Hessenberg factorization and firework algorithms for optimized data hiding in digital images

IF 2.1 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Journal of Intelligent Systems Pub Date : 2022-01-01 DOI:10.1515/jisys-2022-0029
M. Gaata, M. T. Younis, Jamal N. Hasoon, S. Mostafa
{"title":"Hessenberg factorization and firework algorithms for optimized data hiding in digital images","authors":"M. Gaata, M. T. Younis, Jamal N. Hasoon, S. Mostafa","doi":"10.1515/jisys-2022-0029","DOIUrl":null,"url":null,"abstract":"Abstract Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is separated into three components (RGB). Consequently, the discrete wavelet transform is applied to each component to obtain four bands (high–high, high–low, low–high, and low–low), resulting in 12 bands in total. By omitting the low–low band from each component, a new square matrix is formed from the rest bands to be used for the hiding process after adding keys to it. These keys are generated using a hybrid approach, combining two chaotic functions, namely Gaussian and exponential maps. The embedding matrix is divided into square blocks with a specific length, each of which is converted using Hessenberg transform into two matrices, P and H. For each block, a certain location within the H-matrix is used for embedding a secret value; the updated blocks are assembled, and the reverse process is performed. An optimization method is applied, through the application of the firework algorithm, on the set of the initial values that generate keys. Using an optimization procedure to obtain keys requires performing lowest possible change rate in an image and maintain the quality of the image. To analyze and test the efficiency of the proposed method, mean-square error (MSE) and peak signal-to-noise ratio (PSNR) measurements are calculated. Furthermore, the robustness of the watermark is computed by applying several attacks. The experimental results show that the value of the MSE is reduced by about 0.01 while the value of the PSNR is increased by about 1.25 on average. Moreover, the proposed method achieved a high-retrieval rate in comparison with the non-optimization approach.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"31 1","pages":"440 - 453"},"PeriodicalIF":2.1000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Intelligent Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/jisys-2022-0029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 4

Abstract

Abstract Data hiding and watermarking are considered one of the most important topics in cyber security. This article proposes an optimized method for embedding a watermark image in a cover medium (color image). First, the color of the image is separated into three components (RGB). Consequently, the discrete wavelet transform is applied to each component to obtain four bands (high–high, high–low, low–high, and low–low), resulting in 12 bands in total. By omitting the low–low band from each component, a new square matrix is formed from the rest bands to be used for the hiding process after adding keys to it. These keys are generated using a hybrid approach, combining two chaotic functions, namely Gaussian and exponential maps. The embedding matrix is divided into square blocks with a specific length, each of which is converted using Hessenberg transform into two matrices, P and H. For each block, a certain location within the H-matrix is used for embedding a secret value; the updated blocks are assembled, and the reverse process is performed. An optimization method is applied, through the application of the firework algorithm, on the set of the initial values that generate keys. Using an optimization procedure to obtain keys requires performing lowest possible change rate in an image and maintain the quality of the image. To analyze and test the efficiency of the proposed method, mean-square error (MSE) and peak signal-to-noise ratio (PSNR) measurements are calculated. Furthermore, the robustness of the watermark is computed by applying several attacks. The experimental results show that the value of the MSE is reduced by about 0.01 while the value of the PSNR is increased by about 1.25 on average. Moreover, the proposed method achieved a high-retrieval rate in comparison with the non-optimization approach.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在数字图像中优化数据隐藏的Hessenberg分解和烟花算法
数据隐藏和水印被认为是网络安全领域的重要课题之一。本文提出了一种在封面介质(彩色图像)中嵌入水印图像的优化方法。首先,将图像的颜色分成三个分量(RGB)。因此,对每个分量进行离散小波变换,得到4个波段(high-high, high-low, low-high, low-low),共12个波段。通过从每个分量中省略low-low波段,在为其添加密钥后,由其余波段形成一个新的方阵用于隐藏过程。这些密钥是使用混合方法生成的,结合了两个混沌函数,即高斯映射和指数映射。嵌入矩阵被划分为特定长度的正方形块,每个正方形块使用Hessenberg变换转换为两个矩阵P和h。对于每个块,使用h矩阵内的特定位置嵌入一个秘密值;将更新后的块组装起来,并执行相反的过程。通过烟花算法的应用,对生成密钥的初始值集应用了一种优化方法。使用优化过程获取密钥需要在图像中执行尽可能低的变化率,并保持图像的质量。为了分析和测试该方法的有效性,计算了均方误差(MSE)和峰值信噪比(PSNR)测量值。在此基础上,通过多次攻击来计算水印的鲁棒性。实验结果表明,MSE平均降低了0.01左右,PSNR平均提高了1.25左右。与非优化方法相比,该方法具有较高的检索率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Intelligent Systems
Journal of Intelligent Systems COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-
CiteScore
5.90
自引率
3.30%
发文量
77
审稿时长
51 weeks
期刊介绍: The Journal of Intelligent Systems aims to provide research and review papers, as well as Brief Communications at an interdisciplinary level, with the field of intelligent systems providing the focal point. This field includes areas like artificial intelligence, models and computational theories of human cognition, perception and motivation; brain models, artificial neural nets and neural computing. It covers contributions from the social, human and computer sciences to the analysis and application of information technology.
期刊最新文献
A study on predicting crime rates through machine learning and data mining using text A multiorder feature tracking and explanation strategy for explainable deep learning Intelligent control system for industrial robots based on multi-source data fusion Reinforcement learning with Gaussian process regression using variational free energy A novel distance vector hop localization method for wireless sensor networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1