Secure Information Embedding in Images with Hybrid Firefly Algorithm
- URL: http://arxiv.org/abs/2312.13519v1
- Date: Thu, 21 Dec 2023 01:50:02 GMT
- Title: Secure Information Embedding in Images with Hybrid Firefly Algorithm
- Authors: Sahil Nokhwal, Manoj Chandrasekharan, Ankit Chaudhary
- Abstract summary: This research introduces a novel steganographic approach for concealing a confidential portable document format (PDF) document within a host image.
The purpose of this search is to accomplish two main goals: increasing the host image's capacity and reducing distortion.
The findings indicate a decrease in image distortion and an accelerated rate of convergence in the search process.
- Score: 2.9182357325967145
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Various methods have been proposed to secure access to sensitive information
over time, such as the many cryptographic methods in use to facilitate secure
communications on the internet. But other methods like steganography have been
overlooked which may be more suitable in cases where the act of transmission of
sensitive information itself should remain a secret. Multiple techniques that
are commonly discussed for such scenarios suffer from low capacity and high
distortion in the output signal. This research introduces a novel
steganographic approach for concealing a confidential portable document format
(PDF) document within a host image by employing the Hybrid Firefly algorithm
(HFA) proposed to select the pixel arrangement. This algorithm combines two
widely used optimization algorithms to improve their performance. The suggested
methodology utilizes the HFA algorithm to conduct a search for optimal pixel
placements in the spatial domain. The purpose of this search is to accomplish
two main goals: increasing the host image's capacity and reducing distortion.
Moreover, the proposed approach intends to reduce the time required for the
embedding procedure. The findings indicate a decrease in image distortion and
an accelerated rate of convergence in the search process. The resultant
embeddings exhibit robustness against steganalytic assaults, hence rendering
the identification of the embedded data a formidable undertaking.
Related papers
- EmbAu: A Novel Technique to Embed Audio Data Using Shuffled Frog Leaping
Algorithm [0.7673339435080445]
The aim of steganographic algorithms is to identify the appropriate pixel positions in the host or cover image, where bits of sensitive information can be concealed for data encryption.
Work is being done to improve the capacity to integrate sensitive information and to maintain the visual appearance of the steganographic image.
We use the Shuffled Frog Leaping Algorithm (SFLA) to determine the order of pixels by which sensitive information can be placed in the cover image.
arXiv Detail & Related papers (2023-12-13T17:34:08Z) - Layered Rendering Diffusion Model for Zero-Shot Guided Image Synthesis [60.260724486834164]
This paper introduces innovative solutions to enhance spatial controllability in diffusion models reliant on text queries.
We present two key innovations: Vision Guidance and the Layered Rendering Diffusion framework.
We apply our method to three practical applications: bounding box-to-image, semantic mask-to-image and image editing.
arXiv Detail & Related papers (2023-11-30T10:36:19Z) - Towards General Visual-Linguistic Face Forgery Detection [95.73987327101143]
Deepfakes are realistic face manipulations that can pose serious threats to security, privacy, and trust.
Existing methods mostly treat this task as binary classification, which uses digital labels or mask signals to train the detection model.
We propose a novel paradigm named Visual-Linguistic Face Forgery Detection(VLFFD), which uses fine-grained sentence-level prompts as the annotation.
arXiv Detail & Related papers (2023-07-31T10:22:33Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Towards Robust Image-in-Audio Deep Steganography [14.1081872409308]
This paper extends and enhances an existing image-in-audio deep steganography method by focusing on improving its robustness.
The proposed enhancements include modifications to the loss function, utilization of the Short-Time Fourier Transform (STFT), introduction of redundancy in the encoding process for error correction, and buffering of additional information in the pixel subconvolution operation.
arXiv Detail & Related papers (2023-03-09T03:16:04Z) - Hierarchical Forgery Classifier On Multi-modality Face Forgery Clues [61.37306431455152]
We propose a novel Hierarchical Forgery for Multi-modality Face Forgery Detection (HFC-MFFD)
The HFC-MFFD learns robust patches-based hybrid representation to enhance forgery authentication in multiple-modality scenarios.
The specific hierarchical face forgery is proposed to alleviate the class imbalance problem and further boost detection performance.
arXiv Detail & Related papers (2022-12-30T10:54:29Z) - Perfectly Secure Steganography Using Minimum Entropy Coupling [60.154855689780796]
We show that a steganography procedure is perfectly secure under Cachin 1998's information-theoretic model of steganography.
We also show that, among perfectly secure procedures, a procedure maximizes information throughput if and only if it is induced by a minimum entropy coupling.
arXiv Detail & Related papers (2022-10-24T17:40:07Z) - Synthetic Periocular Iris PAI from a Small Set of Near-Infrared-Images [10.337140740056725]
This paper proposes a novel PAI synthetically created (SPI-PAI) using four state-of-the-art GAN algorithms.
The best PAD algorithm reported by the LivDet-2020 competition was tested for us using the synthetic PAI.
Results demonstrated the feasibility of synthetic images to fool presentation attacks detection algorithms.
arXiv Detail & Related papers (2021-07-26T08:07:49Z) - Robust Data Hiding Using Inverse Gradient Attention [82.73143630466629]
In the data hiding task, each pixel of cover images should be treated differently since they have divergent tolerabilities.
We propose a novel deep data hiding scheme with Inverse Gradient Attention (IGA), combing the ideas of adversarial learning and attention mechanism.
Empirically, extensive experiments show that the proposed model outperforms the state-of-the-art methods on two prevalent datasets.
arXiv Detail & Related papers (2020-11-21T19:08:23Z) - Robust watermarking with double detector-discriminator approach [0.5330240017302621]
We present a novel deep framework for a watermarking - a technique of embedding a transparent message into an image in a way that allows retrieving the message from a copy.
Our framework outperforms recent methods in the context of robustness against spectrum of attacks.
We also present our double detector-discriminator approach - a scheme to detect and discriminate if the image contains the embedded message or not.
arXiv Detail & Related papers (2020-06-06T17:15:45Z) - Fusion of Camera Model and Source Device Specific Forensic Methods for
Improved Tamper Detection [2.064612766965483]
PRNU based camera recognition method is widely studied in the image forensic literature.
In this paper, we propose their combination via a Neural Network to achieve better small-scale tamper detection performance.
arXiv Detail & Related papers (2020-02-24T09:02:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.