLS -- Multi-random start local search algorithm
IATP -- Image Adaptive Triangular Partition
AES -- Advanced Encryption Standard
CAT -- computerized axial tomography
BCH -- Bose–Chaudhuri–Hocquenghem
MPV -- Mid Position Value
CRC -- Cyclic Redundancy Check
PNG -- Portable Network graphics
OAEP -- Optimal Asymmetric Encryption Padding
IDA -- Information Dispersal Algorithms
MSB -- Most Significant Bits
RS -- Reed-Solomon
PVO -- Pixel Value Ordering
NMF -- Nonnegative Matrix Factorization
RIWT -- Redundant Integer Wavelet Transform
LL -- Approximation Subband
LH -- Horizontal Subband
HL -- Vertical Subband
HH -- Diagonal Detail Subband
EHO -- Elephant Herding Optimization algorithm
MBO -- Monarch Butterfly Optimization algorithm
AD -- Average Difference
SC -- Structural Content
MD -- Maximum Difference
MWO -- Multiobjective Whale Optimization
WOA -- Whale Optimization Algorithm
DES -- Data Encryption Standard
NIST -- National Institute of Standards and Technology
GUI -- Graphical User Interface
FC -- Frequency Co-efficient
OPP -- Optimal Pixel Points
LSQu -- Least Significant Quantum
EH-MBO -- Elephant Herding –Monarch Butterfly Optimization
xiv
PMS -- Pantone Matching System
STC -- S-Tree Coding
LDA -- Linear discriminant analysis
OFDM -- Orthogonal Frequency Division Multiplexing
QR -- Quick Response
BMS -- Block Matching Stereo
RESBC -- reversible-enhanced stego block chaining
UERD -- uniform embedding revisited distortion
DRT -- Discrete Ripplet Transform
ECC -- Elliptic curve cryptography
TLEA -- Three-Level Encryption Algorithm
OCML -- One-Way Coupled-Map Lattices
RDH -- Reversible Data Hiding Method
LCPSS -- Local Correlation Pattern for Image Steganalysis
ELCPSS -- Extended Local Correlation Pattern for Image Steganalysis
CAD -- Computer-Aided Diagnosis
RIH -- Reversible Information Hiding
xv
Steganography: Techniques, Analysis and
Applications
A Thesis Submitted to
VISVESVARAYA TECHNOLOGICAL UNIVERSITY
Belagavi, Karnataka, INDIA
in partial fulfilment for the award of degree of
DOCTOR OF PHILOSOPHY
In
Computer Science & Engineering
By
AMBIKA
(USN: 3PD15PEJ29)
Under the Guidance of
Guide: Co - Guide:
AMBIKA