1. Trang chủ
  2. » Luận Văn - Báo Cáo

A solution to text hiding in media with hybrid gravity search algorithm and transposition scheme

9 34 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 9
Dung lượng 257,5 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Several stages are implemented, namely the concealment stage, extract stage, and evaluation metrics, whereas cover text and message text are split into blocks, and each block contains on

Trang 1

Gravity Search Algorithm and Transposition

Scheme

Trong-The Nguyen

1,2

, Truong-Giang Ngo

3 (B)

, Thi-Thanh-Tan Nguyen

4

, Chi-Kien Tran

5

, and Ngoc-Cuong Nguyen

6

1

School of Computer Science and Mathematics, Fujian University of Technology, Fujian, China

2

University of Management, and Technology, Haiphong, Vietnam

3

Faculty of Computer Science and Engineering, Thuyloi University, 175 Tay Son, Dong Da,

Hanoi, Vietnam giangnt@tlu.edu.vn

4

Information Technology Faculty, Electric Power University, Hanoi, Vietnam

5

Hanoi University of Industry, Hanoi, Vietnam

6

Department of Cyber Security and Counter High-Tech Crime, Ministry of Public Security,

Hanoi, Vietnam

Abstract This paper suggests a new solution to conceal text messages in media by

hybridizing a meta-heuristic algorithm of the Gravity search algorithm (GSA) and

transposition method Several stages are implemented, namely the concealment

stage, extract stage, and evaluation metrics, whereas cover text and message text

are split into blocks, and each block contains one letter, relying on the fitness

value of related notes both of secret information and cover message The best

positions of the letters are taken optimization by the adjusting GSA that is used

to hide the confidential message The steganography process is then carried out

through the transposition process between the secret and cover message While in

the extraction stage, the fitness value of steganography message letters is found by

using GSA to determine the positions that represent the secret letters Experimental

results of the proposed scheme are compared with the other in the literature which

shows that the proposed approach presents robust security, provides high capacity

and resistance against several steganalysis attacks.

Keywords: Gravity search algorithm · Information hiding · Transposition

scheme

There is no doubt that steganography has become a critical security science that is widely applied in communication and transactions in everyday life [1] The transmis-sion of a message on the Internet, e.g., for communication or transactions has to count

on some issues such as data security, copyright control Secret communication systems for safety information and tips are needed [2] Data hiding attempts to conceal hidden

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021

J.-S Pan et al (eds.), Advances in Intelligent Information Hiding and Multimedia

Signal Processing, Smart Innovation, Systems and Technologies 212,

Trang 2

information in media such as a form that can not be seen, and the covering mask is complicated to decode [3] The hiding information technique usually includes several subdisciplines within the field of information security, such as watermarking, digital signatures, steganography, and cryptography Each of these methods has its function, with benefits and drawbacks Watermarking is commonly used to safeguard the copy-right, and digital signatures are frequently used to protect digital signatures [4], while steganography and cryptography are widely used to encrypt digital messages [5] The cryptography scrambles the letters so that it is not easily understandable Steganography and cryptography diverge Cryptography aims to provide encrypted communication by transforming the data into a shape that an eavesdropper can not easily comprehend The practice of covering text in another medium is referred to as a steganography intended to insure contact This means unauthorized users are unable to get the privately used hidden message [6] As stated, text steganography was considered to be the most challenging technique compared to audio and picture one due to inadequate redundant data, popular in other carriers, rendering most of its technology with inadequate capa-bility and security [7] The right to add hidden data to protect archives, though, relies

on the existence of redundant or irrelevant information inside them The characteristics

of a cover file which is altered, exploited, or updated during the embedding process will remain invisible to unauthorized users [8]

To cover text-in-text communications, including format based, random and math-ematical generations, and linguistic approaches, three major categories are employed Format based is the covering message that in the case of the terms and phrases will not

be changed; changes will only be made to the gaps between terms, lines, or/and para-graphs using special characters, i.e., white space steganography The cover text message

is automatically generated by random and mathematical generation methods; it does not require an existing cover code Throughout the creation process, a hidden message is used for the created cover message [9]

The linguistic approach is used to conceal a message in another message based on the cover message’s linguistic structure with the punctuation marks or the semantic terms as

a way to hide the letter, letter, which has two key forms which are linguistic structure and semantic approach The techniques have drawbacks, such as the data size depends on the number of the cover message’s punctuation marks and failed to protect the message sent when the outsider attempts to find the original message by swapping each word to the original one using the semantic algorithms [10] One of the promising ways to solve complex problems is the metaheuristic algorithm [11]

Many metaheuristics are built on the basis of natural phenomenal inspirations such

as synthetic annealing (SA) [12], genetic algorithm (GA) [13], and particle swarm opti-mization (PSO) [14] The Gravity Search Algorithm (GSA) [15] is a recent metaheuristic algorithm which is inspired by the actual gravity phenomena This paper introduces a new solution for text steganography through the combination of GSA and the transposi-tion process The solutransposi-tion suggested seeks to solve the aforementransposi-tioned inconveniences

of previous approaches

Trang 3

2 Gravity Search Algorithm (GSA)

GSA algorithm is taken inspiration from the physical phenomenon of gravity, in which planets interact through the action of gravity [15] The planets with large mass are a more attractive force The planets with a small mass approach it and the planets with large mass occupy the central position, which is, the optimal position seeks, which is the search principle of the GSA algorithm The GSA algorithm will communicate with each other, to guide planets to the optimal worlds The mathematical model of the GSA algorithm can be expressed by a series of expressions as follows

X

d

i (t + 1) = X

d

i (t ) + Vel

d

where X

d

i (t ), and Vel

d

i(t ), respectively, represent the position, velocity The Velocity Vel

is calculated as follows

Vel

d

i (t + 1) = rand · Vel

d

i (t ) + a

d

where a

d

i(t ) represent acceleration, and be expressed as follows

a

d

i(t + 1) = F

d

i (t )/M

d

where F

d

i (t ), and M

d

i (t ), respectively, represent gravitational force, and position of the ith planet in the d —dimension during the t th iteration The magnitude of the resultant force and the mass of inertia The calculation mathematical of inertia mass force is expressed in the gravity inspiration as follows The calculation of the resultant force is expressed as follows

F

d

ij(t ) =

G(t ) · Mi(t ) · Mj(t )

Rij(t ) + ε

· X

d

j (t ) − X

d

F

d

i (t ) =

N

j=1,j =i

randj· F

d

In the formula: N is the total number of particles; F

d

ij(t ) represents the gravitational force of particle j to particle i; randjis a random number of [0, 1]; Rij(t ) is the Euclidean distance between particle i and particle j; ε is a constant with a small value; G(t ) is the gravitational constant The calculation formula is given as follows

Among them: G0 and α are constants; t is the current number of iterations; maxt is the maximum number of iterations.The inertial mass of the particles in Eq (4) can be obtained based on the following equations:

mi(t ) =

fiti(t ) − worst(t )

(7)

Trang 4

Mi(t ) = mi(t )

N

j=1

where fiti(t ) represents the fitness value of the ith particle at the t th iteration For the image multi-threshold segmentation problem for which the maximum value is obtained, best(t ) and worst (t ) are obtained based on following as

best(t ) = max fitj(t ), j ∈ {1, 2, , N } (9)

worst(t ) = min fitj(t ), j ∈ {1, 2, , N } (10)

3 A Solution to Conceal Text Messages

Steganography’s main task is to thwart the unauthorized user from knowing that some-thing is hidden even if he/she can get the stego cover We use the invisible character structure (white space) to protect text in the text, where the secret message is hidden

in the cover medium’s white space position, the results show that the method is highly confidential because it uses functional complexity to avoid unauthorized users The lim-itation of this technique is that the binary string length must be less than or equal to the number of spaces for words This paper proposed a rule-based steganography technique for the selection of privacy channels in the spatial domain Steganography is commonly used in Internet communication because of its utility, where it is not encoding infor-mation but rather hiding The presence of it that makes the hacker’s task difficult Any characteristics in a production framework are as follows Using the method of transpo-sition between the secret message and the cover message, that means that there is no addition, deletion, or change By applying GSA, the best locations of the letters in the cover medium are optimized, and the method is used for combining with hiding pro-cessing in the transposition The new scheme has high flexibility relative to test results and improves robustness

3.1 Objective Function

The objective function is as fitness function would be drawn the relationship between the secret message and cover medium, i.e., message Let A(i) be the ASCII code represents for that letter; S (i) be the sequence of the letter represents in the set of letters; L(i) be the location of letters and the rand is random value distribution in the range [0,1] The relationship of each character in the cover message and secret message that uses find out the fitness value in the process of steganography by the planets of GSA, where fitness considered one of the important stages in the GSA algorithm The objective function is expressed as follows

Fitness (i) =

A(i) ∗ S (i)

iL

where A and S are ASCII character codes and the sequence of the letter in the set of

Trang 5

3.2 The System Design

The design of the proposed scheme consists of three phases of steganography process-ing, such as embeddprocess-ing, extracting process, and evaluating criterion Figure1shows a flowchart of the design of the proposed scheme The phases of embedding, obtaining process, and evaluating tests are expressed as follows

Fig 1 Flowchart of the design of the proposed scheme (embedding, extracting process, and evaluating criterion)

• Embedding process—the positions that are used to hiding that are determined by adjusting GSA, as well as the process of embedding text in the text by the transposition method is achieved

• Extracting process—the extraction process includes extract the secret message from the stego message by applying GSA

• Evaluation criterion—comparing the cover message and stego message, if there is

no difference between them, then the steganography process will be transporting a letter with another letter Therefore, an unauthorized user can’t suspect that something

is hidden in the stego message even if it uses all statistical meatuses and detection techniques or makes a comparison between them through the see or by size

The obtained results of the proposed scheme of (GSA) [15]are compared with the simu-lated annealing (SA)[12], genetic algorithm (GA)[13], and particle swarm optimization (PSO)[14] methods for hiding information respectively The number of planets as agents

Trang 6

of the algorithms is set to N equal to 60, and the maximum number of iterations is Max-gen is set to 1000; the gravitational beginning G0 and the step factor α are set to 10 and 0.1, respectively The other parameters set for the algorithms listed as follows: c1= 0.5,

c2= 1.5, inertia weight ω = 1.2, particle velocity V ∈ [−5, 5], mutation rate pr is set 0.05, and cross-rate cr set to 0.6

Figure2shows an example of the secret message, and the secret message is used for testing the proposed scheme.A secret message with size 13.9 KB that is used to be hidden into the secret message The secret message consists of 4 words with 18 characters Table

1listed the fitness calculated for each letter by using Eq (8) The cover message with a size of 19.2 KB, which consists of 114 words with 683 character

Fig 2 An example of the secret message and the secret message

Table 1 Initialization of fitness values for the secret message

Sequence No Characters Fitness value Sequence No Characters Fitness value

Several parameters are used to measure the experimental results that are listed as follows: Entropy, Energy, Variance, Squared Pearson Correlation Coefficient (SPCC),

Trang 7

Euclidian distance, Chi-square [16] Table 2 depicts the comparison of obtained val-ues between the cover message and secret message by applying calculations of several measurements

Table 2 Comparison of obtained values between the cover message and stego message by using several measurements

Parameters of measurements Derivative rate Cover message Secret message

Average 0.09 108.7754 108.7745

Chi-square, p 0.02 0.0977 0.0975

Euclidian distance 0.00 0.0001 0.0001

Figure3shows the comparison of the obtained results of the proposed scheme of GSA with the SA, GA, and PSO methods for hiding information, respectively Subfigures: (a) Comparison of the received error values; (b) Comparison of the converge rates It is clearly seen that the obtained results of the proposed scheme of GSA for information hiding are better than the other methods in terms of converge rate and accuracy rate

(a) Comparison of converge rates (b) Comparison of obtained error

values Fig 3 A comparison of the obtained results of the proposed scheme of GSA with the SA, GA, and PSO methods for hiding information, respectively Subfigures: a Comparison of obtained error values; b Comparison of converge rates

Trang 8

5 Conclusion

In this paper, we presented a solution to improving the scheme of hiding messages in text messages by hybridizing the gravity search algorithm (GSA) and the transposition scheme Several stages are implemented, namely the hiding stage, extract stage, and evaluation metrics Both cover text and message text are split into blocks, and each block contains one character according to its fitness value of related notes both of secret information and cover message The GSA adjusting to hide the confidential message takes optimization of the character’s best positions The process of steganography is then carried out through the process of transposing between the message of secrecy and cover The fitness value of steganography message letters is found while in the extraction stage by using GSA to determine the positions which represent the secret letters In the literature, experimental findings of the proposed scheme are compared with the other show that the proposed solution offers robust protection, provides high potential, and resistance against multiple steganalysis attacks

References

1 Narayana, V.L., et al.: Different techniques for hiding the text information using text steganography techniques: a survey, vol 23, p 115 (2018)

2 Mahajan, M., Kaur, N.: Adaptive steganography: a survey of recent statistical aware steganography techniques Int J Comput Netw Inf Secur 4, 76 (2012)

3 Nguyen, T.-T., et al.: A data hiding approach based on reference-affected matrix BT— Advances in Intelligent Information Hiding and Multimedia Signal Processing (2020).

4 Roy, A., Karforma, S.: A Survey on digital signatures and its applications J Comput Inf Technol 3, 45–69 (2012)

5 Wu, T.-Y., Tseng, Y.-M.: Publicly verifiable multi-secret sharing scheme from bilinear pairings IET Inf Secur 7, 239–246 (2013)

6 Wu, T.-Y., et al.: A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants Comput Networks 56, 2994–3006 (2012)

7 Wu, T.-Y., Lin, J.C.-W., Chen, C.-M., Tseng, Y.-M., Frnda, J., Sevcik, L., Voznak, M.: A brief review of revocable ID-based public key cryptosystem Perspect Sci 7, 81–86 (2016)

8 Chen, C.-M., Xu, L., Wu, T.-Y., Li, C.-R.: On the security of a chaotic maps-based three-party authenticated key agreement protocol J Netw Intell., 61–65 (2016)

9 Wu, T.-Y., et al.: On the security of a certificateless searchable public key encryption scheme In: International Conference on Genetic and Evolutionary Computing, pp 113–119 (2016)

10 Sharma, S., et al : Analysis of different text steganography techniques: a survey In: 2016 Second International Conference on Computer Intelligence & Communications Technology (CICT), pp 130–133 IEEE (2016)

11 Nguyen, T.T., et al.: An improved flower pollination algorithm for optimizing layouts of nodes

in wireless sensor network IEEE Access 7, 75985–75998 (2019)

12 Liu, G., Dai, Y., Wang, J., Wang, Z.: Secure data hiding algorithm based on simulated annealing Opt Precis Eng 5, 200–209 (2007)

13 Wang, S., Yang, B., Niu, X.: A secure steganography method based on genetic algorithm J Inf Hiding Multimed Signal Process 1, 28–35 (2010)

14 Guo, Y., Kong, X., You, X.: Secure steganography based on binary particle swarm

Trang 9

15 Rashedi, E., Nezamabadi-pour, H., Saryazdi, S.: GSA: a gravitational search algorithm Inf Sci (Ny) 179, 2232–2248 (2009) https://doi.org/10.1016/j.ins.2009.03.004

16 Subhedar, M.S., Mankar, V.H.: Current status and key issues in image steganography: a survey Comput Sci Rev 13, 95–113 (2014)

Ngày đăng: 03/12/2021, 16:18

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN