SlideShare a Scribd company logo
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 1, February 2018, pp. 379~389
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i1.pp379-389  379
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Ant Colony Optimization (ACO) based Data Hiding in Image
Complex Region
Sahib Khan
Department of Electronics and Telecommunications, Politecnico Di Torino, 10129 Italy
Article Info ABSTRACT
Article history:
Received Sep 9, 2017
Revised Dec 25, 2017
Accepted Jan 11, 2018
This paper presents data an Ant colony optimization (ACO) based data
hiding technique. ACO is used to detect complex region of cover image and
afterward, least significant bits (LSB) substitution is used to hide secret
information in the detected complex regions’ pixels. ACO is an algorithm
developed inspired by the inborn manners of ant species. The ant leaves
pheromone on the ground for searching food and provisions. The proposed
ACO-based data hiding in complex region establishes an array of
pheromone, also called pheromone matrix, which represents the complex
region in sequence at each pixel position of the cover image. The pheromone
matrix is developed according to the movements of ants, determined by local
differences of the image element’s intensity. The least significant bits of
complex region pixels are substituted with message bits, to hide secret
information. The experimental results, provided, show the significance of the
performance of the proposed method.
Keyword:
Ant colony optimization
Edge detection
LSB Steganography
Pheromone matrix
Steganalysis
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Sahib Khan,
Department of Electronics and Telecommunications,
Politecnico di Torino,
Corso Duca degli Abruzzi, 24, 10129 Torino TO, Italy.
Email: sahib.khan@polito.it, engrsahib_khn@yahoo.com
1. INTRODUCTION
Image steganography is information hiding technique that use digital image as cover media. Along
with secret exchange of information, it has various other applications e.g. copyright, data integrity and
authentication [1], [2]. Digital audio, video and text can also be used as a cover, but image is adopted most
widely for this purpose due its high redundancy.
Data hiding techniques are explored by many researchers and proposed various good hiding
techniques to insure security of hidden information. Honsinger et al.’s and Fridrich et al.’s proposed
steganography methods in spatial domain by hiding secret information directly in image pixels [3], [4]. Sahib
et al. proposed variable least significant bits (VLSB) steganography and presented techniques, like modular
distance technique (MDT) [5], decreasing distance decreasing bits algorithm (DDDBA) [6], varying index
varying bits substitution (VIVBS) algorithm [7]. Sahib et al., inspired from chipper block chaining (CBC)
encryption, proposed new techniques of stego block chaining (SBC) and enhanced stego block chaining
(ESBC) to hide information in digital images [8].
The aim of all data hiding techniques is to make the presence of hidden information undetectable
and this attracted the attention of researcher to make use of HVS limitation. HVS can very easily detect the
variations made in smooth area of cover image as compared to the changes in complex region. Due to this
characteristic of the HVS, complex region of cover image is subjected to hiding and smooth region is not
modified [9], [10]. In some techniques, complex region is subjected to more to data hiding than smooth
region. This approach results in high quality of the stego-image, which means increase in the security of
hidden information. Various techniques, including LSB methods [11], PVD methods, and side-match
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389
380
methods [12], [13], have been proposed to hide information in complex area of cover; a detail can be found
in [14], [15]. But, these techniques present a low hiding capacity and don’t comply completely with the rules
that the complex region can bear more changes than smooth region [12], [13]. To increase data hiding
capacity Jung et al. [16] presented a new technique that hides data in smooth areas along with edges, but
results in more distortion. However, the methods adopted by these data hiding techniques for detection of
complex region are more vulnerable to noise.
The proposed technique is one such effort towards data hiding in complex region of cover image.
The hiding information in cover media does not attract the human attention and the presence of hidden
information is not perceivable to HVS. This technique made use of ACO, a nature-inspired optimization
algorithm [17-19] for detection of complex region [20], and secret information are embedded in LSB of the
complex region pixels [21], [22]. The forthcoming contents of the paper are organized as follow. Section 2,
presents the ACO based data hiding in complex, the experimental results are presented in Section 3 and at
end papers is concluded with Section 4.
2. PROPOSED TECHNIQUE
The detection of complex region in cover image is the key step in hiding of information in complex
region. There various methods to detect complex region in images. These methods include canny edge
detection, deriche, differential, sobel, prewitt, Roberts cross and other methods. These methods are very
efficient to detect complex region in digital images but, these methods don’t comply completely with the
rules that the complex region and hide data in complex region previous methods hide data in the complex
region of cover image as most of these methods detect weak and disconnected edge pixels and consider that
as true complex region. But, these techniques also hide data in those pixels that doesn’t belong to edges and
are more vulnerable to noise. In this paper an ACO based technique has been used to detect complex region
in cover image [23], [24] and then to target this region for data hiding using LSB steganography.
ACO-based image edge detection approach, construct a pheromone matrix, utilizing many ants to
move on a 2-D image. The movement of the ants is guided by the local differences of the image pixel’s
intensity values. The entries of the pheromone matrix represent the edge information at each pixel location of
the cover image. The ACO based technique is initialized first and run for N iterations to build pheromone
matrix. The process performs both construction and update steps iteratively. At the end decision process is
used to determine the pixels belong to complex region. The whole process is explained here
in detail as follow.
2.1. Initialization
A digital image is an array of pixels with intensity level I. Let consider a grayscale image of
size , as cover medium. A total of ants are randomly assigned on an image . Each pixel of the
cover image is considered as a node. To initialize the complex region detection, process the initial value of
each pheromone matrix’s component is set to a constant .
2.2. Construction
The construction process is composed various steps, at the nth construction-step, one ant, from a
total of ant, is randomly selected. The selected ant can move over the cover image for movement
steps. The movement of the ant from initial node to its neighbor node is done according to the
transition probability as given by Equation (1)
( )
∑ ( )
(1)
Where
Pheromone value at node
Neighborhood (4 or 8-connected) node of the node
Heuristic information at node
: Influence of pheromone matrix
: Influence of heuristic matrix
The heuristic information at any node is calculated using Equation (2).
Int J Elec & Comp Eng ISSN: 2088-8708 
Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan)
381
(2)
Where is the normalization factor and given by Equation (3).
∑ ∑ (3)
Where
The intensity level pixel of image C
The depends on the variation in gray levels of strength of pixels in the clique is
represented as by Equation (4)
( ) (| | | | | | | |
| | | | | | | |) (4)
To calculate f (.) there are four different function Flat, Gaussian, Sine and Wave and each of them is
considered in this paper and are given here in Equation (5) to Equation (8).
(5)
(6)
{
( )
(7)
{
( )
(8)
Where
: The shape control parameter for functions.
2.3. Updating Stage
The pheromone matrix is updated in two steps. The first updating is performed, in each construction
step, after the movement of each ant, according to Equation (9)
{ (9)
Where
The evaporation rates
: Determined by heuristic matrix is equal to
When the entire ant completes their movement in each construction step, the second updating
process is performed using Equation (10).
(10)
Where
The pheromone decay coefficient
2.4. Decision Stage
The decision process is the final is binary decision-making process to decide whether the pixel
belong to complex region or smooth region. In this a threshold is applied on the final pheromone matrix .
The threshold is computed according to the technique presented in [20].
The mean of value of pheromone matrix is selected as initial threshold . Then all the pheromone
matrix entries are divided in two groups. One group contains all the value smaller than the initial threshold
and other possess the value greater than the initail threshold . Means values of each of the group is
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389
382
calculated and new threshold is defined as the average of both means. The process of for calculation of
threshold is repeated till the threshold value reaches to a stable value in term of user define tolerance .
Final decision for each pixel at is made on the bases of the pheromone vale at postion
compared with the final threshold value as given by Equation (11).
{ (11)
Where
: The baniary image
If the pheromone value at current position is greater than threshold it is, consider as a part of
complex region and other its treated as smooth region pixel.
2.5. Sub Section 1
The data hiding step is the LSB substitution process. This stage hides secret information in the LSBs
of the cover image on the bases of the complex region detected. In this process whole cover image is
considered and is processed pixel by pixel. Each pixel is check whether it belongs to complex region or
smooth region. If the pixel corresponds to smooth region it is left unaffected and another pixel is considered.
And if the pixel belongs to complex region then its LSB bits are substitued with the secret information.
This process continues until the whole cover image is explored. The hiding process is accomplished in
following manner.
A pixel is cosider as complex region pixel if its correspding =0 and is consider smooth
region componant if . Lets cosider a secret messahe to be hidden in complex region and is final
stego image obtained after information hiding. The stego image is given by Equation (12).
{ (12)
Figure 1. ACO-based data hiding in complex region
3. IMPLEMENTATION, EXPERIMENTAL RESULTS AND ANALYSIS
To hide secret data in complex region of cover image using ACO algorithm and get experimental
results, many different cover images are used. These cover images include, Cameraman, Lena, House, Jelly
Int J Elec & Comp Eng ISSN: 2088-8708 
Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan)
383
beans, Mandrill, Pepper, Tiffany and Tree as presented in Figures 2(a), 2(b), 2(c), 2(d), 2(e), 2(f), 2(g) and
2(h), respectively. All these cover images are taken from image used are of the same size of . Each
of the cover is subjected to data hiding using the proposed technique. As discusses earlier ACO can be used
for complex region detection using four different functions i.e. Flat, Gaussian, Sine and Wave as given by
Equation (5) to Equation (8), respectively. After the complex region and smooth region’s pixel classification,
an LSB substitution technique is used for data hiding in the complex region’s pixels only.
ACO approach is dependent on a very large number of parameters. The parameters set for the
experimentation are given as:
The shape control parameter λ= 10
The influence of pheromone matrix α = 1
The influence of heuristic matrix = 0.1
The evaporation rate = 0.1
The pheromone decay coefficient = 0.05
To analyze the proposed technique quantitatively, the data hiding capacity the MSE and PSNR are
calculated as given by Equation (13) to Equation (15), respectively [20].
(13)
∑ ∑
(14)
(15)
(a) (b) (c)
(d) (e) (f)
(g) (h)
Figure 2. Cover Images (a) Cameraman, (b) Lena, (c) House, (d) Jelly Beans, (e) Mandrill, (f)
Pepper, (g) Tiffany, and (h) Tree
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389
384
Firstly, the proposed technique is applied on all the cover images shown in Figure 2. Flat function as
given by Equation (5) has been used in ACO based complex region detection. The stego images obtained are
shown in Figure (3). The hiding capacity, MSE and PSNR calculated for each cover image is listed
in Table 1.
(a) (b) (c)
(d) (e) (f)
(g) (h)
Figure 3. Stego Images obtained using Flat function given in Equation (5) (a) Cameraman, (b) Lena, (c)
House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree
Table 1. Hiding Capacity, PSNR and MSE using Flat Function
Cover Image PSNR (dB) MSE Hiding Capacity (%)
Cameraman 45.74131 1.7336 4.1229
Lena 50.27679 0.6101 4.5105
House 46.43288 1.4784 4.0344
Jelly Beans 46.71787 1.3845 4.0558
Mandrill 45.95596 1.6500 5.5817
Pepper 47.14022 1.2562 4.5776
Tiffany 45.84321 1.6934 4.5837
Tree 45.77451 1.7204 5.2399
Secondly, ACO based data hiding in complex region techniques is implemented the same cover
images shown in Figure 2, but using Gaussian function, as given by Equation (6). The resulted stego images
Int J Elec & Comp Eng ISSN: 2088-8708 
Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan)
385
are displayed here Figure 4. The hiding capacity, MSE and PSNR calculated, using each cover image for
information hiding, is listed in Table 2.
(a) (b) (c)
(d) (e) (f)
(g) (h)
Figure 4. Stego Images obtained using Gaussian function given in Equation (6) (a) Cameraman, (b) Lena, (c)
House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree
Table 2. Hiding Capacity, PSNR and MSE using GaussianFunction
Cover Image PSNR (dB) MSE Hiding Capacity (%)
Cameraman 46.23899 1.5459 3.1647
Lena 52.68888 0.3501 2.1667
House 48.79289 0.8586 1.8951
Jelly Beans 48.3673 0.9470 2.4780
Mandrill 50.35944 0.5986 2.6489
Pepper 48.23987 0.9752 2.9724
Tiffany 49.16224 0.7886 2.0294
Tree 47.12503 1.2606 4.3274
Similarly, in third step all the cover images given in Figure 2 are subjected to data hiding using the
proposed technique. Moreover, this time Sine function given in Equation (7) is used in ACO complex region
detection. The obtained stego images, with hidden information inside it, are shown here Figure (5). The
Table 3 contains the calculated hiding capacity, MSE and PSNR for all cover images.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389
386
(a) (b) (c)
(d) (e) (f)
(g) (h)
Figure 5. Stego Images obtained using Sine function given in Equation (7) (a) Cameraman, (b) Lena, (c)
House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree
Table 3. Hiding Capacity, PSNR and MSE using Sine Function
Cover Image PSNR (dB) MSE Hiding Capacity (%)
Cameraman 45.23581 1.9476 4.4312
Lena 50.54471 0.5736 4.3854
House 46.63738 1.4104 3.7842
Jelly Beans 45.67469 1.7604 4.1870
Mandrill 46.5508 1.4388 5.8777
Pepper 46.12038 1.5887 4.5044
Tiffany 46.13627 1.5829 4.4250
Tree 45.81178 1.7057 5.5786
Lastly, Wave function, mathematically given by Equation (8), is used by ACO algorithm to classify,
the complex and smooth region’s pixels and the cover images obtained after data hiding in complex region
are shown in Figure 6. The values of hiding capacity, MSE and PSNR are listed in Table 4.
The results show that all the ACO based data hiding in complex region results in significantly high
quality stego images. However, Flat function in Equation (5) and Sine function in Equation (7), are very
efficient both in term of hiding capacity and stego image quality.
Int J Elec & Comp Eng ISSN: 2088-8708 
Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan)
387
(a) (b) (c)
(d) (e) (f)
(g) (h)
Figure 6. Stego Images obtained using Wave function given in Equation (8) (a) Cameraman, (b) Lena, (c)
House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree
Table 4. Hiding Capacity, PSNR and MSE using Wave Function
Cover Image PSNR (dB) MSE Hiding Capacity (%)
Cameraman 46.90996 1.3246 2.9755
Lena 52.65306 0.3530 2.4200
House 48.5624 0.9054 2.0874
Jelly Beans 47.54692 1.1439 2.8076
Mandrill 48.88336 0.8409 2.8473
Pepper 47.8757 1.0605 2.8661
Tiffany 49.45377 0.7374 2.1210
Tree 46.90079 1.3274 4.1229
4. COMPARISON WITH OTHER TECHNIQUES
As discussed in Section 3, the proposed method results in a very high quality stego images with
PSNR greater than 100dB for all images using all four functions mentioned in Section 2. Here, this represents
the comparison of the proposed method with different previous techniques. As the proposed technique is data
hiding method that hides secret information in complex region of cover images. Therefore, a comparison of
the proposed technique is made only with the data hiding techniques that uses edges or complex region of
cover images. The comparison is made with Fridrich et al. [3], Honsinger et al. [4], Khan et al. [24], Goljan
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389
388
et al. [25], Macq and Dewey [26], and Vleeschouwer et al. [27], in term of PSNR and hiding capacity. The
comparison made using Lena and Mandrill as cover images. The resulted values of hiding capacity and
PNSR are listed in Table 5.
The Honsinger et al. and Fridrich et al. techniques results in a hiding capacity of less than 0.0156
bpp and 0.0156 bpp, respectively. Vleeschourwer et al. achieve a hiding capacity of 0.156 bpp, with
significantly stego image quality of 30dB in term of PSNR. Macq and Deweyand proposed technique,
increases the data hiding capacity and results in a hiding capacity more than Honsinger et al., Fridrich et al.
and Vleeschourwer et al. techniques. A hiding capacity of less than 0.03125 is recorded, but the visual
quality of the stego image is affected very much. Goljan et al. and Khan et al. presented techniques claim
hiding capacity of 0.36bpp and 0.33bpp, with PSNR of 39.00dB and 46.23dB respectively. The proposed
technique resulted in a hiding capacity of 0.36 and 0.44 with PNSR greater than 50dB and 45dB for Lena and
Mandrill cover images, correspondingly.
The Table 5 shows that the PSNR of the proposed technique is significantly higher than the PSNR
values of all the other techniques. While, the hiding capacity of the proposed technique is also higher than all
techniques except that of Goljan et al. and Khan et al. techniques. ACO based data hiding in complex region
has equal data hiding capacity as that of Goljan et al. but, the quality of the stego images is significantly
better than the Goljan et al.
Table 5. Comparison of proposed method with other methods
Technique
Lena Lena
Hiding Capacity (bpp) PSNR (dB) Hiding Capacity (bpp) PSNR (dB)
Honsinger et al. <0.0156 - <0.0156 -
Fridrich et al. 0.0156 - 0.0156 -
Vleeschouwer et al. 0.0156 30.00 0.0156 29.00
Macq and Deweyand <0.03125 - <0.03125 -
Goljan et al. 0.36 39.00 0.44 39.00
Khan et al. 0.33 46.23 0.669 44.12
Porposed technique 0.36 >50 0.44 >45
5. CONCLUSION
ACO based data hiding in complex region of digital images is an efficient data hiding technique that
successfully exploits the HVS limitation of less sensitivity to the changes in complex regions. This technique
results in high data hiding capacity with significantly good quality stego image. The beauty of the proposed
technique lies in the fact that hiding capacity can be controlled by changing the function in ACO
classification stage and the hiding capacity can be increased significantly with affecting the PSNR by
choosing either Flat function in Equation (5) or Sine function in Equation (7), instead of Gaussian and Wave
functions in Equation (6) and Equation (8), respectively. The hiding capacity and PSNR of the proposed work
is higher than or comparable to other methods. The PSNR of the proposed method remain above 100 dB for
all images as discussed in Section IV. In short, the ACO based data hiding in complex region technique is an
efficient and secure data hiding method, resulting in a high quality stego-image, significantly high PSNR and
reasonable data hiding capacity.
REFERENCES
[1] N. F. Johnson, and S. Jajodia, "Exploring steganography: Seeing the unseen," Computer, vol. 31(2), pp. 26-34, 1998.
[2] S. Khan, M. A. Irfan, M. Ismail, T. Khan, and N. Ahmad, “Dual lossless compression based image steganography
for low data rate channels,” In International Conference on Communication Technologies (ComTech), 2017, pp.
60-64.
[3] J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," Photonics West 2001-Electronic Imaging.
International Society for Optics and Photonics, 2001.
[4] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing
embedded data," U.S. Patent No. 6,278,791. 21 Aug. 2001.
[5] S. Khan, and M. H. Yousaf, "Implementation of VLSB Stegnography Using Modular Distance Technique,"
Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Springer New York,
pp. 511-525, 2013.
[6] M. A. Irfan, N. Ahmad, and S. Khan, “Analysis of Varying Least Significant Bits DCT and Spatial Domain
Stegnography,” Sindh Univ. Res. Jour. (Sci. Ser.), vol. 46 (3), pp. 301-306, 2014.
[7] S. Khan, N. Ahmad, and M. Wahid, “Varying index varying bits substitution algorithm for the implementation of
VLSB steganography,” Journal of the Chinese Institute of Engineers, vol. 39 (1), pp. 101-109, 2016.
Int J Elec & Comp Eng ISSN: 2088-8708 
Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan)
389
[8] S. Khan, M. Ismail, T. Khan, and N. Ahmad, "Enhanced stego block chaining (ESBC) for low bandwidth
channels," Security and Communication Networks, vol. 9(18), pp. 6239-6247, 2016.
[9] G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, "Distortionless data hiding based on integer wavelet
transform," Electronics Letters, vol. 38(25), pp. 1646-1648, 2002.
[10] N. Guan, D. Tao, Z. Luo, and B. Yuan, "Online nonnegative matrix factorization with robust stochastic
approximation," IEEE Transactions on Neural Networks and Learning Systems, vol. 23(7), pp. 1087-1099, 2012.
[11] N. Guan, D. Tao, Z. Luo, and B. Yuan, "NeNMF: an optimal gradient method for nonnegative matrix factorization,"
IEEE Transactions on Signal Processing, vol. 60(6), pp. 2882-2898, 2012.
[12] W. Hong, and T. S. Chen, "A novel data embedding method using adaptive pixel pair matching," IEEE Transactions
on Information Forensics and Security, vol. 7(1), pp. 176-184, 2012.
[13] W. Hong, T. S. Chen, and C. W. Shiu, "Reversible data hiding for high quality images using modification of
prediction errors," Journal of Systems and Software, vol. 82(11), pp. 1833-1842, 2009.
[14] C. S. Hsu, and S. F. Tu, "Probability-based tampering detection scheme for digital images," Optics Communications,
vol. 283(9), pp. 1737-1743, 2010.
[15] M. S. Subhedar, and V. H. Mankar, “Current status and key issues in image steganography: A survey,” Computer
science review, vol. 13, pp. 95-113, 2014.
[16] K. H. Jung, and K. Y. Yoo, "Data hiding using edge detector for scalable images," Multimedia tools and
applications, vol. 71(3), pp. 1455-1468, 2014.
[17] M. Dorigo and S. Thomas, Ant Colony Optimization. Cambridge: MIT Press, 2004.
[18] H.-B. Duan, Ant Colony Algorithms: Theory and Applications. Beijing: Science Press, 2005.
[19] J. Tian, W. Yu, and S. Xie, “An ant colony optimization algorithm for image edge detection,” In IEEE Congress
on Evolutionary Computation, 2008. CEC 2008. (IEEE World Congress on Computational Intelligence), 2008, pp.
751-756.
[20] S. K. Mohapatra, and S. Prasad, “Test Case Reduction Using Ant Colony Optimization for Object Oriented
Program,” International Journal of Electrical and Computer Engineering, vol. 5(6), pp. 1424-1432, 2015.
[21] M. R. PourArian, and A. Hanani, “Blind Steganography in Color Images by Double Wavelet Transform and
Improved Arnold Transform,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 3(3), pp.
586-600, 2016.
[22] M. S. Arya, M. Rani, and C. S. Bedi, “Improved Capacity Image Steganography Algorithm using 16-Pixel
Differencing with n-bit LSB Substitution for RGB Images,” International Journal of Electrical and Computer
Engineering, vol. 6(6), pp. 2735-2741, 2016.
[23] Z. Wang, and A. C. Bovik, "A universal image quality index," IEEE Signal Processing Letters, vol. 9(3), pp. 81-84,
2002.
[24] M. Goljan, J. J. Fridrich, and R. Du, "Distortion-free data embedding for images," Information Hiding. Springer
Berlin Heidelberg, 2001.
[25] B. Macq, and F. Dewey, "Trusted headers for medical images," DFG VIII-D II Watermarking Workshop, Erlangen,
Germany, vol. 10, 1999.
[26] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, "Circular interpretation of histogram for reversible watermarking,"
IEEE Fourth Workshop on Multimedia Signal Processing, 2001.
[27] S. Khan, N. Ahmad, M. Ismail, N. Minallah, and T. Khan, “A secure true edge based 4 least significant bits
steganography,” In International Conference on Emerging Technologies (ICET), 2015, Islamabad, Pakistan,
pp. 1-4.

More Related Content

PDF
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
PDF
A novel secure image steganography method based on chaos theory in spatial do...
PDF
Robust foreground modelling to segment and detect multiple moving objects in ...
PDF
Minimum image disortion of reversible data hiding
PDF
O017429398
PDF
F045033440
PDF
I017425763
PDF
E017443136
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
A novel secure image steganography method based on chaos theory in spatial do...
Robust foreground modelling to segment and detect multiple moving objects in ...
Minimum image disortion of reversible data hiding
O017429398
F045033440
I017425763
E017443136

What's hot (19)

PDF
Various Applications of Compressive Sensing in Digital Image Processing: A Su...
PDF
Optimized Neural Network for Classification of Multispectral Images
PDF
Dj31514517
PDF
Low complexity features for jpeg steganalysis using undecimated dct
PDF
Adaptive block-based pixel value differencing steganography
PDF
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
PDF
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...
PDF
G1802053147
PDF
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
PDF
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
PDF
Multi Object Tracking Methods Based on Particle Filter and HMM
PDF
An enhanced fireworks algorithm to generate prime key for multiple users in f...
PDF
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
PDF
An Efficient Block Matching Algorithm Using Logical Image
PDF
IRJET - Review of Various Multi-Focus Image Fusion Methods
PDF
An unsupervised method for real time video shot segmentation
PDF
Implementation and performance evaluation of
PDF
Detection of Bridges using Different Types of High Resolution Satellite Images
PDF
Particle Swarm Optimization for Nano-Particles Extraction from Supporting Mat...
Various Applications of Compressive Sensing in Digital Image Processing: A Su...
Optimized Neural Network for Classification of Multispectral Images
Dj31514517
Low complexity features for jpeg steganalysis using undecimated dct
Adaptive block-based pixel value differencing steganography
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Noise Level Estimation for Digital Images Using Local Statistics and Its Appl...
G1802053147
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
AUTOMATIC THRESHOLDING TECHNIQUES FOR SAR IMAGES
Multi Object Tracking Methods Based on Particle Filter and HMM
An enhanced fireworks algorithm to generate prime key for multiple users in f...
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING
An Efficient Block Matching Algorithm Using Logical Image
IRJET - Review of Various Multi-Focus Image Fusion Methods
An unsupervised method for real time video shot segmentation
Implementation and performance evaluation of
Detection of Bridges using Different Types of High Resolution Satellite Images
Particle Swarm Optimization for Nano-Particles Extraction from Supporting Mat...
Ad

Similar to Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region (20)

PDF
Stereo matching based on absolute differences for multiple objects detection
PDF
IJSRED-V2I2P12
PDF
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
PDF
A new partial image encryption method for document images using variance base...
PDF
Ijcatr04021016
PDF
Information hiding in edge location of video using amalgamate fft and cubic s...
PDF
Information Hiding using LSB Technique based on Developed PSO Algorithm
PDF
Ijetcas14 527
PDF
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
PDF
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
PDF
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
PDF
A PLAIN- IMAGE DEPENDENT IMAGE ENCRYPTION SCHEME USING HALF-PIXEL-LEVEL INTER...
PDF
Strategy for Foreground Movement Identification Adaptive to Background Variat...
PDF
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
PDF
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
PDF
Kk3517971799
PDF
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
PDF
A New Chaos Based Image Encryption and Decryption using a Hash Function
PDF
Ay33292297
PDF
Ay33292297
Stereo matching based on absolute differences for multiple objects detection
IJSRED-V2I2P12
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A new partial image encryption method for document images using variance base...
Ijcatr04021016
Information hiding in edge location of video using amalgamate fft and cubic s...
Information Hiding using LSB Technique based on Developed PSO Algorithm
Ijetcas14 527
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
A PLAIN- IMAGE DEPENDENT IMAGE ENCRYPTION SCHEME USING HALF-PIXEL-LEVEL INTER...
Strategy for Foreground Movement Identification Adaptive to Background Variat...
MULTIPLE HUMAN TRACKING USING RETINANET FEATURES, SIAMESE NEURAL NETWORK, AND...
03. Swarm Key Optimization for Chaos Based Image Encryption.pdf
Kk3517971799
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
A New Chaos Based Image Encryption and Decryption using a Hash Function
Ay33292297
Ay33292297
Ad

More from IJECEIAES (20)

PDF
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
PDF
Embedded machine learning-based road conditions and driving behavior monitoring
PDF
Advanced control scheme of doubly fed induction generator for wind turbine us...
PDF
Neural network optimizer of proportional-integral-differential controller par...
PDF
An improved modulation technique suitable for a three level flying capacitor ...
PDF
A review on features and methods of potential fishing zone
PDF
Electrical signal interference minimization using appropriate core material f...
PDF
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
PDF
Bibliometric analysis highlighting the role of women in addressing climate ch...
PDF
Voltage and frequency control of microgrid in presence of micro-turbine inter...
PDF
Enhancing battery system identification: nonlinear autoregressive modeling fo...
PDF
Smart grid deployment: from a bibliometric analysis to a survey
PDF
Use of analytical hierarchy process for selecting and prioritizing islanding ...
PDF
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
PDF
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
PDF
Adaptive synchronous sliding control for a robot manipulator based on neural ...
PDF
Remote field-programmable gate array laboratory for signal acquisition and de...
PDF
Detecting and resolving feature envy through automated machine learning and m...
PDF
Smart monitoring technique for solar cell systems using internet of things ba...
PDF
An efficient security framework for intrusion detection and prevention in int...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Embedded machine learning-based road conditions and driving behavior monitoring
Advanced control scheme of doubly fed induction generator for wind turbine us...
Neural network optimizer of proportional-integral-differential controller par...
An improved modulation technique suitable for a three level flying capacitor ...
A review on features and methods of potential fishing zone
Electrical signal interference minimization using appropriate core material f...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Bibliometric analysis highlighting the role of women in addressing climate ch...
Voltage and frequency control of microgrid in presence of micro-turbine inter...
Enhancing battery system identification: nonlinear autoregressive modeling fo...
Smart grid deployment: from a bibliometric analysis to a survey
Use of analytical hierarchy process for selecting and prioritizing islanding ...
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Remote field-programmable gate array laboratory for signal acquisition and de...
Detecting and resolving feature envy through automated machine learning and m...
Smart monitoring technique for solar cell systems using internet of things ba...
An efficient security framework for intrusion detection and prevention in int...

Recently uploaded (20)

PDF
Digital Logic Computer Design lecture notes
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPT
Project quality management in manufacturing
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Construction Project Organization Group 2.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
web development for engineering and engineering
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PDF
composite construction of structures.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
Digital Logic Computer Design lecture notes
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Project quality management in manufacturing
Internet of Things (IOT) - A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Construction Project Organization Group 2.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
web development for engineering and engineering
R24 SURVEYING LAB MANUAL for civil enggi
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
composite construction of structures.pdf
bas. eng. economics group 4 presentation 1.pptx

Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 1, February 2018, pp. 379~389 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i1.pp379-389  379 Journal homepage: http://iaescore.com/journals/index.php/IJECE Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region Sahib Khan Department of Electronics and Telecommunications, Politecnico Di Torino, 10129 Italy Article Info ABSTRACT Article history: Received Sep 9, 2017 Revised Dec 25, 2017 Accepted Jan 11, 2018 This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method. Keyword: Ant colony optimization Edge detection LSB Steganography Pheromone matrix Steganalysis Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Sahib Khan, Department of Electronics and Telecommunications, Politecnico di Torino, Corso Duca degli Abruzzi, 24, 10129 Torino TO, Italy. Email: sahib.khan@polito.it, engrsahib_khn@yahoo.com 1. INTRODUCTION Image steganography is information hiding technique that use digital image as cover media. Along with secret exchange of information, it has various other applications e.g. copyright, data integrity and authentication [1], [2]. Digital audio, video and text can also be used as a cover, but image is adopted most widely for this purpose due its high redundancy. Data hiding techniques are explored by many researchers and proposed various good hiding techniques to insure security of hidden information. Honsinger et al.’s and Fridrich et al.’s proposed steganography methods in spatial domain by hiding secret information directly in image pixels [3], [4]. Sahib et al. proposed variable least significant bits (VLSB) steganography and presented techniques, like modular distance technique (MDT) [5], decreasing distance decreasing bits algorithm (DDDBA) [6], varying index varying bits substitution (VIVBS) algorithm [7]. Sahib et al., inspired from chipper block chaining (CBC) encryption, proposed new techniques of stego block chaining (SBC) and enhanced stego block chaining (ESBC) to hide information in digital images [8]. The aim of all data hiding techniques is to make the presence of hidden information undetectable and this attracted the attention of researcher to make use of HVS limitation. HVS can very easily detect the variations made in smooth area of cover image as compared to the changes in complex region. Due to this characteristic of the HVS, complex region of cover image is subjected to hiding and smooth region is not modified [9], [10]. In some techniques, complex region is subjected to more to data hiding than smooth region. This approach results in high quality of the stego-image, which means increase in the security of hidden information. Various techniques, including LSB methods [11], PVD methods, and side-match
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389 380 methods [12], [13], have been proposed to hide information in complex area of cover; a detail can be found in [14], [15]. But, these techniques present a low hiding capacity and don’t comply completely with the rules that the complex region can bear more changes than smooth region [12], [13]. To increase data hiding capacity Jung et al. [16] presented a new technique that hides data in smooth areas along with edges, but results in more distortion. However, the methods adopted by these data hiding techniques for detection of complex region are more vulnerable to noise. The proposed technique is one such effort towards data hiding in complex region of cover image. The hiding information in cover media does not attract the human attention and the presence of hidden information is not perceivable to HVS. This technique made use of ACO, a nature-inspired optimization algorithm [17-19] for detection of complex region [20], and secret information are embedded in LSB of the complex region pixels [21], [22]. The forthcoming contents of the paper are organized as follow. Section 2, presents the ACO based data hiding in complex, the experimental results are presented in Section 3 and at end papers is concluded with Section 4. 2. PROPOSED TECHNIQUE The detection of complex region in cover image is the key step in hiding of information in complex region. There various methods to detect complex region in images. These methods include canny edge detection, deriche, differential, sobel, prewitt, Roberts cross and other methods. These methods are very efficient to detect complex region in digital images but, these methods don’t comply completely with the rules that the complex region and hide data in complex region previous methods hide data in the complex region of cover image as most of these methods detect weak and disconnected edge pixels and consider that as true complex region. But, these techniques also hide data in those pixels that doesn’t belong to edges and are more vulnerable to noise. In this paper an ACO based technique has been used to detect complex region in cover image [23], [24] and then to target this region for data hiding using LSB steganography. ACO-based image edge detection approach, construct a pheromone matrix, utilizing many ants to move on a 2-D image. The movement of the ants is guided by the local differences of the image pixel’s intensity values. The entries of the pheromone matrix represent the edge information at each pixel location of the cover image. The ACO based technique is initialized first and run for N iterations to build pheromone matrix. The process performs both construction and update steps iteratively. At the end decision process is used to determine the pixels belong to complex region. The whole process is explained here in detail as follow. 2.1. Initialization A digital image is an array of pixels with intensity level I. Let consider a grayscale image of size , as cover medium. A total of ants are randomly assigned on an image . Each pixel of the cover image is considered as a node. To initialize the complex region detection, process the initial value of each pheromone matrix’s component is set to a constant . 2.2. Construction The construction process is composed various steps, at the nth construction-step, one ant, from a total of ant, is randomly selected. The selected ant can move over the cover image for movement steps. The movement of the ant from initial node to its neighbor node is done according to the transition probability as given by Equation (1) ( ) ∑ ( ) (1) Where Pheromone value at node Neighborhood (4 or 8-connected) node of the node Heuristic information at node : Influence of pheromone matrix : Influence of heuristic matrix The heuristic information at any node is calculated using Equation (2).
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan) 381 (2) Where is the normalization factor and given by Equation (3). ∑ ∑ (3) Where The intensity level pixel of image C The depends on the variation in gray levels of strength of pixels in the clique is represented as by Equation (4) ( ) (| | | | | | | | | | | | | | | |) (4) To calculate f (.) there are four different function Flat, Gaussian, Sine and Wave and each of them is considered in this paper and are given here in Equation (5) to Equation (8). (5) (6) { ( ) (7) { ( ) (8) Where : The shape control parameter for functions. 2.3. Updating Stage The pheromone matrix is updated in two steps. The first updating is performed, in each construction step, after the movement of each ant, according to Equation (9) { (9) Where The evaporation rates : Determined by heuristic matrix is equal to When the entire ant completes their movement in each construction step, the second updating process is performed using Equation (10). (10) Where The pheromone decay coefficient 2.4. Decision Stage The decision process is the final is binary decision-making process to decide whether the pixel belong to complex region or smooth region. In this a threshold is applied on the final pheromone matrix . The threshold is computed according to the technique presented in [20]. The mean of value of pheromone matrix is selected as initial threshold . Then all the pheromone matrix entries are divided in two groups. One group contains all the value smaller than the initial threshold and other possess the value greater than the initail threshold . Means values of each of the group is
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389 382 calculated and new threshold is defined as the average of both means. The process of for calculation of threshold is repeated till the threshold value reaches to a stable value in term of user define tolerance . Final decision for each pixel at is made on the bases of the pheromone vale at postion compared with the final threshold value as given by Equation (11). { (11) Where : The baniary image If the pheromone value at current position is greater than threshold it is, consider as a part of complex region and other its treated as smooth region pixel. 2.5. Sub Section 1 The data hiding step is the LSB substitution process. This stage hides secret information in the LSBs of the cover image on the bases of the complex region detected. In this process whole cover image is considered and is processed pixel by pixel. Each pixel is check whether it belongs to complex region or smooth region. If the pixel corresponds to smooth region it is left unaffected and another pixel is considered. And if the pixel belongs to complex region then its LSB bits are substitued with the secret information. This process continues until the whole cover image is explored. The hiding process is accomplished in following manner. A pixel is cosider as complex region pixel if its correspding =0 and is consider smooth region componant if . Lets cosider a secret messahe to be hidden in complex region and is final stego image obtained after information hiding. The stego image is given by Equation (12). { (12) Figure 1. ACO-based data hiding in complex region 3. IMPLEMENTATION, EXPERIMENTAL RESULTS AND ANALYSIS To hide secret data in complex region of cover image using ACO algorithm and get experimental results, many different cover images are used. These cover images include, Cameraman, Lena, House, Jelly
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan) 383 beans, Mandrill, Pepper, Tiffany and Tree as presented in Figures 2(a), 2(b), 2(c), 2(d), 2(e), 2(f), 2(g) and 2(h), respectively. All these cover images are taken from image used are of the same size of . Each of the cover is subjected to data hiding using the proposed technique. As discusses earlier ACO can be used for complex region detection using four different functions i.e. Flat, Gaussian, Sine and Wave as given by Equation (5) to Equation (8), respectively. After the complex region and smooth region’s pixel classification, an LSB substitution technique is used for data hiding in the complex region’s pixels only. ACO approach is dependent on a very large number of parameters. The parameters set for the experimentation are given as: The shape control parameter λ= 10 The influence of pheromone matrix α = 1 The influence of heuristic matrix = 0.1 The evaporation rate = 0.1 The pheromone decay coefficient = 0.05 To analyze the proposed technique quantitatively, the data hiding capacity the MSE and PSNR are calculated as given by Equation (13) to Equation (15), respectively [20]. (13) ∑ ∑ (14) (15) (a) (b) (c) (d) (e) (f) (g) (h) Figure 2. Cover Images (a) Cameraman, (b) Lena, (c) House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389 384 Firstly, the proposed technique is applied on all the cover images shown in Figure 2. Flat function as given by Equation (5) has been used in ACO based complex region detection. The stego images obtained are shown in Figure (3). The hiding capacity, MSE and PSNR calculated for each cover image is listed in Table 1. (a) (b) (c) (d) (e) (f) (g) (h) Figure 3. Stego Images obtained using Flat function given in Equation (5) (a) Cameraman, (b) Lena, (c) House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree Table 1. Hiding Capacity, PSNR and MSE using Flat Function Cover Image PSNR (dB) MSE Hiding Capacity (%) Cameraman 45.74131 1.7336 4.1229 Lena 50.27679 0.6101 4.5105 House 46.43288 1.4784 4.0344 Jelly Beans 46.71787 1.3845 4.0558 Mandrill 45.95596 1.6500 5.5817 Pepper 47.14022 1.2562 4.5776 Tiffany 45.84321 1.6934 4.5837 Tree 45.77451 1.7204 5.2399 Secondly, ACO based data hiding in complex region techniques is implemented the same cover images shown in Figure 2, but using Gaussian function, as given by Equation (6). The resulted stego images
  • 7. Int J Elec & Comp Eng ISSN: 2088-8708  Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan) 385 are displayed here Figure 4. The hiding capacity, MSE and PSNR calculated, using each cover image for information hiding, is listed in Table 2. (a) (b) (c) (d) (e) (f) (g) (h) Figure 4. Stego Images obtained using Gaussian function given in Equation (6) (a) Cameraman, (b) Lena, (c) House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree Table 2. Hiding Capacity, PSNR and MSE using GaussianFunction Cover Image PSNR (dB) MSE Hiding Capacity (%) Cameraman 46.23899 1.5459 3.1647 Lena 52.68888 0.3501 2.1667 House 48.79289 0.8586 1.8951 Jelly Beans 48.3673 0.9470 2.4780 Mandrill 50.35944 0.5986 2.6489 Pepper 48.23987 0.9752 2.9724 Tiffany 49.16224 0.7886 2.0294 Tree 47.12503 1.2606 4.3274 Similarly, in third step all the cover images given in Figure 2 are subjected to data hiding using the proposed technique. Moreover, this time Sine function given in Equation (7) is used in ACO complex region detection. The obtained stego images, with hidden information inside it, are shown here Figure (5). The Table 3 contains the calculated hiding capacity, MSE and PSNR for all cover images.
  • 8.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389 386 (a) (b) (c) (d) (e) (f) (g) (h) Figure 5. Stego Images obtained using Sine function given in Equation (7) (a) Cameraman, (b) Lena, (c) House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree Table 3. Hiding Capacity, PSNR and MSE using Sine Function Cover Image PSNR (dB) MSE Hiding Capacity (%) Cameraman 45.23581 1.9476 4.4312 Lena 50.54471 0.5736 4.3854 House 46.63738 1.4104 3.7842 Jelly Beans 45.67469 1.7604 4.1870 Mandrill 46.5508 1.4388 5.8777 Pepper 46.12038 1.5887 4.5044 Tiffany 46.13627 1.5829 4.4250 Tree 45.81178 1.7057 5.5786 Lastly, Wave function, mathematically given by Equation (8), is used by ACO algorithm to classify, the complex and smooth region’s pixels and the cover images obtained after data hiding in complex region are shown in Figure 6. The values of hiding capacity, MSE and PSNR are listed in Table 4. The results show that all the ACO based data hiding in complex region results in significantly high quality stego images. However, Flat function in Equation (5) and Sine function in Equation (7), are very efficient both in term of hiding capacity and stego image quality.
  • 9. Int J Elec & Comp Eng ISSN: 2088-8708  Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan) 387 (a) (b) (c) (d) (e) (f) (g) (h) Figure 6. Stego Images obtained using Wave function given in Equation (8) (a) Cameraman, (b) Lena, (c) House, (d) Jelly Beans, (e) Mandrill, (f) Pepper, (g) Tiffany, and (h) Tree Table 4. Hiding Capacity, PSNR and MSE using Wave Function Cover Image PSNR (dB) MSE Hiding Capacity (%) Cameraman 46.90996 1.3246 2.9755 Lena 52.65306 0.3530 2.4200 House 48.5624 0.9054 2.0874 Jelly Beans 47.54692 1.1439 2.8076 Mandrill 48.88336 0.8409 2.8473 Pepper 47.8757 1.0605 2.8661 Tiffany 49.45377 0.7374 2.1210 Tree 46.90079 1.3274 4.1229 4. COMPARISON WITH OTHER TECHNIQUES As discussed in Section 3, the proposed method results in a very high quality stego images with PSNR greater than 100dB for all images using all four functions mentioned in Section 2. Here, this represents the comparison of the proposed method with different previous techniques. As the proposed technique is data hiding method that hides secret information in complex region of cover images. Therefore, a comparison of the proposed technique is made only with the data hiding techniques that uses edges or complex region of cover images. The comparison is made with Fridrich et al. [3], Honsinger et al. [4], Khan et al. [24], Goljan
  • 10.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 379 – 389 388 et al. [25], Macq and Dewey [26], and Vleeschouwer et al. [27], in term of PSNR and hiding capacity. The comparison made using Lena and Mandrill as cover images. The resulted values of hiding capacity and PNSR are listed in Table 5. The Honsinger et al. and Fridrich et al. techniques results in a hiding capacity of less than 0.0156 bpp and 0.0156 bpp, respectively. Vleeschourwer et al. achieve a hiding capacity of 0.156 bpp, with significantly stego image quality of 30dB in term of PSNR. Macq and Deweyand proposed technique, increases the data hiding capacity and results in a hiding capacity more than Honsinger et al., Fridrich et al. and Vleeschourwer et al. techniques. A hiding capacity of less than 0.03125 is recorded, but the visual quality of the stego image is affected very much. Goljan et al. and Khan et al. presented techniques claim hiding capacity of 0.36bpp and 0.33bpp, with PSNR of 39.00dB and 46.23dB respectively. The proposed technique resulted in a hiding capacity of 0.36 and 0.44 with PNSR greater than 50dB and 45dB for Lena and Mandrill cover images, correspondingly. The Table 5 shows that the PSNR of the proposed technique is significantly higher than the PSNR values of all the other techniques. While, the hiding capacity of the proposed technique is also higher than all techniques except that of Goljan et al. and Khan et al. techniques. ACO based data hiding in complex region has equal data hiding capacity as that of Goljan et al. but, the quality of the stego images is significantly better than the Goljan et al. Table 5. Comparison of proposed method with other methods Technique Lena Lena Hiding Capacity (bpp) PSNR (dB) Hiding Capacity (bpp) PSNR (dB) Honsinger et al. <0.0156 - <0.0156 - Fridrich et al. 0.0156 - 0.0156 - Vleeschouwer et al. 0.0156 30.00 0.0156 29.00 Macq and Deweyand <0.03125 - <0.03125 - Goljan et al. 0.36 39.00 0.44 39.00 Khan et al. 0.33 46.23 0.669 44.12 Porposed technique 0.36 >50 0.44 >45 5. CONCLUSION ACO based data hiding in complex region of digital images is an efficient data hiding technique that successfully exploits the HVS limitation of less sensitivity to the changes in complex regions. This technique results in high data hiding capacity with significantly good quality stego image. The beauty of the proposed technique lies in the fact that hiding capacity can be controlled by changing the function in ACO classification stage and the hiding capacity can be increased significantly with affecting the PSNR by choosing either Flat function in Equation (5) or Sine function in Equation (7), instead of Gaussian and Wave functions in Equation (6) and Equation (8), respectively. The hiding capacity and PSNR of the proposed work is higher than or comparable to other methods. The PSNR of the proposed method remain above 100 dB for all images as discussed in Section IV. In short, the ACO based data hiding in complex region technique is an efficient and secure data hiding method, resulting in a high quality stego-image, significantly high PSNR and reasonable data hiding capacity. REFERENCES [1] N. F. Johnson, and S. Jajodia, "Exploring steganography: Seeing the unseen," Computer, vol. 31(2), pp. 26-34, 1998. [2] S. Khan, M. A. Irfan, M. Ismail, T. Khan, and N. Ahmad, “Dual lossless compression based image steganography for low data rate channels,” In International Conference on Communication Technologies (ComTech), 2017, pp. 60-64. [3] J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," Photonics West 2001-Electronic Imaging. International Society for Optics and Photonics, 2001. [4] C. W. Honsinger, P. W. Jones, M. Rabbani, and J. C. Stoffel, "Lossless recovery of an original image containing embedded data," U.S. Patent No. 6,278,791. 21 Aug. 2001. [5] S. Khan, and M. H. Yousaf, "Implementation of VLSB Stegnography Using Modular Distance Technique," Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Springer New York, pp. 511-525, 2013. [6] M. A. Irfan, N. Ahmad, and S. Khan, “Analysis of Varying Least Significant Bits DCT and Spatial Domain Stegnography,” Sindh Univ. Res. Jour. (Sci. Ser.), vol. 46 (3), pp. 301-306, 2014. [7] S. Khan, N. Ahmad, and M. Wahid, “Varying index varying bits substitution algorithm for the implementation of VLSB steganography,” Journal of the Chinese Institute of Engineers, vol. 39 (1), pp. 101-109, 2016.
  • 11. Int J Elec & Comp Eng ISSN: 2088-8708  Ant Colony Optimization (ACO) based Data Hiding in... (Sahib Khan) 389 [8] S. Khan, M. Ismail, T. Khan, and N. Ahmad, "Enhanced stego block chaining (ESBC) for low bandwidth channels," Security and Communication Networks, vol. 9(18), pp. 6239-6247, 2016. [9] G. Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su, "Distortionless data hiding based on integer wavelet transform," Electronics Letters, vol. 38(25), pp. 1646-1648, 2002. [10] N. Guan, D. Tao, Z. Luo, and B. Yuan, "Online nonnegative matrix factorization with robust stochastic approximation," IEEE Transactions on Neural Networks and Learning Systems, vol. 23(7), pp. 1087-1099, 2012. [11] N. Guan, D. Tao, Z. Luo, and B. Yuan, "NeNMF: an optimal gradient method for nonnegative matrix factorization," IEEE Transactions on Signal Processing, vol. 60(6), pp. 2882-2898, 2012. [12] W. Hong, and T. S. Chen, "A novel data embedding method using adaptive pixel pair matching," IEEE Transactions on Information Forensics and Security, vol. 7(1), pp. 176-184, 2012. [13] W. Hong, T. S. Chen, and C. W. Shiu, "Reversible data hiding for high quality images using modification of prediction errors," Journal of Systems and Software, vol. 82(11), pp. 1833-1842, 2009. [14] C. S. Hsu, and S. F. Tu, "Probability-based tampering detection scheme for digital images," Optics Communications, vol. 283(9), pp. 1737-1743, 2010. [15] M. S. Subhedar, and V. H. Mankar, “Current status and key issues in image steganography: A survey,” Computer science review, vol. 13, pp. 95-113, 2014. [16] K. H. Jung, and K. Y. Yoo, "Data hiding using edge detector for scalable images," Multimedia tools and applications, vol. 71(3), pp. 1455-1468, 2014. [17] M. Dorigo and S. Thomas, Ant Colony Optimization. Cambridge: MIT Press, 2004. [18] H.-B. Duan, Ant Colony Algorithms: Theory and Applications. Beijing: Science Press, 2005. [19] J. Tian, W. Yu, and S. Xie, “An ant colony optimization algorithm for image edge detection,” In IEEE Congress on Evolutionary Computation, 2008. CEC 2008. (IEEE World Congress on Computational Intelligence), 2008, pp. 751-756. [20] S. K. Mohapatra, and S. Prasad, “Test Case Reduction Using Ant Colony Optimization for Object Oriented Program,” International Journal of Electrical and Computer Engineering, vol. 5(6), pp. 1424-1432, 2015. [21] M. R. PourArian, and A. Hanani, “Blind Steganography in Color Images by Double Wavelet Transform and Improved Arnold Transform,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 3(3), pp. 586-600, 2016. [22] M. S. Arya, M. Rani, and C. S. Bedi, “Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images,” International Journal of Electrical and Computer Engineering, vol. 6(6), pp. 2735-2741, 2016. [23] Z. Wang, and A. C. Bovik, "A universal image quality index," IEEE Signal Processing Letters, vol. 9(3), pp. 81-84, 2002. [24] M. Goljan, J. J. Fridrich, and R. Du, "Distortion-free data embedding for images," Information Hiding. Springer Berlin Heidelberg, 2001. [25] B. Macq, and F. Dewey, "Trusted headers for medical images," DFG VIII-D II Watermarking Workshop, Erlangen, Germany, vol. 10, 1999. [26] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, "Circular interpretation of histogram for reversible watermarking," IEEE Fourth Workshop on Multimedia Signal Processing, 2001. [27] S. Khan, N. Ahmad, M. Ismail, N. Minallah, and T. Khan, “A secure true edge based 4 least significant bits steganography,” In International Conference on Emerging Technologies (ICET), 2015, Islamabad, Pakistan, pp. 1-4.