A novel image gravity transform based on least significant bit in image steganography

IF 4.4 2区 数学 Q1 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS
Mehdi Nikpour, Mohammad Taghi Kheirabadi, Ali Nodehi
{"title":"A novel image gravity transform based on least significant bit in image steganography","authors":"Mehdi Nikpour,&nbsp;Mohammad Taghi Kheirabadi,&nbsp;Ali Nodehi","doi":"10.1016/j.matcom.2025.03.010","DOIUrl":null,"url":null,"abstract":"<div><div>Information transmission technology has been developing rapidly in recent years, and high-quality and safe information transmission is one of the major challenges in today’s world. Steganography is a safe data transmission technique in which the data is embedded and hidden in a media content before sending it to the network. Text-in-image steganography is one of the important types of steganography that has various applications such as military, research and data mining. <!--> <!-->Designing an algorithm with high security and accurate retrieval of hidden data is one of the main challenges in text-in-image steganography. Hence, In this paper, a new efficient text-in-image steganography algorithm is proposed to enhance the security of hidden data and accuracy of data retrieval. This algorithm is composed of two components including data hiding and data retrieval. In the first component, the original data is hidden in the original Image and generate the stegano image. To this end, the algorithm of “finding the best non-uniform locations” (FBNL) is introduced. in addition the original text is encrypted by IGT algorithm. After that, the encrypted text is hidden in the best non-uniform location of image that founded by FBNL. The second component is executed when the original data is needed. in the start of this component, the FBNL algorithm runs and find the best non-uniform location and the inverse IGT (IIGT) algorithm uses this locations and recovers the original data. For evaluation, several datasets is employed for images including Cifar, Mnist, Pascal and LFW. In addition, the text data is retrieved from UCI dataset. The evaluation results show that the proposed algorithm has an improvement between 4.6 and 58.4 percent in terms of quality, error, security and time compared to other investigated algorithms in different scenarios.</div></div>","PeriodicalId":49856,"journal":{"name":"Mathematics and Computers in Simulation","volume":"234 ","pages":"Pages 396-418"},"PeriodicalIF":4.4000,"publicationDate":"2025-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematics and Computers in Simulation","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0378475425000849","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Information transmission technology has been developing rapidly in recent years, and high-quality and safe information transmission is one of the major challenges in today’s world. Steganography is a safe data transmission technique in which the data is embedded and hidden in a media content before sending it to the network. Text-in-image steganography is one of the important types of steganography that has various applications such as military, research and data mining.  Designing an algorithm with high security and accurate retrieval of hidden data is one of the main challenges in text-in-image steganography. Hence, In this paper, a new efficient text-in-image steganography algorithm is proposed to enhance the security of hidden data and accuracy of data retrieval. This algorithm is composed of two components including data hiding and data retrieval. In the first component, the original data is hidden in the original Image and generate the stegano image. To this end, the algorithm of “finding the best non-uniform locations” (FBNL) is introduced. in addition the original text is encrypted by IGT algorithm. After that, the encrypted text is hidden in the best non-uniform location of image that founded by FBNL. The second component is executed when the original data is needed. in the start of this component, the FBNL algorithm runs and find the best non-uniform location and the inverse IGT (IIGT) algorithm uses this locations and recovers the original data. For evaluation, several datasets is employed for images including Cifar, Mnist, Pascal and LFW. In addition, the text data is retrieved from UCI dataset. The evaluation results show that the proposed algorithm has an improvement between 4.6 and 58.4 percent in terms of quality, error, security and time compared to other investigated algorithms in different scenarios.
求助全文
约1分钟内获得全文 求助全文
来源期刊
Mathematics and Computers in Simulation
Mathematics and Computers in Simulation 数学-计算机:跨学科应用
CiteScore
8.90
自引率
4.30%
发文量
335
审稿时长
54 days
期刊介绍: The aim of the journal is to provide an international forum for the dissemination of up-to-date information in the fields of the mathematics and computers, in particular (but not exclusively) as they apply to the dynamics of systems, their simulation and scientific computation in general. Published material ranges from short, concise research papers to more general tutorial articles. Mathematics and Computers in Simulation, published monthly, is the official organ of IMACS, the International Association for Mathematics and Computers in Simulation (Formerly AICA). This Association, founded in 1955 and legally incorporated in 1956 is a member of FIACC (the Five International Associations Coordinating Committee), together with IFIP, IFAV, IFORS and IMEKO. Topics covered by the journal include mathematical tools in: •The foundations of systems modelling •Numerical analysis and the development of algorithms for simulation They also include considerations about computer hardware for simulation and about special software and compilers. The journal also publishes articles concerned with specific applications of modelling and simulation in science and engineering, with relevant applied mathematics, the general philosophy of systems simulation, and their impact on disciplinary and interdisciplinary research. The journal includes a Book Review section -- and a "News on IMACS" section that contains a Calendar of future Conferences/Events and other information about the Association.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信